[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.563140] random: sshd: uninitialized urandom read (32 bytes read) [ 33.809790] kauditd_printk_skb: 9 callbacks suppressed [ 33.809797] audit: type=1400 audit(1574867684.322:35): avc: denied { map } for pid=6823 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.886668] random: sshd: uninitialized urandom read (32 bytes read) [ 34.489094] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. [ 40.117888] random: sshd: uninitialized urandom read (32 bytes read) 2019/11/27 15:14:50 fuzzer started [ 40.309483] audit: type=1400 audit(1574867690.822:36): avc: denied { map } for pid=6833 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16480 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.847108] random: cc1: uninitialized urandom read (8 bytes read) 2019/11/27 15:14:52 dialing manager at 10.128.0.105:46411 2019/11/27 15:14:52 syscalls: 2529 2019/11/27 15:14:52 code coverage: enabled 2019/11/27 15:14:52 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/11/27 15:14:52 extra coverage: extra coverage is not supported by the kernel 2019/11/27 15:14:52 setuid sandbox: enabled 2019/11/27 15:14:52 namespace sandbox: enabled 2019/11/27 15:14:52 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/27 15:14:52 fault injection: enabled 2019/11/27 15:14:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/27 15:14:52 net packet injection: enabled 2019/11/27 15:14:52 net device setup: enabled 2019/11/27 15:14:52 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/27 15:14:52 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 42.682478] random: crng init done [ 171.376830] audit: type=1400 audit(1574867821.892:37): avc: denied { map } for pid=6851 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:18:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x368, &(0x7f0000000300)=[{&(0x7f0000000040)=""/249, 0xdf}], 0x8, 0x0, 0x23c}, 0x0) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001780)=""/4096, 0x1000}], 0x1}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) poll(0x0, 0x0, 0x4e) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x100000211, 0x0, 0x0, 0x800e00706) r7 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f0000000000)=[{r7, 0x4}], 0x1, 0x0) ppoll(&(0x7f0000000040)=[{r7}], 0x1, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 15:18:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x368, &(0x7f0000000300)=[{&(0x7f0000000040)=""/249, 0xdf}], 0x8, 0x0, 0x23c}, 0x0) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001780)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000000840)=[{0x0}, {&(0x7f0000000540)=""/58, 0x3a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r5, 0x0) shutdown(r2, 0x0) 15:18:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x7002, 0x0) 15:18:42 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000180)={0x53, 0xffffffff, 0x13, 0x0, @buffer={0x0, 0x20, &(0x7f0000000200)=""/45}, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 15:18:42 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) fcntl$setlease(r0, 0x400, 0x3) 15:18:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000440)="32290a18acf45860d24db41e17204c30", 0x10) [ 272.082702] audit: type=1400 audit(1574867922.602:38): avc: denied { map } for pid=6853 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1130 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 272.450925] IPVS: ftp: loaded support on port[0] = 21 [ 273.488525] chnl_net:caif_netlink_parms(): no params data found [ 273.496730] IPVS: ftp: loaded support on port[0] = 21 [ 273.529770] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.536529] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.543548] device bridge_slave_0 entered promiscuous mode [ 273.550691] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.557049] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.563975] device bridge_slave_1 entered promiscuous mode [ 273.585248] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.596050] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 273.618870] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 273.627535] team0: Port device team_slave_0 added [ 273.634900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 273.642172] team0: Port device team_slave_1 added [ 273.649289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 273.658433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 273.672849] IPVS: ftp: loaded support on port[0] = 21 [ 273.732208] device hsr_slave_0 entered promiscuous mode [ 273.800312] device hsr_slave_1 entered promiscuous mode [ 273.850926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 273.858185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 273.916808] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.923279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.930116] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.936465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.962251] IPVS: ftp: loaded support on port[0] = 21 [ 274.015864] chnl_net:caif_netlink_parms(): no params data found [ 274.029959] chnl_net:caif_netlink_parms(): no params data found [ 274.087543] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.094197] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.101573] device bridge_slave_0 entered promiscuous mode [ 274.109685] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.117024] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.123948] device bridge_slave_1 entered promiscuous mode [ 274.151900] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.158301] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.165581] device bridge_slave_0 entered promiscuous mode [ 274.174646] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.181098] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.188056] device bridge_slave_1 entered promiscuous mode [ 274.206858] IPVS: ftp: loaded support on port[0] = 21 [ 274.222618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 274.246164] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 274.255466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.279127] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.286309] team0: Port device team_slave_0 added [ 274.292353] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.300277] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.307714] team0: Port device team_slave_1 added [ 274.314003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.321880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.386339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.393689] team0: Port device team_slave_0 added [ 274.431977] device hsr_slave_0 entered promiscuous mode [ 274.471259] device hsr_slave_1 entered promiscuous mode [ 