[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.484255] random: sshd: uninitialized urandom read (32 bytes read) [ 33.795718] kauditd_printk_skb: 9 callbacks suppressed [ 33.795726] audit: type=1400 audit(1568610598.966:35): avc: denied { map } for pid=6833 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.838948] random: sshd: uninitialized urandom read (32 bytes read) [ 34.444314] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.138' (ECDSA) to the list of known hosts. [ 39.890442] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/16 05:10:05 fuzzer started [ 40.088022] audit: type=1400 audit(1568610605.256:36): avc: denied { map } for pid=6843 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.733975] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/16 05:10:06 dialing manager at 10.128.0.105:34685 2019/09/16 05:10:06 syscalls: 2466 2019/09/16 05:10:06 code coverage: enabled 2019/09/16 05:10:06 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/16 05:10:06 extra coverage: extra coverage is not supported by the kernel 2019/09/16 05:10:06 setuid sandbox: enabled 2019/09/16 05:10:06 namespace sandbox: enabled 2019/09/16 05:10:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/16 05:10:06 fault injection: enabled 2019/09/16 05:10:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/16 05:10:06 net packet injection: enabled 2019/09/16 05:10:06 net device setup: enabled [ 42.704723] random: crng init done 05:11:58 executing program 0: 05:11:58 executing program 1: [ 152.896055] audit: type=1400 audit(1568610718.066:37): avc: denied { map } for pid=6843 comm="syz-fuzzer" path="/root/syzkaller-shm490408723" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 05:11:58 executing program 5: 05:11:58 executing program 2: 05:11:58 executing program 3: 05:11:58 executing program 4: mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xdc249ac1c8864585, 0x0, 0x0, 0x0) [ 152.940747] audit: type=1400 audit(1568610718.106:38): avc: denied { map } for pid=6861 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3488 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 153.151996] IPVS: ftp: loaded support on port[0] = 21 [ 153.708750] chnl_net:caif_netlink_parms(): no params data found [ 153.716322] IPVS: ftp: loaded support on port[0] = 21 [ 153.761484] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.767903] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.775272] device bridge_slave_0 entered promiscuous mode [ 153.784035] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.790479] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.797440] device bridge_slave_1 entered promiscuous mode [ 153.816799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.826129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.836465] IPVS: ftp: loaded support on port[0] = 21 [ 153.857333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 153.864768] team0: Port device team_slave_0 added [ 153.870406] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 153.877922] team0: Port device team_slave_1 added [ 153.883525] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 153.892500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 153.951956] device hsr_slave_0 entered promiscuous mode [ 154.010341] device hsr_slave_1 entered promiscuous mode [ 154.052330] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 154.064890] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 154.084968] IPVS: ftp: loaded support on port[0] = 21 [ 154.085951] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.098123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.104986] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.111362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.164525] chnl_net:caif_netlink_parms(): no params data found [ 154.208576] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.217203] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.224455] device bridge_slave_0 entered promiscuous mode [ 154.233441] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.239867] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.247076] device bridge_slave_1 entered promiscuous mode [ 154.314219] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.324787] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.336948] chnl_net:caif_netlink_parms(): no params data found [ 154.360819] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 154.368011] team0: Port device team_slave_0 added [ 154.373706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 154.380755] team0: Port device team_slave_1 added [ 154.393336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 154.401059] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 154.425263] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.432635] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.439607] device bridge_slave_0 entered promiscuous mode [ 154.460596] IPVS: ftp: loaded support on port[0] = 21 [ 154.462099] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.472659] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.480075] device bridge_slave_1 entered promiscuous mode [ 154.532964] device hsr_slave_0 entered promiscuous mode [ 154.570446] device hsr_slave_1 entered promiscuous mode [ 154.610778] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 154.635109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.643193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 154.654758] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 154.660979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.692963] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.725502] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 154.753339] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.761939] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.769100] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 154.789033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 154.796604] team0: Port device team_slave_0 added [ 154.804127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 154.811784] team0: Port device team_slave_1 added [ 154.817179] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 154.824907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 154.882995] device hsr_slave_0 entered promiscuous mode [ 154.930500] device hsr_slave_1 entered promiscuous mode [ 154.992204] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 155.001153] chnl_net:caif_netlink_parms(): no params data found [ 155.022296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 155.022763] IPVS: ftp: loaded support on port[0] = 21 [ 155.029833] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 155.043401] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 155.049505] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.067309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.076033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.085862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 155.111821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 155.121234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.128956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.136832] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.143320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.162650] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.169027] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.176373] device bridge_slave_0 entered promiscuous mode [ 155.183662] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.189999] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.198084] device bridge_slave_1 entered promiscuous mode [ 155.222746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 155.230612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.238329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.246773] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.253346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.262627] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 155.313635] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.324223] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.339201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 