[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.565154][ T26] audit: type=1800 audit(1554682413.590:25): pid=7809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.593397][ T26] audit: type=1800 audit(1554682413.590:26): pid=7809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.633823][ T26] audit: type=1800 audit(1554682413.590:27): pid=7809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.212' (ECDSA) to the list of known hosts. 2019/04/08 00:13:41 fuzzer started 2019/04/08 00:13:45 dialing manager at 10.128.0.26:34543 2019/04/08 00:13:45 syscalls: 2408 2019/04/08 00:13:45 code coverage: enabled 2019/04/08 00:13:45 comparison tracing: enabled 2019/04/08 00:13:45 extra coverage: extra coverage is not supported by the kernel 2019/04/08 00:13:45 setuid sandbox: enabled 2019/04/08 00:13:45 namespace sandbox: enabled 2019/04/08 00:13:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/08 00:13:45 fault injection: enabled 2019/04/08 00:13:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/08 00:13:45 net packet injection: enabled 2019/04/08 00:13:45 net device setup: enabled 00:16:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) syzkaller login: [ 190.573811][ T7972] IPVS: ftp: loaded support on port[0] = 21 00:16:05 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0xffffffffffffffff, @empty, 'gretap0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 190.701617][ T7972] chnl_net:caif_netlink_parms(): no params data found [ 190.783979][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.808572][ T7972] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.816987][ T7972] device bridge_slave_0 entered promiscuous mode [ 190.841512][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.849262][ T7972] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.857411][ T7972] device bridge_slave_1 entered promiscuous mode [ 190.896579][ T7972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.907917][ T7972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.940952][ T7972] team0: Port device team_slave_0 added [ 190.950249][ T7972] team0: Port device team_slave_1 added [ 190.953098][ T7975] IPVS: ftp: loaded support on port[0] = 21 00:16:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 191.041634][ T7972] device hsr_slave_0 entered promiscuous mode [ 191.118877][ T7972] device hsr_slave_1 entered promiscuous mode 00:16:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) [ 191.213721][ T7977] IPVS: ftp: loaded support on port[0] = 21 [ 191.291757][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.299210][ T7972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.307229][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.314393][ T7972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.416203][ T7979] IPVS: ftp: loaded support on port[0] = 21 00:16:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07750600000000000000ed5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000006ec0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000004c0)=""/215, 0xd7}], 0x1}}], 0x10, 0x0, 0x0) [ 191.607881][ T7972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.660629][ T7975] chnl_net:caif_netlink_parms(): no params data found [ 191.671265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.684169][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.711721][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.723007][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 191.745835][ T7972] 8021q: adding VLAN 0 to HW filter on device team0 00:16:06 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name, 0x10) bind$tipc(r0, &(0x7f0000000100)=@name, 0x10) r1 = socket(0x1e, 0x5, 0x0) sendmsg(r1, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) [ 191.784284][ T7984] IPVS: ftp: loaded support on port[0] = 21 [ 191.791583][ T7977] chnl_net:caif_netlink_parms(): no params data found [ 191.834762][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.846566][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.855901][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.863104][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.873314][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.883651][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.894764][ T7980] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.901985][ T7980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.963199][ T7979] chnl_net:caif_netlink_parms(): no params data found [ 192.013415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.050371][ T7975] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.057691][ T7975] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.065682][ T7975] device bridge_slave_0 entered promiscuous mode [ 192.073503][ T7975] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.077710][ T7989] IPVS: ftp: loaded support on port[0] = 21 [ 192.080767][ T7975] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.097724][ T7975] device bridge_slave_1 entered promiscuous mode [ 192.122464][ T7977] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.131867][ T7977] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.139944][ T7977] device bridge_slave_0 entered promiscuous mode [ 192.154717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.175215][ T7975] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.184652][ T7979] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.192160][ T7979] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.200256][ T7979] device bridge_slave_0 entered promiscuous mode [ 192.210291][ T7979] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.217588][ T7979] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.225341][ T7979] device bridge_slave_1 entered promiscuous mode [ 192.238864][ T7977] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.246016][ T7977] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.253933][ T7977] device bridge_slave_1 entered promiscuous