274.512564] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 274.526090] chnl_net:caif_netlink_parms(): no params data found [ 274.534624] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.541994] team0: Port device team_slave_1 added [ 274.547710] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.554548] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.566584] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 274.578033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.585572] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.593184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.613867] IPVS: ftp: loaded support on port[0] = 21 [ 274.629682] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 274.642203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 274.692890] device hsr_slave_0 entered promiscuous mode [ 274.740419] device hsr_slave_1 entered promiscuous mode [ 274.822919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 274.833634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 274.852833] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 274.869821] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.877154] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.884655] device bridge_slave_0 entered promiscuous mode [ 274.901139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.908462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.917216] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 274.923464] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.936569] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 274.943493] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.950988] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.957788] device bridge_slave_1 entered promiscuous mode [ 274.982401] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.021531] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.046451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 275.056476] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.063856] team0: Port device team_slave_0 added [ 275.071765] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 275.078807] team0: Port device team_slave_1 added [ 275.085267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.095209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.102937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.110712] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.117069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.126959] chnl_net:caif_netlink_parms(): no params data found [ 275.152526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 275.160348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 275.186568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.194446] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.202039] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.208366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.275601] device hsr_slave_0 entered promiscuous mode [ 275.320415] device hsr_slave_1 entered promiscuous mode [ 275.377616] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.384054] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.391283] device bridge_slave_0 entered promiscuous mode [ 275.397998] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.404406] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.412400] device bridge_slave_1 entered promiscuous mode [ 275.423574] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 275.431756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 275.438761] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 275.491770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.502578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 275.514624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.525227] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.534413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.544009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 275.561016] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 275.572345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.580914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.588730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.596886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.604567] chnl_net:caif_netlink_parms(): no params data found [ 275.627778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.636658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.643984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 275.656416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.664041] team0: Port device team_slave_0 added [ 275.669628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 275.677474] team0: Port device team_slave_1 added [ 275.684088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.692132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.701328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 275.709560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 275.721771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.729296] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.737516] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.744835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.754254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.761992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.769363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.776896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.783746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.792107] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 275.798094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.805897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 275.815540] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.823444] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 275.829588] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.839783] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 275.854077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.861608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.868404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.876235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.884024] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.890394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.914964] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 275.923166] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 275.942363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.949390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.956456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.994242] device hsr_slave_0 entered promiscuous mode [ 276.030583] device hsr_slave_1 entered promiscuous mode [ 