155.370371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.379400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 155.386492] chnl_net:caif_netlink_parms(): no params data found [ 155.403400] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 155.411473] team0: Port device team_slave_0 added [ 155.417445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.449210] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.455766] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.463923] device bridge_slave_0 entered promiscuous mode [ 155.471576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 155.478649] team0: Port device team_slave_1 added [ 155.485594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 155.494339] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.500865] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.507753] device bridge_slave_1 entered promiscuous mode [ 155.514176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.522307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.529872] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.537476] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 155.544967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 155.567556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.594111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 155.603880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 155.611852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.643808] device hsr_slave_0 entered promiscuous mode [ 155.690403] device hsr_slave_1 entered promiscuous mode [ 155.741216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.748861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.756632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.764189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.773890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 155.787182] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 155.794236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 155.805056] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 155.811309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.859167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.867357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.875552] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 155.883249] team0: Port device team_slave_0 added [ 155.888844] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 155.896179] team0: Port device team_slave_1 added [ 155.901586] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 155.921563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.936224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.943330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 155.956822] chnl_net:caif_netlink_parms(): no params data found [ 155.968705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 155.984943] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 155.993759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 156.007205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 156.083768] device hsr_slave_0 entered promiscuous mode [ 156.120418] device hsr_slave_1 entered promiscuous mode [ 156.193590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 156.199800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.206978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.216423] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 156.227408] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 156.233788] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.246511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 156.262157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.287289] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.294569] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.302035] device bridge_slave_0 entered promiscuous mode [ 156.308504] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 156.320669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 156.333550] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.339955] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.348746] device bridge_slave_1 entered promiscuous mode [ 156.361554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 156.369458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.376877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.386803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.395208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.403506] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.409849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.418141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.427754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 156.436640] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 156.442903] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.456043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 156.473510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.481498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.489038] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.495441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.504347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 156.518723] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.527713] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.536564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.545254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.553311] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.559698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.566821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.575011] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 05:12:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x0, 0x0, 0x0, 0x4}]}, 0x10) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r2, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0xa5) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000d11000)=0x3fb, 0xa5) arch_prctl$ARCH_SET_GS(0x1001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff4c) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000280)=0x20) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000000)={@remote}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000e1, 0x0) write(r0, 0x0, 0x0) [ 156.589953] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 156.612083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.624529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.639509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 156.649386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 156.662669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 156.692506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.703112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.711431] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.717959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.725106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.732959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.739827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.749105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.762245] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 156.768329] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.778226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 156.786657] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 156.794829] team0: Port device team_slave_0 added [ 156.800879] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 156.807949] team0: Port device team_slave_1 added [ 156.814245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.823325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.831085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.838700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.848103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 156.858774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 156.871922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 156.879807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 