mode [ 192.272436][ T7975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.321828][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.331121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.341341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.357633][ T7979] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.369317][ T7977] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.380514][ T7979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.396736][ T7975] team0: Port device team_slave_0 added [ 192.411443][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.420664][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.429399][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.437871][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.447861][ T7977] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.470330][ T7975] team0: Port device team_slave_1 added [ 192.500134][ T7979] team0: Port device team_slave_0 added [ 192.513755][ T7977] team0: Port device team_slave_0 added [ 192.522196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.531232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.541839][ T7972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.561250][ T7979] team0: Port device team_slave_1 added [ 192.574076][ T7977] team0: Port device team_slave_1 added [ 192.631881][ T7975] device hsr_slave_0 entered promiscuous mode [ 192.698971][ T7975] device hsr_slave_1 entered promiscuous mode [ 192.861485][ T7977] device hsr_slave_0 entered promiscuous mode [ 192.918903][ T7977] device hsr_slave_1 entered promiscuous mode [ 192.965355][ T7972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.021467][ T7979] device hsr_slave_0 entered promiscuous mode [ 193.068820][ T7979] device hsr_slave_1 entered promiscuous mode [ 193.132770][ T7984] chnl_net:caif_netlink_parms(): no params data found [ 193.299411][ T7989] chnl_net:caif_netlink_parms(): no params data found [ 193.341058][ T7984] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.348206][ T7984] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.356697][ T7984] device bridge_slave_0 entered promiscuous mode [ 193.364677][ T7984] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.372070][ T7984] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.380360][ T7984] device bridge_slave_1 entered promiscuous mode [ 193.390420][ T7975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.427323][ T7984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.457923][ T7984] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.494960][ T7984] team0: Port device team_slave_0 added [ 193.512920][ T7977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.528074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.536228][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.545966][ T7975] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.555441][ T7984] team0: Port device team_slave_1 added [ 193.561572][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.568893][ T7989] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.577004][ T7989] device bridge_slave_0 entered promiscuous mode [ 193.585679][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.593080][ T7989] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.601670][ T7989] device bridge_slave_1 entered promiscuous mode [ 193.664902][ T7984] device hsr_slave_0 entered promiscuous mode [ 193.719008][ T7984] device hsr_slave_1 entered promiscuous mode [ 193.767358][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.777023][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.785551][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.792777][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.800919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.808854][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.816560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.826051][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.834701][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.841867][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.850324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.865310][ T7977] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.887749][ T7989] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.897346][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.907233][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.916470][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.927057][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.935735][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.956620][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.964943][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.973984][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.982673][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.991782][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.000795][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.010024][ T2991] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.017086][ T2991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.026347][ T7989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.060967][ T7989] team0: Port device team_slave_0 added [ 194.067843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.083236][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.097648][ T7979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.113938][ T7975] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.124769][ T7975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.140892][ T7989] team0: Port device team_slave_1 added 00:16:09 executing program 0: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) getuid() shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) [ 194.160500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.175193][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.186950][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.196399][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.212860][ C0] hrtimer: interrupt took 38242 ns [ 194.220490][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.232484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.247621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.270829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.296098][ T7979] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.323164][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.334044][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.346726][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.363024][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.373888][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.387191][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.433307][ T7977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.451085][ T7977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.501811][ T7989] device hsr_slave_0 entered promiscuous mode [ 194.538917][ T7989] device hsr_slave_1 entered promiscuous mode [ 194.612415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.624178][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.636192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.651992][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.659190][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.674135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.683981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.698153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.708255][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.722955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.734425][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.747206][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.754420][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.768231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.779118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.787447][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.876364][ T7975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.919506][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.929672][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.946088][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.956619][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.972886][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.985438][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.002708][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.012290][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.025496][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.035441][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.062724][ T7979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.078944][ T7977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.128304][ T7979] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.214793][ T7984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.290489][ T7989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.363974][ T7984] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.400461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 00:16:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00'}, 0x45c) 00:16:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101801) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xffffffa7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0xa7}) [ 195.408353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:16:10 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x9) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r0, 0x3, 0x0, 0x80000003) 00:16:10 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040), 0x0) [ 195.498728][ T7989] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.525039][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 00:16:10 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x2}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) getrusage(0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) [ 195.556895][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.620311][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.627485][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.662343][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.696283][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:16:10 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x2}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) getrusage(0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) 00:16:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f2b3c123f3188b070") syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 195.721536][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.739793][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.774115][ T7980] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.781481][ T7980] bridge0: port 2(bridge_slave_1) entered forwarding state 00:16:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x2400c000, 0x0, 0x0) 00:16:10 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x2}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) getrusage(0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) [ 195.842673][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.856106][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.884920][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.903956][ T8046] __ntfs_error: 3 callbacks suppressed [ 195.903968][ T8046] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 195.924348][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.948291][ T7986] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.955517][ T7986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.975249][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.003981][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.021455][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.032758][ T7986] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.039992][ T7986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.078870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.089586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.121218][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.140963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.151641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.161766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.170735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.179448][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.188147][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.196832][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.205569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.215196][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.224298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.240106][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.263526][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.281535][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.300838][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.313191][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.324480][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.336796][ T7986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.362129][ T7989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.379614][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.395763][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.405716][ T2991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.416552][ T7984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.457643][ T7989] 8021q: adding VLAN 0 to HW filter on device batadv0 00:16:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) 00:16:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), 0x0}, 0x20) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @host}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r0, &(0x7f0000000080), 0x0}, 0x18) 00:16:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000011008100e00f80ecdb4cb9040ac8650402000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x8000000000000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x9010}) 00:16:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) 00:16:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='hybla\x00', 0x250a4b05) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) 00:16:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mremap(&(0x7f00006d4000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00008f1000/0x1000)=nil) [ 196.630214][ T8076] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 00:16:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07750600000000000000ed5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, 0x0, 0x0, 0x10001}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2000, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 00:16:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) [ 196.854370][ T8097] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 196.880698][ T8097] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8097 [ 196.891543][ T8097] caller is ip6_finish_output+0x335/0xdc0 [ 196.897323][ T8097] CPU: 1 PID: 8097 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190405 #19 [ 196.906451][ T8097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.916555][ T8097] Call Trace: [ 196.919884][ T8097] dump_stack+0x172/0x1f0 [ 196.924256][ T8097] __this_cpu_preempt_check+0x246/0x270 [ 196.929926][ T8097] ip6_finish_output+0x335/0xdc0 [ 196.935098][ T8097] ip6_output+0x235/0x7f0 [ 196.939475][ T8097] ? ip6_finish_output+0xdc0/0xdc0 [ 196.944632][ T8097] ? ip6_fragment+0x3980/0x3980 [ 196.949496][ T8097] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.954544][ T8097] ip6_local_out+0xc4/0x1b0 [ 196.959092][ T8097] ip6_send_skb+0xbb/0x350 [ 196.963568][ T8097] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 196.969057][ T8097] ? __sanitizer_cov_trace_cmp1+0x10/0x20 [ 196.974816][ T8097] udpv6_sendmsg+0x21e3/0x28d0 [ 196.979612][ T8097] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.984667][ T8097] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 196.990864][ T8097] ? mark_held_locks+0xf0/0xf0 [ 196.995655][ T8097] ? __lock_acquire+0x548/0x3fb0 [ 197.000621][ T8097] ? __local_bh_enable_ip+0x15a/0x270 [ 197.006054][ T8097] ? release_sock+0x158/0x1c0 [ 197.010773][ T8097] ? __local_bh_enable_ip+0x15a/0x270 [ 197.016178][ T8097] ? _raw_spin_unlock_bh+0x31/0x40 [ 197.021318][ T8097] inet_sendmsg+0x147/0x5e0 [ 197.026017][ T8097] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 197.032035][ T8097] ? inet_sendmsg+0x147/0x5e0 [ 197.036754][ T8097] ? ipip_gro_receive+0x100/0x100 [ 197.041819][ T8097] sock_sendmsg+0xdd/0x130 [ 197.046282][ T8097] __sys_sendto+0x262/0x380 [ 197.050826][ T8097] ? __ia32_sys_getpeername+0xb0/0xb0 [ 197.056294][ T8097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.062579][ T8097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.068074][ T8097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.073559][ T8097] ? do_syscall_64+0x26/0x610 [ 197.078266][ T8097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.084380][ T8097] __x64_sys_sendto+0xe1/0x1a0 [ 197.089185][ T8097] do_syscall_64+0x103/0x610 [ 197.093821][ T8097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.099729][ T8097] RIP: 0033:0x4582b9 [ 197.103645][ T8097] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.123361][ T8097] RSP: 002b:00007fa3773dcc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 197.131876][ T8097] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.139889][ T8097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 197.147884][ T8097] RBP: 000000000073bf00 R08: 0000000020000240 R09: 000000000000001c 00:16:11 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x248000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r2, 