276.072493] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 276.078618] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.086369] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.095274] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.102551] device bridge_slave_0 entered promiscuous mode [ 276.110807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 276.117803] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.124292] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.131402] device bridge_slave_1 entered promiscuous mode [ 276.142688] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 276.151972] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 276.165344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.173184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.180928] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.187271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.195847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 276.210232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 276.220636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.227790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.237228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.245012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.253209] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.259539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.266548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.276944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 276.286907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.298045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.311965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 276.320404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.329126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 276.339449] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.349188] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 276.362547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.370840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.378470] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.384855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.394325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 276.411801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 276.418829] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.426648] team0: Port device team_slave_0 added [ 276.433951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.443139] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 276.449245] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.455702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.467332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.475158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.483016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.489804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.497466] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.505313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.512516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.519554] team0: Port device team_slave_1 added [ 276.525606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 276.533266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 276.543501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 276.556382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.564819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.572973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.580873] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.587319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.594906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.619911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 276.630562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 276.638084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 276.647030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.655015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.663244] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.669570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.676456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.684432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.691970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.699486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.707381] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.727915] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 276.738474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 276.749919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 276.812184] device hsr_slave_0 entered promiscuous mode [ 276.860416] device hsr_slave_1 entered promiscuous mode [ 276.920525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.928346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.936089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.943852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.951769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.962189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 276.973797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 276.982150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 276.990702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.999908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 277.007446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.015027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.022845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.030663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.038052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.046107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.054274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.066635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 15:18:47 executing program 2: clone(0x8300a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781600472c932627940000fffffff82000"], 0x20) [ 277.078137] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 277.086440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.097597] SELinux: policydb version 742850582 does not match my version range 15-31 [ 277.104801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 277.108742] SELinux: failed to load policy 15:18:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/41, 0x29}], 0x1, 0x6) [ 277.122353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 277.132049] SELinux: policydb version 742850582 does not match my version range 15-31 [ 277.140968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.147885] SELinux: failed to load policy [ 277.148052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.160863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:18:47 