156.888754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.899918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.908739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.916919] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.923646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.931044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.938802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.946474] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.952861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.962105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 156.971897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 156.980809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 156.987874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 157.043332] device hsr_slave_0 entered promiscuous mode [ 157.080367] device hsr_slave_1 entered promiscuous mode 05:12:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 157.120848] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 157.127880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.136153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.149813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.160800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.169518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.177349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.185156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.193057] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.200996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 157.209889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 157.222070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 157.232203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 157.240315] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 157.247618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.258589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 05:12:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 157.266487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.274462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.282369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.294551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.308593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.319723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 157.328435] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 157.336585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.350007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.359522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 05:12:02 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 157.367281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.381946] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 157.387986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.411000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.424918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 157.425712] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 157.433362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 157.462706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.474532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.483721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.499066] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 157.519255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 157.527722] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 157.538069] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 157.545893] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.553805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.562095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 05:12:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x80}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{0x80, 0x8}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000001c0)={'TPROXY\x00'}, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 157.569797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.577313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.586933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 157.602166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.617302] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 05:12:02 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 157.626103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.634185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.646405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 157.660465] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 157.666610] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.682039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.718337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.736929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.747886] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 157.759351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.771862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 157.786794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.799580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.807426] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.814092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.822708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 157.831579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.838734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.847161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.855118] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.861536] bridge0: port 2(bridge_slave_1) entered forwarding state 05:12:03 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1d) write$tun(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000ffff00ae0000ffffffffd82962fff4fb0000000000030bb2f9a7896a0000c85fa35613c8a337b1a5120419d7bb1034faff3265c8cdd58fb2d2c2f7b0da45cfaa8a60b3b37eb30cdb4c22e2811cd79f0600063f28b931d84eab8ea00e23630a89cc1fa16b0883b0ff6d763cdc2c1620c48f601f79ef3881d11b1310a37a6298bc01084f88cccd6ab4dbb6de7b22996d8817a007580194e89c533a5e6dfaf75953c84f149a1ac237cea5accd"], 0x1) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11d}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 157.886409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 157.900813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.915197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 157.957937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.975286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.988716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.002283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 158.010365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.017972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.037495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 158.056627] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.066503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.075748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.086377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 158.094674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 158.104963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 158.112940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 158.119078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.126989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.134687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.142564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.149973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.157409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.166309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.175613] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 158.182029] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.189235] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 158.196420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.206746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 158.217716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 