[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 21.603525] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 22.507918] random: sshd: uninitialized urandom read (32 bytes read) [ 22.790494] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.390780] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. [ 29.011009] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/23 22:40:20 fuzzer started [ 30.025613] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/23 22:40:22 dialing manager at 10.128.0.26:44081 2018/09/23 22:40:22 syscalls: 1 2018/09/23 22:40:22 code coverage: enabled 2018/09/23 22:40:22 comparison tracing: enabled 2018/09/23 22:40:22 setuid sandbox: enabled 2018/09/23 22:40:22 namespace sandbox: enabled 2018/09/23 22:40:22 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/23 22:40:22 fault injection: enabled 2018/09/23 22:40:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/23 22:40:22 net packed injection: enabled 2018/09/23 22:40:22 net device setup: enabled [ 32.161570] random: crng init done 22:42:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) memfd_create(&(0x7f0000000540)='/eth0\x00', 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000340)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x1}, 0x13) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) 22:42:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0013020000000000000000800000000000000000000000db541dc6abeddb85868cb5e9e17f1e5b5acb248e809b9d0dc3017d47de3be46985c147fa4c97c0cb83dc58337788f8140e20478f37d626904c79b7905c7aa8a123f37aa3723dda8cf7e85daa"], 0x1}}, 0x0) 22:42:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [], @local}, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 22:42:57 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) pipe(&(0x7f0000001900)={0xffffffffffffffff}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000019c0)=0xa0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x400, @loopback}, 0x1a) r2 = syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") sendfile(r1, r2, &(0x7f00000000c0), 0x401) 22:42:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@ipv4={[], [], @local}, 0xfffffffffffffffd}, 0x20) 22:42:57 executing program 4: clone(0x4000000200, &(0x7f0000000640), &(0x7f0000000400), &(0x7f0000000140), &(0x7f0000000500)) mknod(&(0x7f00000000c0)='./file0\x00', 0x10000000001042, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0), &(0x7f00000001c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x12000020000001d, 0xfffffffffffff4b4) clone(0x3102001ff7, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) prctl$intptr(0x1e, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) [ 186.563962] IPVS: ftp: loaded support on port[0] = 21 [ 186.585199] IPVS: ftp: loaded support on port[0] = 21 [ 186.599237] IPVS: ftp: loaded support on port[0] = 21 [ 186.605046] IPVS: ftp: loaded support on port[0] = 21 [ 186.620700] IPVS: ftp: loaded support on port[0] = 21 [ 186.628942] IPVS: ftp: loaded support on port[0] = 21 [ 188.683340] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.697786] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.705408] device bridge_slave_0 entered promiscuous mode [ 188.718447] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.724802] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.733912] device bridge_slave_0 entered promiscuous mode [ 188.745950] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.767757] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.775201] device bridge_slave_0 entered promiscuous mode [ 188.784225] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.792548] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.808697] device bridge_slave_0 entered promiscuous mode [ 188.817567] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.824060] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.832429] device bridge_slave_0 entered promiscuous mode [ 188.843498] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.852110] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.859855] device bridge_slave_1 entered promiscuous mode [ 188.869791] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.876140] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.885755] device bridge_slave_1 entered promiscuous mode [ 188.894965] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.903237] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.910943] device bridge_slave_1 entered promiscuous mode [ 188.918774] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.925116] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.949163] device bridge_slave_0 entered promiscuous mode [ 188.960382] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.966734] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.981947] device bridge_slave_1 entered promiscuous mode [ 188.991079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.004769] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.021875] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.039304] device bridge_slave_1 entered promiscuous mode [ 189.046373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.065703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.085275] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.093459] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.102225] device bridge_slave_1 entered promiscuous mode [ 189.116174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.135689] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.155843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.171837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.199533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.210770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.229084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.259813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.333361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.534508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.555797] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.575049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.597159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.658923] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.673947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.699725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.711295] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.735374] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.784318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.836714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.871264] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.282441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.293942] team0: Port device team_slave_0 added [ 190.305823] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.314069] team0: Port device team_slave_0 added [ 190.323634] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.335564] team0: Port device team_slave_0 added [ 190.343620] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.351041] team0: Port device team_slave_0 added [ 190.414179] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.427421] team0: Port device team_slave_1 added [ 190.440514] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.458320] team0: Port device team_slave_1 added [ 190.465980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.488627] team0: Port device team_slave_1 added [ 190.496710] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.504468] team0: Port device team_slave_1 added [ 190.515074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.522552] team0: Port device team_slave_0 added [ 190.530630] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.548300] team0: Port device team_slave_0 added [ 190.553547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.565629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.589676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.599479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.606543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.626489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 190.648541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.656422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.678633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.686444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.704088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.713161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.722959] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.730222] team0: Port device team_slave_1 added [ 190.744628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.753490] team0: Port device team_slave_1 added [ 190.780210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.796191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.808524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.817258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.831521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.843591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.858340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.872375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.883280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.892885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.902686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.918900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.926866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.968282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.976143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.984567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.993099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.001106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.010275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.022661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.039794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.049500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.062249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.078770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.098420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.118414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.136870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.147594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.155884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.163831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.171710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.179481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.198294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.217512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.231597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.268406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.277255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.288874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.296768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.335821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 191.364717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.373816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.390760] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.414046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.434218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.472763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.503296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.517441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.337524] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.344098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.351147] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.357522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.378963] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.385345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.416300] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.422711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.429418] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.435775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.494293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.518661] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.525026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.531670] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.538047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.568507] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.690983] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.697373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.704079] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.710485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.725118] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.741595] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.748005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.754617] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.760998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.768585] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.925241] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.931756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.938450] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.944808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.962342] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.428302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.439551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.458744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.483003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.490687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.033944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.225809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.244681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.303658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.449373] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.584458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.700506] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.710374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.719428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.875267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.892569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.918481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.989831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.097580] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.109339] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.118387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.138296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.145372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.157284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.182992] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.198327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.218506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.236753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.380450] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.471609] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.482817] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.495711] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.599856] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.741327] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.751096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.765908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.038561] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.044726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.053507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.172183] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.489194] 