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r1, 0xe4f89a1c0abbe289}, 0x14}}, 0x0) [ 277.175259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.188672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.198779] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 277.205885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.221587] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 277.229740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 277.256373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pig=6908 comm=syz-executor.2 [ 277.257774] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 277.275327] audit: type=1400 audit(1574867927.772:39): avc: denied { create } for pid=6907 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.281946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.309024] audit: type=1400 audit(1574867927.772:40): avc: denied { write } for pid=6907 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.334711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.335931] audit: type=1400 audit(1574867927.772:41): avc: denied { read } for pid=6907 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.342554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.377242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 277.392431] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 277.399359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.407748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.415993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.423376] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.432124] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 277.439812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.451550] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 277.461252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 277.475181] 8021q: adding VLAN 0 to HW filter on device batadv0 15:18:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d49", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 277.488072] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.496841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.514466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.530296] 8021q: adding VLAN 0 to HW filter on device batadv0 15:18:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x1, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') [ 277.542951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 277.553341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.565053] ptrace attach of "/root/syz-executor.2"[6912] was attempted by "/root/syz-executor.2"[6916] [ 277.565164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.602047] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 277.627051] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 277.635851] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.650093] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 277.661964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.669415] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.681976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 277.719637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 277.732660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.746402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.754611] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.760999] bridge0: port 1(bridge_slave_0) entered forwarding state 15:18:48 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) [ 277.765474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.788632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.802852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 277.811012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.821796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.831134] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.837495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.847511] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.869113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 277.891018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.901896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 277.926173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 277.953652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.962327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.973745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.987602] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 277.994089] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.007860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 278.015642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.028184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.036593] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.050818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.062460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 278.074002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.084350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.093606] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.100011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.112118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.119919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.129769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.143639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 278.151987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.161086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.168647] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.175045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.185408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 278.192750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.200987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.211432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 278.219492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.234273] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 278.241116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.249649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 278.259509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.267337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.275332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.287302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 278.294950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.304635] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 278.314489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 278.321779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.329831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.338119] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.347191] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 