158.225144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.234131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.241923] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.248298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.255410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.263499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.272414] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.278788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.286203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.295876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 05:12:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 05:12:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3) 05:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$setperm(0x1b, 0x0, 0x0) [ 158.303798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.314922] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 158.326514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 158.334047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.355488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.372963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 158.383529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.393241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.402785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.412577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 158.431624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.439337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.472736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 158.482219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.495587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.516785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 158.527058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.536553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.545999] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 158.552838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.569489] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 158.579178] 8021q: adding VLAN 0 to HW filter on device batadv0 05:12:04 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000040)=0x4) socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ffffac14ffaa00000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ffffac14ffaa00000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ffffac14ffaa00000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) 05:12:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x10) 05:12:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x81}, 0x14) 05:12:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='trusted)[keyringvmnet0(wlan0\x00', 0x1d, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x20080, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 05:12:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x3]}, 0x45c) 05:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) removexattr(0x0, 0x0) 05:12:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6c, 0x0, &(0x7f00000003c0)) 05:12:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008480)=[{{&(0x7f0000000100)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x4000000) 05:12:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) [ 159.469508] input: syz1 as /devices/virtual/input/input5 05:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 05:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0xd48a5a656600d03e) 05:12:04 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8], [0x0, 0x3]}, 0x45c) 05:12:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x1f91, &(0x7f0000ffc000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0xd48a5a656600d03e) shmctl$IPC_STAT(0x0, 0x2, 0x0) 05:12:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) 05:12:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x74, 0x0, &(0x7f00000003c0)) 05:12:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) [ 159.698389] input: syz1 as /devices/virtual/input/input7 05:12:04 executing program 2: mkdir(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.events\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="00007a01000100000000005292", 0xd) accept4$alg(r1, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r4, &(0x7f0000002580)=[{{&(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x4, [@broadcast]}]}}}], 0x18}}], 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f00000001c0)) r5 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 159.727193] audit: type=1800 audit(1568610724.896:39): pid=7032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 05:12:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) 05:12:05 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8], [0x0, 0x3]}, 0x45c) 05:12:05 executing program 3: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, &(0x7f0000000000), 0x6) 05:12:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 159.819855] hrtimer: interrupt took 35913 ns 05:12:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) [ 159.888728] mmap: syz-executor.4 (7051) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 05:12:05 executing program 3: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, 0x0, 0x0) [ 159.945274] input: syz1 as /devices/virtual/input/input9 05:12:05 executing program 2: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 05:12:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008480)=[{{&(0x7f0000000100)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{&(0x7f0000001340)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x2, 0x900) 05:12:05 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 05:12:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 05:12:05 executing program 3: socket$inet6(0xa, 0x401000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000080)={'erspan0\x00', {0x2, 0x4e21, @loopback}}) seccomp(0x0, 0x1, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{0x8001, 0x1ff, 0x8}, {0x5, 0x3, 0x1}, {0x5, 0x4, 0x10000}, {0x4, 0x100000001, 0x548, 0x2}, {0x1, 0x2, 0x0, 0x1f}, {0x5, 0x100000001, 0x3f, 0x13}, {0x9, 0x0, 0x0, 0x3}]}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1447, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(r1, &(0x7f0000000100)='net/sockstat\x00') keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 05:12:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0xfffffffffffffdfb, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010005fba000000000800000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x14, 0x3a, 0x0, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @mcast1}}}}}, 0x46) 05:12:05 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fgetxattr(r0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000000000012d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = getpid() setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xe0, 0x1, 0x6c1, "9b1ba44ea72514ef0f0ea434b368ee6e", "829699c1c31d60e2dfaf48b644e60662fa57cc4e372794f9fe52900baa48b1967417b8ffd70ab8b47d71f3b0c8d198ef4a53088fdcce537681f0ab80e6efe7a891014d4a7499539c2516fb92a6b5683d0a54c2cc81ea55a0ca680405fae8e3c8f37334433e165c48b83db217a49f551868a4e23c7241538559a569c0e0c14ac6e96408f7c1f304393ad99ed1c9c9ccee7af987024fa2fcc6984d9a3558ae44fbfe20117613a7ed0af65ca5edb1df0d3925fec84f1388a76e9155328491f621e739c6b2025a91f423be6d03"}, 0xe0, 0x5) tkill(r1, 0x9) 05:12:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/131, 0x83}], 0x1, 0x7a004c00) 05:12:05 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x0, "1aa18e30437215ea"}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000400)) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000080)={'erspan0\x00', {0x2, 0x4e21, @loopback}}) seccomp(0x1, 0x1, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{0x8001, 0x1ff, 0x8, 0x6f33}, {0x5, 0x3, 0x1, 0x6}, {0x4, 0x100000001, 0x548, 0x2}, {0x1, 0x2, 0xb4a, 0x1f}, {0xf395, 0x2}, {0x9, 0xf5, 0x0, 0x3}, {0x4, 0x3, 0x5, 0x9}]}) syz_open_dev$sg(0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1447, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r4, 0x4000000000, 0xffffffffffffffff, 0x3) syz_open_procfs(r4, &(0x7f0000000100)='net/sockstat\x00') keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 