8021q: adding VLAN 0 to HW filter on device team0 22:43:12 executing program 3: 22:43:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 22:43:12 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000100)) get_robust_list(0xffffffffffffffff, &(0x7f00000002c0)=&(0x7f0000000080), &(0x7f0000000340)=0x18) add_key$user(&(0x7f0000000a00)='user\x00', &(0x7f0000000680), &(0x7f00000008c0), 0x0, 0x0) 22:43:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) listen(r0, 0x3) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x5411, &(0x7f0000000340)) 22:43:12 executing program 2: poll(&(0x7f0000000040), 0x20000000000000e7, 0x0) 22:43:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') lseek(r0, 0x0, 0x0) [ 201.333868] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 201.351651] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:43:12 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xb0}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) get_robust_list(0xffffffffffffffff, &(0x7f00000002c0)=&(0x7f0000000080), &(0x7f0000000340)=0x18) 22:43:12 executing program 1: ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x4) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="2d9a19c504dde8a5038dd4a0152eb016c69e0efba59ba03f2f01d6401a3befd4a8ab5a880829037357c87fb39d50fe3e4501a913c501c33f5555fc9cd0d54a6da835116e04bd775ab4fbb896236f68c49b7f74a40320e4281e2ad99337d36004acf36b213a8a6d80e4e55810755c685fddb66256fccd59e1a9d1e783e63ed323b35d4a3c7df35aca1d660ed1b1d4f712d0856da4c6ef4744a4ab5bb1d913d106abe8ffe8f1d9525dffc0e4b2f4bd4eaa0b7bd71f23448b17f7e45547fa69b87b24471ab0e3fdd865ffcbcdd90a64aa5f8529802b99559114e004c327d4c3269028fc26c638e2cd27d618935d14bc1fbc4b58b69d9ec6e1a407ffe09a0a01d208") openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = inotify_init1(0x800) inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f00000000c0)={0x2, 0xfffffffffffffffe, @dev}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000640)) 22:43:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000016000)=[{0x28, 0x0, 0x0, 0xfffffffffffff01c}, {0x6}]}, 0x10) 22:43:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:43:12 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000100)) get_robust_list(0xffffffffffffffff, &(0x7f00000002c0)=&(0x7f00000000c0), &(0x7f0000000040)=0x18) add_key$user(&(0x7f0000000a00)='user\x00', &(0x7f0000000680), &(0x7f00000008c0), 0x0, 0x0) [ 201.795579] hrtimer: interrupt took 54855 ns 22:43:13 executing program 2: clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x200, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000100), 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f00000000c0)={0x2, 0xfffffffffffffffe, @dev}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000640)) 22:43:13 executing program 0: gettid() r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="31c26228d140dd8b3db944fae3822baf4629765fcbfbc4a89bba8a8eb45a773d589bba41d93ea942c5c7daf85f65e3ffbd80ee454c7a6a"], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) setreuid(0x0, 0x0) getpid() r2 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@alg, &(0x7f0000000140)=0x80) accept$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000000)=0x1) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$RTC_AIE_ON(r1, 0x7001) msync(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000001c0)={0x1, 0x0, {0x33, 0x10, 0x16, 0x18, 0x5, 0x0, 0x0, 0x67}}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000080)='page-ap\x00') fgetxattr(r4, &(0x7f00000000c0)=@known='com.apple.system.Security\x00', &(0x7f0000000100)=""/63, 0x3f) readv(r4, &(0x7f0000000300), 0x0) [ 201.935300] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:43:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 22:43:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) dup2(r0, r1) 22:43:13 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0xbf, @time={0x77359400}}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000014) 22:43:13 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0xbf, @time={0x77359400}, 0x0, {0x2}, 0xffffffffffffff00}) 22:43:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, r2+10000000}, &(0x7f00000000c0), 0x8) ioctl$TIOCSBRK(r1, 0x40044591) 22:43:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x0) 22:43:13 executing program 4: sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) [ 202.310765] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000000000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 22:43:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x2f, 0x829, 0x0, 0x0, {0x4}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x400000007000f00}}]}]}, 0x2c}}, 0x0) 22:43:13 executing program 0: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001180)={'syz1', "390a04"}, 0x7) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000000580), 0x3c1) [ 202.477329] openvswitch: netlink: Key 15 has unexpected len 3 expected 4 [ 202.487578] openvswitch: netlink: Key 15 has unexpected len 3 expected 4 22:43:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x18, &(0x7f0000000400)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @broadcast}}}, 0x108) 22:43:13 executing program 0: timerfd_create(0x0, 0x0) 22:43:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 22:43:14 executing program 0: clone(0x8002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x8000, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = dup3(r2, r1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x2, 0xfce5, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xe45, 0x0, 0x0, 0x4, 0x0, 0xb5c, 0x20, 0x1, 0x0, 0x8, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0xffffffff, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200)}, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) write$P9_RGETLOCK(r3, &(0x7f0000000340)={0x26, 0x37, 0x0, {0x3, 0x0, 0xfffffffffffffffd, r0, 0x8, '!trusted'}}, 0x26) 22:43:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000def000/0xe000)=nil, 0xe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000baa000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000977000/0x200000)=nil, 0x200000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 22:43:14 executing program 1: accept4(0xffffffffffffffff, &(0x7f0000000200)=@ethernet, &(0x7f0000000140)=0x80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x800) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x2f, 0x829, 0x0, 0x0, {0x4}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x400000007000f00}}]}]}, 0x2c}}, 0x0) 22:43:14 executing program 3: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f00000002c0), &(0x7f0000002600)=0x4) 22:43:14 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000001c0)=0x800, 0x4) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x100000000) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1004, 0x0, 0x52, r0, 0x100000000) 22:43:14 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000007100), 0x4) [ 203.193154] openvswitch: netlink: Key 15 has unexpected len 3 expected 4 [ 203.228953] openvswitch: netlink: Key 15 has unexpected len 3 expected 4 22:43:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500), &(0x7f0000000540)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580), 0x4) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'teql0\x00', @ifru_map}) 