278.359089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 278.366681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.374540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.381312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.389016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.404806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.412401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 278.424562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.433003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.445840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 278.455210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.464023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.474984] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 278.482687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.500684] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 278.508148] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 278.516042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.523842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.535103] 8021q: adding VLAN 0 to HW filter on device batadv0 15:18:49 executing program 0: 15:18:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/207, 0xcf}], 0x1, 0x6) 15:18:49 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:49 executing program 3: 15:18:50 executing program 4: 15:18:50 executing program 1: 15:18:50 executing program 3: 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:50 executing program 0: 15:18:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36", 0x2e}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 15:18:50 executing program 1: 15:18:50 executing program 0: 15:18:50 executing program 3: 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:50 executing program 4: 15:18:50 executing program 1: [ 279.718771] ptrace attach of "/root/syz-executor.5"[7010] was attempted by "/root/syz-executor.5"[7012] 15:18:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000a40)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@loopback]}]}}}], 0x14}, 0x0) 15:18:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8913, &(0x7f0000000000)={'lo\x00'}) 15:18:50 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x1f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/12, 0x4) 15:18:50 executing program 4: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f30501000a000200020423dcffdf00", 0x1f) 15:18:50 executing program 5: 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') renameat2(0xffffffffffffffff, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:50 executing program 1: 15:18:50 executing program 3: 15:18:50 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x1f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/12, 0x4) 15:18:50 executing program 5: [ 279.912442] audit: type=1400 audit(1574867930.432:42): avc: denied { create } for pid=7037 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:18:50 executing program 1: 15:18:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@IFLA_GRE_REMOTE={0x8}, @IFLA_GRE_LOCAL={0x8}]}}}]}, 0x40}}, 0x0) 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') renameat2(0xffffffffffffffff, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-128((\x02\x00'}, 0x58) 15:18:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x1c01}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\r\xc2\x00\t\x00\x00\x00\x80\x00'}) 15:18:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x6f7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r3}]]}}}]}, 0x38}}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x317) 15:18:50 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) recvmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000000300)=""/28, 0x1c}], 0x1, &(0x7f0000001cc0)=""/214, 0xd6}, 0x18002) 15:18:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') renameat2(0xffffffffffffffff, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) [ 280.074432] audit: type=1400 audit(1574867930.482:43): avc: denied { write } for pid=7037 comm="syz-executor.4" path="socket:[25582]" dev="sockfs" ino=25582 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:18:50 executing program 4: 15:18:50 executing program 1: 15:18:50 executing program 0: 15:18:50 executing program 3: socket(0x9, 0x0, 0x0) 15:18:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:50 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 15:18:50 executing program 1: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x64) [ 280.292572] hrtimer: interrupt took 45381 ns 15:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @mss, @window, @sack_perm], 0x20000000000001ce) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff}, 0x14) shutdown(r2, 0x1) 15:18:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x3f000000, 0x0, 0x0, 0x0, 0x30d}, 0x9c) 15:18:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) [ 280.374247] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:18:50 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, r3) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff83, 0x0, 0x0, 0xfffffffffffffe6d) 15:18:50 executing program 0: mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 15:18:51 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000540), 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) open(0x0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x1b6) dup2(r2, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) 15:18:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, 0x0, 0x0) 15:18:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) 15:18:51 executing program 1: modify_ldt$write(0x1, &(0x7f0000000000)={0xffffff01}, 0x10) [ 280.723010] protocol 88fb is buggy, dev hsr_slave_0 [ 280.728906] protocol 88fb is buggy, dev hsr_slave_1 15:18:51 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x174, 0x0, 0x4, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8e}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7f, @dev={0xfe, 0x80, [], 0x27}, 0xfff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x33a2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5e6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x6, @rand_addr="e8b5b3b118887ac150103000bbfbda6f", 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf79f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}]}]}, 0x174}, 0x1, 0x0, 0x0, 0xc000}, 0x1) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 15:18:51 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 15:18:51 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvfrom$packet(r0, 0x0, 0x0, 0x22, 0x0, 0x0) 15:18:51 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 15:18:51 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{&(0x7f0000000180), 