05:12:05 executing program 3: socket$inet6(0xa, 0x401000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000080)={'erspan0\x00', {0x2, 0x4e21, @loopback}}) seccomp(0x0, 0x1, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{0x8001, 0x1ff, 0x8}, {0x5, 0x3, 0x1}, {0x5, 0x4, 0x10000}, {0x4, 0x100000001, 0x548, 0x2}, {0x1, 0x2, 0x0, 0x1f}, {0x5, 0x100000001, 0x3f, 0x13}, {0x9, 0x0, 0x0, 0x3}]}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1447, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(r1, &(0x7f0000000100)='net/sockstat\x00') keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) [ 160.289505] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 160.298443] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:12:05 executing program 2: socket$inet6(0xa, 0x401000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000080)={'erspan0\x00', {0x2, 0x4e21, @loopback}}) seccomp(0x0, 0x1, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{0x8001, 0x1ff, 0x8}, {0x5, 0x3, 0x1}, {0x5, 0x4, 0x10000}, {0x4, 0x100000001, 0x548, 0x2}, {0x1, 0x2, 0x0, 0x1f}, {0x5, 0x100000001, 0x3f, 0x13}, {0x9, 0x0, 0x0, 0x3}]}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1447, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(r1, &(0x7f0000000100)='net/sockstat\x00') keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) [ 160.346187] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:12:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 160.440990] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 160.471278] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:12:05 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000002e0009abe71fd02b09977176742a5da40200000000f400050000ffffff000000effc01e8d1543adb09538235d1eb15b01fe49e8ee5268a4fff000000e57f5dc13d77b168a82d12adbd5b473cb6baacf91e27b4adc61a44669c390788"], 0x24}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924926, 0x0) 05:12:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f0000000280)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) close(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) splice(r0, 0x0, r4, 0x0, 0xc0, 0x0) close(r4) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYRES16=0x0], 0x2) 05:12:06 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0x5402, 0x0) 05:12:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0xb, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12}, &(0x7f0000000040)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 05:12:06 executing program 2: timer_gettime(0x0, &(0x7f0000000280)) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000040)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}]) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80c00) r2 = socket$alg(0x26, 0x5, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/tcp6\x00') accept4$inet6(0xffffffffffffffff, &(0x7f0000001740)={0xa, 0x0, 0x0, @empty}, 0x0, 0xc1800) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) dup(0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) ftruncate(0xffffffffffffffff, 0x208200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x6, &(0x7f0000000080)="11dca50d0104cfe47bf0") getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, 0x0, &(0x7f0000001700)) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 05:12:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)) 05:12:06 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x7fffffa7) open$dir(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x428480, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000)=0x100000, 0x100000008008) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:12:06 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0xffffffffffffff0d}, 0xffffff02) write$P9_RXATTRCREATE(r0, 0x0, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 05:12:06 executing program 1: capset(&(0x7f0000000c00)={0x20071026}, &(0x7f0000000080)) shmget(0x0, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil) 05:12:06 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) pipe2(&(0x7f0000000100), 0x0) [ 161.055862] audit: type=1800 audit(1568610726.226:40): pid=7150 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=3 res=0 [ 161.128185] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 05:12:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/59, 0x3b}], 0x2}}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f00000038c0)=""/56, 0x38}, {&(0x7f0000000000)=""/56, 0x38}, {&(0x7f0000003940)=""/95, 0x5f}, {0x0}, {&(0x7f0000003a00)=""/232, 0xe8}], 0x5}, 0xf3}], 0x2, 0x0, 0x0) [ 161.184029] audit: type=1804 audit(1568610726.276:41): pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir673416831/syzkaller.E4TNjM/8/file0/file0" dev="loop3" ino=3 res=1 [ 161.272880] audit: type=1800 audit(1568610726.286:42): pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=3 res=0 05:12:06 executing program 4: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = getpid() r3 = getpid() tgkill(r2, r3, 0x22) 05:12:06 executing program 2: timer_gettime(0x0, &(0x7f0000000280)) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000040)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}]) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80c00) r2 = socket$alg(0x26, 0x5, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/tcp6\x00') accept4$inet6(0xffffffffffffffff, &(0x7f0000001740)={0xa, 0x0, 0x0, @empty}, 0x0, 0xc1800) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) dup(0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) ftruncate(0xffffffffffffffff, 0x208200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x6, &(0x7f0000000080)="11dca50d0104cfe47bf0") getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, 0x0, &(0x7f0000001700)) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 05:12:06 executing program 2: timer_gettime(0x0, &(0x7f0000000280)) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000040)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}]) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80c00) r2 = socket$alg(0x26, 0x5, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/tcp6\x00') accept4$inet6(0xffffffffffffffff, &(0x7f0000001740)={0xa, 0x0, 0x0, @empty}, 0x0, 0xc1800) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) dup(0xffffffffffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) ftruncate(0xffffffffffffffff, 0x208200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x6, &(0x7f0000000080)="11dca50d0104cfe47bf0") getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, 0x0, &(0x7f0000001700)) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 05:12:07 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x7fffffa7) open$dir(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x428480, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000)=0x100000, 0x100000008008) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:12:07 executing program 5: prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) io_setup(0x7, &(0x7f0000000100)) 05:12:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000940), 0x24, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getuid() setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 161.813405] audit: type=1804 audit(1568610726.986:43): pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir673416831/syzkaller.E4TNjM/8/file0/file0" dev="loop3" ino=3 res=1 05:12:07 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x0, 0x800}}, 0x10) 05:12:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000200000000000000000000061127400000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 161.995388] audit: type=1804 audit(1568610726.996:44): pid=7192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir673416831/syzkaller.E4TNjM/8/file0/file0" dev="loop3" ino=3 res=1 05:12:07 executing program 2: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x1000002, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:12:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) gettid() sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x4000) 05:12:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000040)) 05:12:07 