0x2, &(0x7f00000003c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x1000000000, r0, &(0x7f0000000140)="fee5f512cd121590b8a7add620e76007424cf29977a802e8dcc5b583ae736127459fa5ec7e947c0515c9102d7afb5b58a76969fdac52e634b9e1b9998b65afc3af883d09d2344adf7a5893aff4ece1fa71eceadca245722dac196d8ba680fd33f60a466a04b20e6f217ac7df2b1d678ad956bfe2adb72c657ca0f17f6eebd01b5bdbd778b938be231ece44354a6a0e7b990704c91bd27e6fbc3116a65a6cc3446f8cef82949a76e623", 0xa9, 0x1f, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0xab00}]) [ 197.155971][ T8097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3773dd6d4 [ 197.163967][ T8097] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 197.175852][ T8097] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8097 [ 197.177816][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.185326][ T8097] caller is sk_mc_loop+0x1d/0x210 [ 197.191350][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.196380][ T8097] CPU: 0 PID: 8097 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190405 #19 [ 197.211131][ T8097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.221201][ T8097] Call Trace: [ 197.224514][ T8097] dump_stack+0x172/0x1f0 [ 197.228867][ T8097] __this_cpu_preempt_check+0x246/0x270 [ 197.234443][ T8097] sk_mc_loop+0x1d/0x210 [ 197.238717][ T8097] ip6_finish_output2+0x17a5/0x2550 [ 197.243954][ T8097] ? find_held_lock+0x35/0x130 [ 197.248737][ T8097] ? ip6_mtu+0x2e6/0x460 [ 197.252992][ T8097] ? ip6_forward_finish+0x580/0x580 [ 197.258216][ T8097] ? lock_downgrade+0x880/0x880 [ 197.263098][ T8097] ? rcu_read_unlock_special+0xf3/0x210 [ 197.268685][ T8097] ip6_finish_output+0x614/0xdc0 [ 197.273666][ T8097] ? ip6_finish_output+0x614/0xdc0 [ 197.278800][ T8097] ip6_output+0x235/0x7f0 [ 197.283163][ T8097] ? ip6_finish_output+0xdc0/0xdc0 [ 197.288328][ T8097] ? ip6_fragment+0x3980/0x3980 [ 197.293214][ T8097] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.298267][ T8097] ip6_local_out+0xc4/0x1b0 [ 197.302791][ T8097] ip6_send_skb+0xbb/0x350 [ 197.307256][ T8097] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 197.312753][ T8097] ? __sanitizer_cov_trace_cmp1+0x10/0x20 [ 197.318506][ T8097] udpv6_sendmsg+0x21e3/0x28d0 [ 197.323321][ T8097] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.328378][ T8097] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 197.334390][ T8097] ? mark_held_locks+0xf0/0xf0 [ 197.339178][ T8097] ? __lock_acquire+0x548/0x3fb0 [ 197.344177][ T8097] ? __local_bh_enable_ip+0x15a/0x270 [ 197.349586][ T8097] ? release_sock+0x158/0x1c0 [ 197.354327][ T8097] ? __local_bh_enable_ip+0x15a/0x270 [ 197.359737][ T8097] ? _raw_spin_unlock_bh+0x31/0x40 [ 197.364895][ T8097] inet_sendmsg+0x147/0x5e0 [ 197.369414][ T8097] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 197.375421][ T8097] ? inet_sendmsg+0x147/0x5e0 [ 197.380127][ T8097] ? ipip_gro_receive+0x100/0x100 [ 197.385187][ T8097] sock_sendmsg+0xdd/0x130 [ 197.389632][ T8097] __sys_sendto+0x262/0x380 [ 197.394267][ T8097] ? __ia32_sys_getpeername+0xb0/0xb0 [ 197.399692][ T8097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.405974][ T8097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.411460][ T8097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.416949][ T8097] ? do_syscall_64+0x26/0x610 [ 197.421648][ T8097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.427760][ T8097] __x64_sys_sendto+0xe1/0x1a0 [ 197.432564][ T8097] do_syscall_64+0x103/0x610 [ 197.437196][ T8097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.443118][ T8097] RIP: 0033:0x4582b9 [ 197.447027][ T8097] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.466654][ T8097] RSP: 002b:00007fa3773dcc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 197.475095][ T8097] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.483102][ T8097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 197.491105][ T8097] RBP: 000000000073bf00 R08: 0000000020000240 R09: 000000000000001c [ 197.499096][ T8097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3773dd6d4 00:16:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) [ 197.507114][ T8097] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 197.609178][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.615024][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.625183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.630236][ T8109] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8109 [ 197.631056][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.640450][ T8109] caller is ip6_finish_output+0x335/0xdc0 [ 197.652026][ T8109] CPU: 0 PID: 8109 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190405 #19 [ 197.661082][ T8109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.671168][ T8109] Call Trace: [ 197.674493][ T8109] dump_stack+0x172/0x1f0 [ 197.678874][ T8109] __this_cpu_preempt_check+0x246/0x270 [ 197.684466][ T8109] ip6_finish_output+0x335/0xdc0 [ 197.689455][ T8109] ip6_output+0x235/0x7f0 [ 197.693832][ T8109] ? ip6_finish_output+0xdc0/0xdc0 [ 197.698991][ T8109] ? ip6_fragment+0x3980/0x3980 [ 197.703874][ T8109] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.708935][ T8109] ip6_local_out+0xc4/0x1b0 [ 197.713481][ T8109] ip6_send_skb+0xbb/0x350 [ 197.717948][ T8109] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 197.723441][ T8109] ? __sanitizer_cov_trace_cmp1+0x10/0x20 [ 197.729220][ T8109] udpv6_sendmsg+0x21e3/0x28d0 [ 197.734036][ T8109] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.739131][ T8109] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 197.745158][ T8109] ? mark_held_locks+0xf0/0xf0 [ 197.749969][ T8109] ? __lock_acquire+0x548/0x3fb0 00:16:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07750600000000000000ed5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, 0x0, 0x0, 0x10001}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2000, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) [ 197.754948][ T8109] ? __local_bh_enable_ip+0x15a/0x270 [ 197.760378][ T8109] ? release_sock+0x158/0x1c0 [ 197.765127][ T8109] ? __local_bh_enable_ip+0x15a/0x270 [ 197.770537][ T8109] ? _raw_spin_unlock_bh+0x31/0x40 [ 197.775682][ T8109] inet_sendmsg+0x147/0x5e0 [ 197.780235][ T8109] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 197.786248][ T8109] ? inet_sendmsg+0x147/0x5e0 [ 197.790957][ T8109] ? ipip_gro_receive+0x100/0x100 [ 197.796027][ T8109] sock_sendmsg+0xdd/0x130 [ 197.800481][ T8109] __sys_sendto+0x262/0x380 [ 197.805015][ T8109] ? __ia32_sys_getpeername+0xb0/0xb0 [ 197.810437][ T8109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.816729][ T8109] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.822215][ T8109] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.829315][ T8109] ? do_syscall_64+0x26/0x610 [ 197.834023][ T8109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.840221][ T8109] __x64_sys_sendto+0xe1/0x1a0 [ 197.845040][ T8109] do_syscall_64+0x103/0x610 [ 197.849681][ T8109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.855599][ T8109] RIP: 0033:0x4582b9 [ 197.859518][ T8109] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.879156][ T8109] RSP: 002b:00007fa3773bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 197.887599][ T8109] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.895599][ T8109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 197.903599][ T8109] RBP: 000000000073bfa0 R08: 0000000020000240 R09: 000000000000001c [ 197.911616][ T8109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3773bc6d4 [ 197.919619][ T8109] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 197.998563][ T8109] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8109 [ 198.007925][ T8109] caller is sk_mc_loop+0x1d/0x210 [ 198.007944][ T8109] CPU: 1 PID: 8109 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190405 #19 [ 198.007954][ T8109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.007959][ T8109] Call Trace: [ 198.007986][ T8109] dump_stack+0x172/0x1f0 [ 198.022084][ T8109] __this_cpu_preempt_check+0x246/0x270 [ 198.022103][ T8109] sk_mc_loop+0x1d/0x210 [ 198.022141][ T8109] ip6_finish_output2+0x17a5/0x2550 [ 198.054879][ T8109] ? find_held_lock+0x35/0x130 [ 198.059678][ T8109] ? ip6_mtu+0x2e6/0x460 [ 198.063962][ T8109] ? ip6_forward_finish+0x580/0x580 [ 198.069197][ T8109] ? lock_downgrade+0x880/0x880 [ 198.074090][ T8109] ? rcu_read_unlock_special+0xf3/0x210 [ 198.079688][ T8109] ip6_finish_output+0x614/0xdc0 [ 198.084658][ T8109] ? ip6_finish_output+0x614/0xdc0 [ 198.089881][ T8109] ip6_output+0x235/0x7f0 [ 198.094264][ T8109] ? ip6_finish_output+0xdc0/0xdc0 [ 198.099411][ T8109] ? ip6_fragment+0x3980/0x3980 [ 198.104321][ T8109] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.109399][ T8109] ip6_local_out+0xc4/0x1b0 [ 198.113955][ T8109] ip6_send_skb+0xbb/0x350 [ 198.118435][ T8109] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 198.123935][ T8109] ? __sanitizer_cov_trace_cmp1+0x10/0x20 [ 198.129699][ T8109] udpv6_sendmsg+0x21e3/0x28d0 [ 198.134508][ T8109] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.139616][ T8109] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 198.145653][ T8109] ? mark_held_locks+0xf0/0xf0 [ 198.150449][ T8109] ? __lock_acquire+0x548/0x3fb0 [ 198.155419][ T8109] ? __local_bh_enable_ip+0x15a/0x270 [ 198.160860][ T8109] ? release_sock+0x158/0x1c0 [ 198.165585][ T8109] ? __local_bh_enable_ip+0x15a/0x270 [ 198.171009][ T8109] ? _raw_spin_unlock_bh+0x31/0x40 [ 198.176164][ T8109] inet_sendmsg+0x147/0x5e0 [ 198.180696][ T8109] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 198.186722][ T8109] ? inet_sendmsg+0x147/0x5e0 [ 198.191454][ T8109] ? ipip_gro_receive+0x100/0x100 [ 198.196528][ T8109] sock_sendmsg+0xdd/0x130 [ 198.200966][ T8109] __sys_sendto+0x262/0x380 [ 198.205508][ T8109] ? __ia32_sys_getpeername+0xb0/0xb0 [ 198.210933][ T8109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.217224][ T8109] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.222714][ T8109] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.228234][ T8109] ? do_syscall_64+0x26/0x610 [ 198.232950][ T8109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.239074][ T8109] __x64_sys_sendto+0xe1/0x1a0 [ 198.243886][ T8109] do_syscall_64+0x103/0x610 [ 198.248513][ T8109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.254440][ T8109] RIP: 0033:0x4582b9 [ 198.258360][ T8109] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.277990][ T8109] RSP: 002b:00007fa3773bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 198.286430][ T8109] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 00:16:13 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) [ 198.294432][ T8109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 198.302430][ T8109] RBP: 000000000073bfa0 R08: 0000000020000240 R09: 000000000000001c [ 198.310423][ T8109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3773bc6d4 [ 198.318427][ T8109] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff 00:16:13 executing program 1: r0 = semget$private(0x0, 0x1, 0xf) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000040)=""/123) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x2, 0x208) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x5}) socket$inet6(0xa, 0x4, 0x0) syz_genetlink_get_family_id$tipc(0x0) 00:16:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 00:16:13 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name, 0x10) r1 = socket(0x1e, 0x5, 0x0) sendmsg(r1, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 00:16:13 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) setrlimit(0x400000011, 0x0) close(0xffffffffffffffff) capset(0x0, 0x0) mprotect(&(0x7f000052d000/0x4000)=nil, 0x4000, 0x1000000) ioctl$TCSETAW(r0, 0x5407, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, &(0x7f0000000180)) mlockall(0x0) 00:16:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) splice(r0, 0x0, r3, 0x0, 0x49c7, 0x0) 