0x80, 0x0, 0x0, &(0x7f0000000840)=""/161, 0xa1}, 0x8}, {{&(0x7f0000000900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a80)=""/168, 0xa8}], 0x1}, 0x200}, {{&(0x7f0000000c80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000d00)=""/5, 0x5}], 0x1, &(0x7f0000000d80)=""/247, 0xf7}, 0xffff}, {{&(0x7f0000000e80)=@hci, 0x80, 0x0}, 0x6000000}, {{&(0x7f0000001680)=@hci, 0x80, 0x0, 0x0, &(0x7f0000002a80)=""/56, 0x38}, 0x80}, {{&(0x7f0000002ac0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)}, 0x5}, {{&(0x7f0000002bc0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002c40)=""/161, 0xa1}], 0x1, &(0x7f0000002d40)=""/73, 0x49}, 0xffffa47d}, {{&(0x7f0000002dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e40)=""/102, 0x66}, {&(0x7f0000002ec0)=""/28, 0x1c}, {0x0}], 0x3}, 0x10001}, {{&(0x7f0000003040)=@rc, 0x80, &(0x7f0000003500)=[{&(0x7f0000003100)=""/72, 0x48}, {0x0}, {&(0x7f00000031c0)=""/236, 0xec}, {&(0x7f00000032c0)=""/28, 0x1c}, {&(0x7f0000003300)=""/201, 0xc9}, {0x0}], 0x6, &(0x7f0000003580)=""/160, 0xa0}}], 0x9, 0x40020061, 0x0) creat(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getpeername(r3, 0x0, &(0x7f0000004cc0)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000004d00)={'filter\x00'}, &(0x7f0000004d80)=0x78) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 15:18:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x14) [ 280.960122] protocol 88fb is buggy, dev hsr_slave_0 [ 280.965285] protocol 88fb is buggy, dev hsr_slave_1 [ 281.091292] print_req_error: I/O error, dev loop0, sector 0 [ 281.176649] audit: type=1800 audit(1574867931.692:44): pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16567 res=0 [ 281.215676] print_req_error: I/O error, dev loop0, sector 144 [ 281.221990] Buffer I/O error on dev loop0, logical block 18, async page read [ 281.238764] audit: type=1800 audit(1574867931.752:45): pid=7182 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16567 res=0 15:18:51 executing program 3: getpid() syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000500)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{r3, r4+30000000}, {r5}}, 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r8 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(r8, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r8, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = dup3(r9, r10, 0x80000) sendto$inet(r11, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 15:18:52 executing program 0: socketpair(0x14, 0x0, 0x0, &(0x7f0000000180)) 15:18:52 executing program 4: getpid() syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_gettime(0x0, &(0x7f0000000440)={0x0}) clock_gettime(0x0, &(0x7f0000000500)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{r3}, {r4}}, 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r7 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(r7, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r7, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = dup3(r8, r9, 0x80000) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 15:18:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:52 executing program 5: getpid() syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{r3, r4+30000000}}, 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r7 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(r7, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r7, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r8 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r9) openat$cgroup_type(r9, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x100}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={r10, 0x5}, &(0x7f0000000340)=0x8) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) add_key(&(0x7f0000000240)='big_key\x00', 0x0, &(0x7f0000000380)="4fadf2", 0x3, 0x0) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 15:18:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003640)=[{{&(0x7f0000000180), 0x80, 0x0, 0x0, &(0x7f0000000840)=""/161, 0xa1}, 0x8}, {{&(0x7f0000000900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a80)=""/168, 0xa8}], 0x1}, 0x200}, {{&(0x7f0000000c80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000d00)=""/5, 0x5}], 0x1, &(0x7f0000000d80)=""/247, 0xf7}, 0xffff}, {{&(0x7f0000000e80)=@hci, 0x80, 0x0}, 0x6000000}, {{&(0x7f0000001680)=@hci, 0x80, 0x0, 0x0, &(0x7f0000002a80)=""/56, 0x38}, 0x80}, {{&(0x7f0000002ac0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)}, 0x5}, {{&(0x7f0000002bc0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002c40)=""/161, 0xa1}], 0x1, &(0x7f0000002d40)=""/73, 0x49}, 0xffffa47d}, {{&(0x7f0000002dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e40)=""/102, 0x66}, {&(0x7f0000002ec0)=""/28, 0x1c}, {0x0}], 0x3}, 0x10001}, {{&(0x7f0000003040)=@rc, 0x80, &(0x7f0000003500)=[{&(0x7f0000003100)=""/72, 0x48}, {0x0}, {&(0x7f00000031c0)=""/236, 0xec}, {&(0x7f00000032c0)=""/28, 0x1c}, {&(0x7f0000003300)=""/201, 0xc9}, {0x0}], 0x6, &(0x7f0000003580)=""/160, 0xa0}}], 0x9, 0x40020061, 0x0) creat(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getpeername(r3, 0x0, &(0x7f0000004cc0)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000004d00)={'filter\x00'}, &(0x7f0000004d80)=0x78) ioctl$LOOP_CLR_FD(r0, 0x4c01) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 15:18:52 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) timer_settime(0x0, 0x0, &(0x7f00000004c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800}, 0x20) syz_open_procfs(0x0, 0x0) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {0x0}, {0x0}], 0x3, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) add_key(&(0x7f0000000240)='big_key\x00', 0x0, &(0x7f0000000380)="4fad", 0x2, 0x0) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) 15:18:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:52 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) 15:18:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) 15:18:52 executing program 4: getpid() syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_gettime(0x0, &(0x7f0000000440)={0x0}) clock_gettime(0x0, &(0x7f0000000500)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000004c0)={{r3}, {r4}}, 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r7 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(r7, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r7, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = dup3(r8, r9, 0x80000) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 15:18:52 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) timer_settime(0x0, 0x0, &(0x7f00000004c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800}, 0x20) syz_open_procfs(0x0, 0x0) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {0x0}, {0x0}], 