executing program 1: [ 162.170559] audit: type=1800 audit(1568610727.176:45): pid=7206 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=4 res=0 [ 162.280732] audit: type=1804 audit(1568610727.186:46): pid=7206 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir673416831/syzkaller.E4TNjM/9/file0/file0" dev="loop3" ino=4 res=1 [ 162.393573] audit: type=1800 audit(1568610727.186:47): pid=7206 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=4 res=0 05:12:07 executing program 4: 05:12:07 executing program 1: 05:12:07 executing program 5: [ 162.435122] audit: type=1400 audit(1568610727.216:48): avc: denied { create } for pid=7196 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:12:07 executing program 2: 05:12:07 executing program 3: 05:12:07 executing program 0: 05:12:07 executing program 5: 05:12:07 executing program 4: 05:12:07 executing program 1: 05:12:07 executing program 5: 05:12:07 executing program 2: 05:12:07 executing program 4: 05:12:08 executing program 1: 05:12:08 executing program 0: 05:12:08 executing program 2: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 4: 05:12:08 executing program 2: 05:12:08 executing program 1: 05:12:08 executing program 0: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 2: 05:12:08 executing program 1: 05:12:08 executing program 0: 05:12:08 executing program 4: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 1: 05:12:08 executing program 5: 05:12:08 executing program 0: 05:12:08 executing program 4: 05:12:08 executing program 2: 05:12:08 executing program 0: 05:12:08 executing program 5: 05:12:08 executing program 1: 05:12:08 executing program 4: 05:12:08 executing program 3: 05:12:08 executing program 2: 05:12:08 executing program 1: 05:12:08 executing program 0: 05:12:08 executing program 4: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 2: 05:12:08 executing program 0: 05:12:08 executing program 1: 05:12:08 executing program 4: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 2: 05:12:08 executing program 0: 05:12:08 executing program 1: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 4: 05:12:08 executing program 2: 05:12:08 executing program 0: 05:12:08 executing program 1: 05:12:08 executing program 2: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 0: 05:12:08 executing program 4: 05:12:08 executing program 1: 05:12:08 executing program 2: 05:12:08 executing program 5: 05:12:08 executing program 3: 05:12:08 executing program 0: 05:12:08 executing program 4: 05:12:08 executing program 1: 05:12:08 executing program 3: 05:12:09 executing program 5: 05:12:09 executing program 2: 05:12:09 executing program 0: 05:12:09 executing program 5: 05:12:09 executing program 1: 05:12:09 executing program 3: 05:12:09 executing program 4: 05:12:09 executing program 0: 05:12:09 executing program 2: 05:12:09 executing program 4: 05:12:09 executing program 3: 05:12:09 executing program 5: 05:12:09 executing program 1: 05:12:09 executing program 0: 05:12:09 executing program 4: 05:12:09 executing program 3: 05:12:09 executing program 2: 05:12:09 executing program 5: 05:12:09 executing program 4: 05:12:09 executing program 1: 05:12:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 05:12:09 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:12:09 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r2 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r1, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) dup3(r2, r1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20200030}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x732b5d7f1207096a}, 0x20000000) 05:12:09 executing program 5: 05:12:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x9) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000040)="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", 0x12c}], 0x1) 05:12:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x9, 0x100000001, 0x81, 0x5c4, 0x0, 0x1ff}}, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x10000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r4, @ANYBLOB="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"/409], 0x74}}, 0x0) 05:12:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x40, 0xab, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000040000002800000850000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) close(r3) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f0000000280)='GPL\x00', 0x1, 0x217, &(0x7f00000004c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x10c}, 0x48) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7, 0x200440) 05:12:09 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r1, r0, 0x0, 0x72439a6b) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r3, r2, 0x0, 0x72439a6b) setsockopt$inet6_opts(r2, 0x29, 0x3a, &(0x7f0000000140)=@routing={0x15, 0x14, 0x0, 0x6, 0x0, [@empty, @ipv4={[], [], @empty}, @empty, @mcast1, @empty, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @local, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0xa8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4500, 0x0) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000000)={0x2}) 05:12:09 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, r2) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r3, 0x0, 0x72439a6b) bind$bt_rfcomm(r4, &(0x7f0000000140)={0x1f, {0x8, 0x81, 0x0, 0xffffffffffffffc1, 0x6, 0x2713}, 0x8}, 0xa) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x2, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec", 0x2}, {0x2, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40000000000000}, r6}}, 0x48) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r9 = socket(0x2, 0x803, 0xff) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) sendfile(r10, r8, 0x0, 0x5) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r8, 0xc0305615, &(0x7f00000002c0)={0x0, {0xfffffffffffffffa, 0x5ada}}) r11 = socket(0x2, 0x803, 0xff) connect$inet(r11, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r11, r7, 0x0, 0x72439a6b) setsockopt$packet_rx_ring(r11, 0x107, 0x5, &(0x7f0000000040)=@req={0xfffffffffffffff7, 0xfd, 0x4, 0x7ff}, 0xfffffffffffffca8) 05:12:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)={r2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000440)="a087e6c2830bb3ee77c0432191d8552b336bd21ed133d65b842e08e4ccaa11c0dd191a6838726fda6d3689c64b35cfaa8780a935bb359eda9213dc4ac66b99fb4cf84ffc954cd4919200eddc17ce0f622e6bee9104004f41485866c5c3c8cb97c93098cb2f72dfee5ec780ba6409942e27381c9427772665f7c4cfc98e837f4c07902d9eabfd36ebf54055b818b03868af0c411e40d9061ab1d5662b4942337b096ee998731d3e10643c8154d8a210aa4a5503e655f56715094e236460bd5e92312653f3ef65116643c378aee6d196a671786bceeadc76", &(0x7f00000000c0)="04", 0x2}, 0xfffffffffffffe54) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000780)=0x1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000180)='selfvboxnet1ppp0wlan0\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='lo-})\x00', &(0x7f0000000240)='\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='\x00']) open$dir(&(0x7f00000009c0)='./file0\x00', 0x400, 0x8) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r6 = socket(0x2, 0x803, 0xff) r7 = accept4$x25(0xffffffffffffffff, &(0x7f0000000680)={0x9, @remote}, &(0x7f00000006c0)=0x12, 0x80000) getsockopt$IP_VS_SO_GET_VERSION(r7, 0x0, 0x480, &(0x7f0000000700), &(0x7f0000000740)=0x40) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r6, r5, 0x0, 0x72439a6b) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000400)={0xe3, 0x200, 0x7, 0x72, &(0x7f0000000380)=""/114, 0x5b, &(0x7f0000000540)=""/91, 0xb9, &(0x7f00000005c0)=""/185}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r11 = socket(0x2, 0x803, 0xff) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f0000000940)={&(0x7f0000000840)={0xe8, r12, 0x2, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x28}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x77}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xce}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x30}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0xa258e26f9adf10c5}, 0x44040) connect$inet(r11, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r11, r10, 