00:16:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) 00:16:13 executing program 4: setrlimit(0x40000000000008, &(0x7f0000000040)={0x484b, 0xfffffffffffff001}) capset(&(0x7f0000000100)={0x100000019980330}, &(0x7f0000000140)) mlock(&(0x7f0000007000/0x3000)=nil, 0x3000) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) 00:16:13 executing program 2: sched_setscheduler(0x0, 0x2, &(0x7f0000000680)=0x3) r0 = eventfd(0x8040010000) write$eventfd(r0, &(0x7f00000000c0)=0xffffffffffffff90, 0x8) 00:16:14 executing program 1: r0 = semget$private(0x0, 0x1, 0xf) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000040)=""/123) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x2, 0x208) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x5}) socket$inet6(0xa, 0x4, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 199.127625][ T8168] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 00:16:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000060607031dfffd946fa283000a200a0009000100051d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 00:16:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1000000400200000, 0x0) unshare(0x24020400) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 199.297770][ T8179] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 199.370075][ T8179] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 00:16:14 executing program 3: 00:16:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x40040000000049, 0x0, 0xfe) 00:16:14 executing program 5: 00:16:14 executing program 0: 00:16:14 executing program 0: 00:16:14 executing program 2: sched_setscheduler(0x0, 0x2, &(0x7f0000000680)=0x3) r0 = eventfd(0x8040010000) write$eventfd(r0, &(0x7f00000000c0)=0xffffffffffffff90, 0x8) 00:16:14 executing program 5: 00:16:14 executing program 1: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0xfffffffffffffffe) 00:16:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:14 executing program 3: 00:16:14 executing program 0: 00:16:15 executing program 0: 00:16:15 executing program 5: 00:16:15 executing program 3: 00:16:15 executing program 1: 00:16:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) 00:16:15 executing program 1: 00:16:15 executing program 2: 00:16:15 executing program 5: 00:16:15 executing program 0: 00:16:15 executing program 3: 00:16:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) 00:16:15 executing program 1: 00:16:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) 00:16:15 executing program 3: 00:16:15 executing program 1: 00:16:15 executing program 5: 00:16:16 executing program 0: 00:16:16 executing program 2: 00:16:16 executing program 3: 00:16:16 executing program 5: 00:16:16 executing program 2: 00:16:16 executing program 5: 00:16:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x5) 00:16:16 executing program 1: 00:16:16 executing program 0: 00:16:16 executing program 3: 00:16:16 executing program 5: 00:16:16 executing program 2: 00:16:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x5) 00:16:16 executing program 0: 00:16:16 executing program 3: 00:16:16 executing program 1: 00:16:16 executing program 2: 00:16:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x5) 00:16:16 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000ec0)="61ce6ed94f41f48fddb17be75acd5fff8e4109548bec482bfc0c6321cc4cae47952fade164de0d115b601581953f9a337ea011906254b229aa6c3a8d246142c633fc0f54b0218c5becb9fd513c8914bdfad4668e36b8ffb24d6f7dc5e8119510898eca216a75ce4e6a295af4b6bc4dae50e31997f687b4bbc532210cef625534447e1a449d37a6163113a57c34f68e15230f660c161a41fa5330b0f852d2e337c373b2efe237dad926b57ba2421c33d21b5f8b412a3468010211cc46be2fc19f9731ca", 0xc3}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 00:16:16 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') r0 = syz_open_dev$vcsa(0x0, 0x5, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000080)={0x2}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000100)) getrusage(0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) 00:16:16 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x8) 00:16:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000180)) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/97, 0x61}], 0x1) 00:16:16 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') r0 = syz_open_dev$vcsa(0x0, 0x5, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000080)={0x2}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) close(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)) 00:16:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x401}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) [ 201.756655][ T8316] FS-Cache: Duplicate cookie detected [ 201.763146][ T8316] FS-Cache: O-cookie c=00000000c3c6defe [p=000000000404332c fl=222 nc=0 na=1] [ 201.772164][ T8316] FS-Cache: O-cookie d=000000009e09cc02 n=00000000b184c0d6 [ 201.779520][ T8316] FS-Cache: O-key=[22] '02000a00000000000000040001000000000000000000' [ 201.787774][ T8316] FS-Cache: N-cookie c=000000003e7701fc [p=000000000404332c fl=2 nc=0 na=1] [ 201.796557][ T8316] FS-Cache: N-cookie d=000000009e09cc02 n=0000000015f604ca 00:16:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) [ 201.803949][ T8316] FS-Cache: N-key=[22] '02000a00000000000000040001000000000000000000' 00:16:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x5) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) write$rfkill(r1, &(0x7f0000000000), 0x8) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) getgroups(0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000002c0)={0x10}, 0x10) 00:16:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeb5) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000200)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r3 = socket(0xa, 0x3, 0x8) r4 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a0, &(0x7f0000000180)={'bridge0\xfe\xff\x01\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r5 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0x0) close(r0) r6 = dup3(r0, r5, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r1], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0201000210000000000006f6ffffff000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90bc599bf"], 0x8d}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000000000000, 0x0) 00:16:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:17 executing program 2: accept$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f00000004c0)={0x3, r0}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x27b, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 00:16:17 executing program 3: getxattr(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x41, &(0x7f0000002640)) dup2(0xffffffffffffffff, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x27b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 00:16:17 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x5) 00:16:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeb5) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000200)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r3 = socket(0xa, 0x3, 0x8) r4 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a0, &(0x7f0000000180)={'bridge0\xfe\xff\x01\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r5 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0x0) close(r0) r6 = dup3(r0, r5, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r1], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0201000210000000000006f6ffffff000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90bc599bf"], 0x8d}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000000000000, 0x0) 00:16:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeb5) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000200)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r3 = socket(0xa, 0x3, 0x8) r4 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a0, &(0x7f0000000180)={'bridge0\xfe\xff\x01\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r5 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0x0) close(r0) r6 = dup3(r0, r5, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r1], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0201000210000000000006f6ffffff000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90bc599bf"], 0x8d}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000000000000, 0x0) 00:16:17 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000ec0)="61ce6ed94f41f48fddb17be75acd5fff8e4109548bec482bfc0c6321cc4cae47952fade164de0d115b601581953f9a337ea011906254b229aa6c3a8d246142c633fc0f54b0218c5becb9fd513c8914bdfad4668e36b8ffb24d6f7dc5e8119510898eca216a75ce4e6a295af4b6bc4dae50e31997f687b4bbc532210cef625534447e1a449d37a6163113a57c34f68e15230f660c161a41fa5330b0f852d2e337c373b2efe237dad926b57ba2421c33d21b5f8b412a3468010211cc46be2fc19f9731ca", 0xc3}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 00:16:17 executing program 2: getpgid(0x0) getxattr(0x0, 0x0, &(0x7f0000000300)=""/41, 0x29) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x27b, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) recvmmsg(r0, 0x0, 0x0, 0x62, 0x0) 00:16:17 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x5) 00:16:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000a80)=""/41, 0x29}], 0x1}}], 0x2, 0x41, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 00:16:17 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x5) 00:16:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) ioctl$BLKROTATIONAL(r1, 0x127e, 0x0) 00:16:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:18 executing program 3: syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c32e2ee2c94080360058423e46d8731266420fe2e3f20f38f0eedde5c401105eb12f6500006f") r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x89\xd6#\x836\x19\x11\x1f') openat$cgroup_ro(r0, &(0x7f0000000500)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3W\x8c\t\xf0\xc7]X\x9f\xdd\xf6\x15\xda\xd0\xaa\xbc\xa0\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='!'], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000ec0)="61ce6ed94f41f48fddb17be75acd5fff8e4109548bec482bfc0c6321cc4cae47952fade164de0d115b601581953f9a337ea011906254b229aa6c3a8d246142c633fc0f54b0218c5becb9fd513c8914bdfad4668e36b8ffb24d6f7dc5e8119510898eca216a75ce4e6a295af4b6bc4dae50e31997f687b4bbc532210cef625534447e1a449d37a6163113a57c34f68e15230f660c161a41fa5330b0f852d2e337c373b2efe237dad926b57ba2421c33d21b5f8b412a3468010211cc46be2fc19f9731ca", 0xc3}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 00:16:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:18 executing program 1: syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c32e2ee2c94080360058423e46d8731266420fe2e3f20f38f0eedde5c401105eb12f6500006f") r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x89\xd6#\x836\x19\x11\x1f') openat$cgroup_ro(r0, &(0x7f0000000700)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3W\x8c\t\xf0\xc7]X\x9f\xdd\xf6\x15\xda\xd0\xaa\xbc\xa0\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.055424][ T8421] RSP: 002b:00007f65e39d1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 204.063858][ T8421] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 204.071848][ T8421] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 00:16:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x5) 00:16:19 executing program 2: r0 = syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = gettid() futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$void(r0, 0xc0045c79) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x37f794d6) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/6, 0x6}], 0x192) dup2(r3, r4) fcntl$setownex(r3, 0xf, &(0x7f0000000140)={0x0, r1}) tkill(r1, 0x16) [ 204.079841][ T8421] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 204.087837][ T8421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65e39d26d4 [ 204.095836][ T8421] R13: 00000000004c5997 R14: 00000000004d9cc8 R15: 00000000ffffffff