0x3, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) add_key(&(0x7f0000000240)='big_key\x00', 0x0, &(0x7f0000000380)="4fad", 0x2, 0x0) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) 15:18:52 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') rmdir(&(0x7f0000000780)='./file1\x00') r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file1/file0\x00', 0x2) [ 281.662011] audit: type=1800 audit(1574867932.172:46): pid=7213 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16588 res=0 15:18:52 executing program 1: syz_open_dev$sndseq(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) timer_settime(0x0, 0x0, &(0x7f00000004c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800}, 0x20) syz_open_procfs(0x0, 0x0) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {0x0}, {0x0}], 0x3, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0) add_key(&(0x7f0000000240)='big_key\x00', 0x0, &(0x7f0000000380)="4fad", 0x2, 0x0) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) 15:18:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000004c0), 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x108000001, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r2, 0x80000) 15:18:52 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000004c0), 0x0) keyctl$revoke(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x108000001, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00', 0x8, 0x3) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r3, 0x80000) [ 428.000320] INFO: task syz-executor.5:7201 blocked for more than 140 seconds. [ 428.007997] Not tainted 4.14.156-syzkaller #0 [ 428.013222] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 428.021494] syz-executor.5 D28528 7201 6861 0x00000004 [ 428.027182] Call Trace: [ 428.030332] __schedule+0x7b8/0x1cd0 [ 428.034078] ? pci_mmcfg_check_reserved+0x150/0x150 [ 428.039375] ? update_load_avg+0xd26/0x1960 [ 428.043937] schedule+0x92/0x1c0 [ 428.047335] schedule_timeout+0x93b/0xe10 [ 428.051534] ? wait_for_completion+0x274/0x420 [ 428.056112] ? find_held_lock+0x35/0x130 [ 428.060313] ? usleep_range+0x130/0x130 [ 428.064280] ? wait_for_completion+0x274/0x420 [ 428.068850] ? _raw_spin_unlock_irq+0x28/0x90 [ 428.074008] ? trace_hardirqs_on_caller+0x400/0x590 [ 428.080858] wait_for_completion+0x27c/0x420 [ 428.085295] ? try_to_wake_up+0xa8/0xf90 [ 428.089344] ? wait_for_completion_interruptible+0x490/0x490 [ 428.096725] ? wake_up_q+0xf0/0xf0 [ 428.100289] kthread_stop+0xda/0x650 [ 428.104056] vivid_stop_generating_vid_cap+0x1b9/0x664 [ 428.109340] vid_cap_stop_streaming+0x7c/0xd0 [ 428.114005] ? vid_cap_buf_queue+0x230/0x230 [ 428.120274] __vb2_queue_cancel+0xa3/0x890 [ 428.125202] ? lock_downgrade+0x740/0x740 [ 428.129371] vb2_core_streamoff+0x52/0x110 [ 428.133677] __vb2_cleanup_fileio+0x78/0x150 [ 428.138535] vb2_core_queue_release+0x1d/0x80 [ 428.143331] _vb2_fop_release+0x1cf/0x2a0 [ 428.147486] vb2_fop_release+0x75/0xc0 [ 428.151421] vivid_fop_release+0x180/0x3f0 [ 428.155671] ? vivid_remove+0x3d0/0x3d0 [ 428.159717] ? dev_debug_store+0xe0/0xe0 [ 428.163927] v4l2_release+0xf9/0x190 [ 428.168406] __fput+0x275/0x7a0 [ 428.171730] ____fput+0x16/0x20 [ 428.175016] task_work_run+0x114/0x190 [ 428.178890] exit_to_usermode_loop+0x1da/0x220 [ 428.183511] do_syscall_64+0x4bc/0x640 [ 428.187409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.192297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.197484] RIP: 0033:0x4141e1 [ 428.200715] RSP: 002b:00007ffea8c6dac0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 428.208422] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00000000004141e1 [ 428.217668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 428.225585] RBP: 0000000000000001 R08: 000000006e783fbb R09: 000000006e783fbf [ 428.232904] R10: 00007ffea8c6dba0 R11: 0000000000000293 R12: 000000000075bf20 [ 428.240206] R13: 0000000000044bf8 R14: 0000000000763fd0 R15: 000000000075bf2c [ 428.247505] [ 428.247505] Showing all locks held in the system: [ 428.253891] 1 lock held by khungtaskd/1011: [ 428.258319] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 428.267436] 2 locks held by getty/6808: [ 428.271445] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.280635] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.291790] 2 locks held by getty/6809: [ 428.295762] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.305287] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.314632] 2 locks held by getty/6810: [ 428.318587] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.327409] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.336736] 2 locks held by getty/6811: [ 428.340760] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.349631] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.359051] 2 locks held by getty/6812: [ 428.363129] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.371851] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.381274] 2 locks held by getty/6813: [ 428.385337] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.394052] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.403652] 2 locks held by getty/6814: [ 428.407695] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 428.416928] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 428.426268] [ 428.427879] ============================================= [ 428.427879] [ 428.434935] NMI backtrace for cpu 1 [ 428.438661] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.156-syzkaller #0 [ 428.446902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.456605] Call Trace: [ 428.459238] dump_stack+0x142/0x197 [ 428.462868] nmi_cpu_backtrace.cold+0x57/0x94 [ 428.467444] ? irq_force_complete_move.cold+0x7d/0x7d [ 428.472846] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 428.478115] arch_trigger_cpumask_backtrace+0x14/0x20 [ 428.484167] watchdog+0x5e7/0xb90 [ 428.487626] kthread+0x319/0x430 [ 428.491766] ? hungtask_pm_notify+0x50/0x50 [ 428.496349] ? kthread_create_on_node+0xd0/0xd0 [ 428.501003] ret_from_fork+0x24/0x30 [ 428.504929] Sending NMI from CPU 1 to CPUs 0: [ 428.509739] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff861cf80e [ 428.510733] Kernel panic - not syncing: hung_task: blocked tasks [ 428.523072] CPU: 1 PID: 1011 Comm: khungtaskd Not tainted 4.14.156-syzkaller #0 [ 428.530847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.540630] Call Trace: [ 428.543328] dump_stack+0x142/0x197 [ 428.546947] panic+0x1f9/0x42d [ 428.550206] ? add_taint.cold+0x16/0x16 [ 428.555567] ? ___preempt_schedule+0x16/0x18 [ 428.560227] watchdog+0x5f8/0xb90 [ 428.564126] kthread+0x319/0x430 [ 428.567493] ? hungtask_pm_notify+0x50/0x50 [ 428.571806] ? kthread_create_on_node+0xd0/0xd0 [ 428.576734] ret_from_fork+0x24/0x30 [ 428.582142] Kernel Offset: disabled [ 428.586104] Rebooting in 86400 seconds..