0x0, 0x72439a6b) setns(r10, 0x4000000) dup2(r4, r3) 05:12:09 executing program 4: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000001c0)={0x10000, 0x0, 0x40, 0x4, 0x1}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="d3aaffae741a32f50378452634721df90ca2c482fdc0751cca0c8a732c8e91") syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x8000000000, 0xffffffffffffff9c, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3800000010000105000000000000000000000000891b2a5df9cd746ff7a84fec91c22697d619c0f617c09303e9ce85fe4a64611f1b93dd866dda323e9d359ce6d98db8667f209471d67b289416c08bb1b9b419aac74bb3b8f4549f224846173811a616a48012750ee6a37eed6c7e3fd188089b3e12a095fa61b034a3c962b9350160f0db6e1f7b41011fe7acfbca71c8d1dc1b080dd9c333a107d41e8491fce08f61b58303486944ec99c2842f4bd0d38a7f61c844b0410bfec191e925c054685eae44c660dbe841dac88368018a2f96a930eb0206a6c205", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100767469000c0002000800060000000000"], 0x38}}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r5) perf_event_open(&(0x7f0000000040)={0xe17186febce1f3f6, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x81}, 0x0, 0xf, r4, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0xfffffe38) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0xd78, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, 0x0, [0x8e3, 0x9, 0x9, 0x9389, 0x0, 0x5, 0x0, 0x2]}, 0x5c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0xf3, 0x0, 0xff, 0xb}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(r6, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r7, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000000c0)=0x2) 05:12:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x110, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)) fchdir(r0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000440)=ANY=[], 0x208) sendfile(r3, r3, &(0x7f0000000000), 0x0) 05:12:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040), 0x12f9df) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x80c, r0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x3, 0x0, [0x0, 0x20001400, 0x20001556, 0x20001586], 0x0, 0x0, 0x0}, 0x78) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)) tkill(r1, 0x10010000000032) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 05:12:09 executing program 1: socket$inet6(0x10, 0x8080e, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800000010000105000000000000000000000000fdfcf87f7f84fd2c0f5ebca305afb0e476", @ANYRES32=0x0, @ANYBLOB="0000000000001800020008000100767469000c0402000800f70000000000"], 0x3}}, 0x4000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xffffffffffffff97, &(0x7f0000000480), 0xfec, 0x0, 0xfffffee3}, 0x4000041) [ 164.570884] kvm: emulating exchange as write [ 164.658248] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 164.766664] kauditd_printk_skb: 2 callbacks suppressed [ 164.766673] audit: type=1804 audit(1568610729.936:51): pid=7470 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir419745234/syzkaller.wPelJQ/29/bus" dev="sda1" ino=16587 res=1 05:12:10 executing program 0: r0 = creat(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = creat(&(0x7f0000000540)='./file0\x00', 0x0) write$P9_RAUTH(r1, &(0x7f0000000100)={0xffffffffffffffd2}, 0x14) fallocate(r1, 0x11, 0x0, 0x7ff800000) fallocate(r0, 0x20, 0x0, 0x7ff800000) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000140)={0x200, 0x2, 0x10000, 0x0, [], [], [], 0x20, 0x1, 0x665c, 0x2, "487b2b46b2219ca0d052f978dfd78e6b"}) 05:12:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x3, &(0x7f0000cf6fe4), 0x6) 05:12:10 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070c2f52245c6f3e76d2fc19dc1021820d8a33d8c26a6f3") r2 = dup(r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x150, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r4, r3, 0x0, 0x72439a6b) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0bdd148e402f2a14383aa89763a266feece4794304d5bac102bb75890641aefb5ff5daa5a1f0c43545bb5e705adade594c08c1cf739921ce6e7cfbb471cdcd816d21127b78ae56c9fb1a7c46c93087bb8e2e382767530e6425df26e80703ac3e1d83e1fac9188c4754"], 0x1}}, 0x400c0c0) setsockopt$inet_tcp_int(r2, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r5 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac"], 0x1) ftruncate(r5, 0x10099b7) sendfile(r0, r5, 0x0, 0x88000fc000000) socket$bt_rfcomm(0x1f, 0x1, 0x3) 05:12:10 executing program 3: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, 0x0) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x4000000) set_thread_area(0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0xffff, 0x42e6, 0x3f, 0x2198fce8}, {0x0, 0x3cea, 0x9, 0x5}]}) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x27, 0x414dc23ba9de9f85) ioctl$BLKFRASET(r4, 0x1264, &(0x7f0000000080)=0x101) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x2, 0x4e23, @rand_addr=0x8}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000140)="ef73e01e483675c0b5c916d8fc9ad179e0ba6cae2e0134712508293f0b9bef497450f7e5efc4ae54e270dbb653c5db699077e9706d4cedaf8a156b4db190cbf2790832dc2e63a8b2b7a85b4ca3948740", 0x50}, {&(0x7f0000000900)="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", 0x111}, {&(0x7f00000004c0)="8f729939320fd90f9eb7d04227a96ec37b173c98b093136025b4915a189cda160a5bcc151ff6bca3fb3c16530e6e3ce1645c5b3e2e6e728e6644ed7f527b113c21a7ef532d11a5e642af84119a0b79bb74b21cfc413ace4d468d3f32c692f6641cee17008cca456cd73f57a62f56b50eead196cf6181ce72918354c8ce3dd22668e87b168bd9", 0x86}, {&(0x7f0000000240)="8edf1056daf67db30732e9d0682a41e20d4c4987b7c053", 0x17}], 0x4}, 0x80) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r5, 0x100, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000006502000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001ffffffd404000020000000b7050000230000006a0a00fe000000008500000017000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="000f6c0761cfd1deda046b5b2558", 0x0}, 0x28) sendto$inet(r3, &(0x7f0000000740)="566e8ae8341d552814c1bd716122204b82b83b886ce69697ab658da0c333ffe302d406d2d9", 0x25, 0x2004c0c0, &(0x7f0000000780)={0x2, 0x4e24, @multicast2}, 0x10) 05:12:10 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="441f4f01000000e8c94efd6491ee549c0eebbd51b95b4ae9b1857ecb46", 0x1d) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) ioctl$TIOCSCTTY(r1, 0x540e, 0x2) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r4 = socket(0x2, 0x803, 0xff) sendfile(r4, r3, 0x0, 0x72439a6b) getsockopt$inet_opts(r4, 0x0, 0x4, 0x0, &(0x7f0000000000)=0x4a) 05:12:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) lookup_dcookie(0x0, &(0x7f0000000000)=""/186, 0xba) exit(0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) sendfile(r3, r2, 0x0, 0x200000051f) 05:12:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000000)={0x6, 0x0, [0x0, 0x3ff, 0x7, 0xffff, 0x82]}) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(0x0, 0x0, 0x0) ftruncate(r4, 0x200004) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x1180, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140)={r6}, &(0x7f0000000240)=0x8) r7 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x80400, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r7, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x100, {0x1, 0x2, 0x4}, 0x106, r8, r9, 0x0, 0x3, 0xb9, 0x8, 0x8, 0xda, 0xe3, 0x5, 0x3, 0xfa, 0xffffffffffff81b0, 0x7fffffff, 0xff, 0x0, 0x8}}, 0xa0) ioctl$SIOCAX25DELUID(r4, 0x89e2, &(0x7f0000000040)={0x3, @default}) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r10 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES32=0x0], &(0x7f000095dffc)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r11}, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 165.179145] kasan: CONFIG_KASAN_INLINE enabled [ 165.187550] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 165.225028] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 165.231289] Modules linked in: [ 165.234494] CPU: 1 PID: 7489 Comm: syz-executor.1 Not tainted 4.14.143 #0 [ 165.241417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.250773] task: ffff888087b0c000 task.stack: ffff8880580f8000 [ 165.256837] RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 [ 165.261930] RSP: 0018:ffff8880580ff6b0 EFLAGS: 00010202 [ 165.267285] RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc90008a5b000 05:12:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4c00, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x101000, 0x0) r4 = socket(0x3, 0x80004, 0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x200100, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r12 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) ioctl$SIOCAX25GETUID(r12, 0x89e0, &(0x7f0000000400)={0x3, @bcast, r13}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000640)=0xe8) getresgid(&(0x7f0000000c00)=0x0, 0x0, &(0x7f0000000c80)) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6}, {0x2, 0x5, r14}, {0x2, 0x0, r15}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x6}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x4, r16}], {0x10, 0x2}, {0x20, 0x1}}, 0x64, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r18 = socket$unix(0x1, 0x5, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r19, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="bf286e123411a996f32bccaf0fc82e22bf9bf89ea2a67ceefc6e9af07e5241bad34e80aa38179cf6c44e7148c549dc86e272bcbfcecf63f6d88f154706dda6174bafe021cbc7bd974b7ca3d7acbee6e2781256f0eb418a84ee987b27392ebdca254a7543006d5820a94c60866da3b896f54b3821adce95aaea2ba1a074f7e697e846621162fd760b46ed782a2eadddc79bfc70f66b8557d97d8e0579bb4b52cd3ff6", 0xa2}], 0x1, &(0x7f0000000440)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r3, r0, r4, 0xffffffffffffffff, r5, r6, r0]}}, @rights={{0x28, 0x1, 0x1, [r7, r0, r8, r9, r10, r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r16}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r17, r18, r0, 0xffffffffffffffff, r19, r20, r0, r0]}}], 0xb0, 0x4040008}, 0x4000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r21, 0x3f}, &(0x7f00000001c0)=0x8) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x8d61bde60e7ac619, 0x1) [ 165.274578] RDX: 0000000000006e93 RSI: ffffffff8523f03b RDI: 0000000000000080 [ 165.281845] RBP: ffff8880580ff7d8 R08: ffff888087b0c000 R09: 0000000000000001 [ 165.289124] R10: 0000000000000000 R11: ffff888087b0c000 R12: 0000000000005580 [ 165.296389] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88808844e080 [ 165.303664] FS: 00007ff94c1c6700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 165.311888] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.317768] CR2: 0000001b30d24000 CR3: 000000008c55a000 CR4: 00000000001406e0 [ 165.325038] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.332305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.339571] Call Trace: [ 165.342165] ? lock_sock_nested+0x9e/0x110 [ 165.346406] ? sk_stream_alloc_skb+0x780/0x780 [ 165.350997] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 165.356395] tcp_sendpage_locked+0x88/0x140 [ 165.360722] tcp_sendpage+0x3f/0x60 [ 165.364387] inet_sendpage+0x157/0x580 [ 165.368283] ? tcp_sendpage_locked+0x140/0x140 [ 165.372874] kernel_sendpage+0x92/0xf0 [ 165.376766] ? inet_sendmsg+0x500/0x500 [ 165.380746] sock_sendpage+0x8b/0xc0 [ 165.384469] ? kernel_sendpage+0xf0/0xf0 [ 165.388537] pipe_to_sendpage+0x242/0x340 [ 165.392696] ? direct_splice_actor+0x190/0x190 [ 165.397291] __splice_from_pipe+0x348/0x780 [ 165.401619] ? direct_splice_actor+0x190/0x190 [ 165.406209] ? direct_splice_actor+0x190/0x190 [ 165.410817] splice_from_pipe+0xf0/0x150 [ 165.414881] ? splice_shrink_spd+0xb0/0xb0 [ 165.419228] generic_splice_sendpage+0x3c/0x50 [ 165.423811] ? splice_from_pipe+0x150/0x150 [ 165.428142] direct_splice_actor+0x123/0x190 [ 165.432555] splice_direct_to_actor+0x29e/0x7b0 [ 165.437224] ? generic_pipe_buf_nosteal+0x10/0x10 [ 165.442074] ? do_splice_to+0x170/0x170 [ 165.446050] ? rw_verify_area+0xea/0x2b0 [ 165.450110] do_splice_direct+0x18d/0x230 [ 165.454261] ? splice_direct_to_actor+0x7b0/0x7b0 [ 165.459106] ? rw_verify_area+0xea/0x2b0 [ 165.463189] do_sendfile+0x4db/0xbd0 [ 165.466911] ? do_compat_pwritev64+0x140/0x140 [ 165.471495] ? put_timespec64+0xb4/0x100 [ 165.475562] ? nsecs_to_jiffies+0x30/0x30 [ 165.477486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7502 comm=syz-executor.0 [ 165.479712] SyS_sendfile64+0x102/0x110 [ 165.479719] ? SyS_sendfile+0x130/0x130 [ 165.479733] ? do_syscall_64+0x53/0x640 [ 165.503603] ? SyS_sendfile+0x130/0x130 [ 165.507592] do_syscall_64+0x1e8/0x640 [ 165.511482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 165.516328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 165.521514] RIP: 0033:0x4598e9 05:12:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4c00, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r1, 0x0, 0x72439a6b) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x101000, 0x0) r4 = socket(0x3, 0x80004, 0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x200100, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r12 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) ioctl$SIOCAX25GETUID(r12, 0x89e0, &(0x7f0000000400)={0x3, @bcast, r13}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000640)=0xe8) getresgid(&(0x7f0000000c00)=0x0, 0x0, &(0x7f0000000c80)) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000cc0)={{}, {0x1, 0x1}, [{0x2, 0x6}, {0x2, 0x5, r14}, {0x2, 0x0, r15}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x6}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x4, r16}], {0x10, 0x2}, {0x20, 0x1}}, 0x64, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r18 = socket$unix(0x1, 0x5, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r19, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r20, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="bf286e123411a996f32bccaf0fc82e22bf9bf89ea2a67ceefc6e9af07e5241bad34e80aa38179cf6c44e7148c549dc86e272bcbfcecf63f6d88f154706dda6174bafe021cbc7bd974b7ca3d7acbee6e2781256f0eb418a84ee987b27392ebdca254a7543006d5820a94c60866da3b896f54b3821adce95aaea2ba1a074f7e697e846621162fd760b46ed782a2eadddc79bfc70f66b8557d97d8e0579bb4b52cd3ff6", 0xa2}], 0x1, &(0x7f0000000440)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r3, r0, r4, 0xffffffffffffffff, r5, r6, r0]}}, @rights={{0x28, 0x1, 0x1, [r7, r0, r8, r9, r10, r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r16}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r17, r18, r0, 0xffffffffffffffff, r19, r20, r0, r0]}}], 0xb0, 0x4040008}, 0x4000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r21, 0x3f}, &(0x7f00000001c0)=0x8) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x8d61bde60e7ac619, 0x1) 05:12:10 executing program 3: lstat(0x0, 0x0) setgid(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r1, r0, 0x0, 0x72439a6b) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r3, r2, 0x0, 0x72439a6b) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) openat$usbmon(0xffffffffffffff9c, 0x0, 0x311000, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x481, 0x80, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r6 = socket(0x2, 0x803, 0xff) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r6, r5, 0x0, 0x72439a6b) getsockname$tipc(r6, &(0x7f0000000080), &(0x7f00000000c0)=0x10) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000100)) request_key(0x0, 0x0, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x4612}) set_tid_address(&(0x7f0000000040)) [ 165.524700] RSP: 002b:00007ff94c1c5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 165.532407] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 165.539673] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 165.546943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.554217] R10: 00088000fc000000 R11: 0000000000000246 R12: 00007ff94c1c66d4 [ 165.561501] R13: 00000000004c709e R14: 00000000004dc750 R15: 00000000ffffffff [ 165.568779] Code: ff ff 48 0f 44 d8 e8 43 f2 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 35 f2 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 [ 165.587986] RIP: do_tcp_sendpages+0x33d/0x18f0 RSP: ffff8880580ff6b0 [ 165.613337] ---[ end trace 6d62452832a7ec4b ]--- [ 165.620996] Kernel panic - not syncing: Fatal exception [ 165.628009] Kernel Offset: disabled [ 165.631657] Rebooting in 86400 seconds..