22:43:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffb) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) keyctl$update(0x2, r0, &(0x7f0000000240), 0x0) 22:43:14 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00ac730000000000ec973f820f7c4000", 0x102}) r1 = socket(0x80000000010, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, &(0x7f0000000100), 0x80000001) 22:43:14 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) [ 203.332354] sctp: [Deprecated]: syz-executor2 (pid 6996) Use of int in maxseg socket option. [ 203.332354] Use struct sctp_assoc_value instead [ 203.400785] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.418785] sctp: [Deprecated]: syz-executor2 (pid 7010) Use of int in maxseg socket option. [ 203.418785] Use struct sctp_assoc_value instead 22:43:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 22:43:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="737461636b20854b926c0d1f07782e7de0968c69dd67c4569fee59a3cef770b637f10e47314a86bb677a4a0b4780b2b6"], 0x1) 22:43:15 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:15 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) 22:43:15 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:15 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:15 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:15 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:15 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 22:43:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000680)="04cddf7eb8b60b8c84c6edb53f42ce9281afebb13a25229be355ded341c5a14cec277eff41429b564ff51c61a5a5e9ab7616eff4630ca4edbc358478734acb0114da9b5b34f8b38fd84713fd3585016c139670cced4da343a3bc5d8600da6087950bf69c435bf27e7d37fbd25afd0024d148c41b66fc42e980eaef1175ba8f44691fb09a6c000000004f6d16b737352b", 0x90) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40) [ 204.271703] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:43:15 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:16 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_AIE_OFF(r0, 0x7002) 22:43:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:16 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 1: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:16 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x0, "4268b3a7d9b16ab1"}) 22:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:16 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x14a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x1d, 0xfffffffffffffaf7) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)) prctl$void(0x1e) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000500)}) 22:43:16 executing program 3: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000c00), &(0x7f00000009c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x14a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000c80)) prctl$intptr(0x1d, 0xfffffffffffffaf7) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)) prctl$void(0x1e) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 22:43:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 1: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x804020000001d, 0xfffffffffffffc04) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x1e, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000001c0)) 22:43:16 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:16 executing program 3: clone(0x4000000200, &(0x7f0000000640), &(0x7f0000000400), &(0x7f0000000140), &(0x7f0000000500)) mknod(&(0x7f00000000c0)='./file0\x00', 0x10000000001042, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0), &(0x7f00000001c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x12000020000001d, 0xfffffffffffff4b4) clone(0x3102001ff7, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) prctl$intptr(0x1e, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)) 22:43:16 executing program 4: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(0xffffffffffffffff, &(0x7f0000000440)=""/4096, 0x1000) 22:43:16 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x14a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x1d, 0xfffffffffffffaf7) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)) prctl$void(0x1e) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000500)}) 22:43:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:17 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x804020000001d, 0xfffffffffffffc04) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x4000000001e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 22:43:17 executing program 1: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000400)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = dup2(r0, r0) clone(0x7102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) prctl$intptr(0x20020000000001d, 0xfffffffffffff7e0) r2 = fcntl$dupfd(r1, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/159) prctl$intptr(0x1e, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f00000001c0)={'gretap0\x00', {0x2, 0x0, @dev}}) 22:43:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:17 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(0xffffffffffffffff, &(0x7f0000000440)=""/4096, 0x1000) 22:43:17 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x14a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x1d, 0xfffffffffffffaf7) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)) prctl$void(0x1e) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000500)}) 22:43:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:17 executing program 4: 22:43:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='net/psched\x00') socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) flistxattr(r0, &(0x7f0000000000)=""/245, 0xf5) 22:43:17 executing program 4: 22:43:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:17 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000700)='+'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@increfs_done], 0x0, 0x0, &(0x7f0000000180)}) 22:43:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:18 executing program 0: 22:43:18 executing program 3: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x804020000001d, 0xfffffffffffffac9) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000540)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 22:43:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:18 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000400)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = dup2(r0, r0) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) prctl$intptr(0x20000000000001d, 0xfffffffffffff7e2) r2 = fcntl$dupfd(r1, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000001c0)) 22:43:18 executing program 1: 22:43:18 executing program 1: 22:43:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:18 executing program 0: 22:43:18 executing program 1: 22:43:18 executing program 0: [ 207.265417] binder_alloc: binder_alloc_mmap_handler: 7215 20001000-20004000 already mapped failed -16 [ 207.295223] binder: BINDER_SET_CONTEXT_MGR already set [ 207.301580] binder: 7215:7220 ioctl 40046207 0 returned -16 [ 207.326353] binder_alloc: 7215: binder_alloc_buf, no vma [ 207.361761] binder: send failed reply for transaction 2 to 7215:7220 [ 207.369312] binder: 7215:7253 transaction failed 29189/-3, size 24-8 line 2970 22:43:18 executing program 4: 22:43:18 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:18 executing program 1: [ 207.393253] binder: undelivered TRANSACTION_ERROR: 29189 22:43:19 executing program 1: 22:43:19 executing program 0: 22:43:19 executing program 5: 22:43:19 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 4: 22:43:19 executing program 3: 22:43:19 executing program 0: 22:43:19 executing program 1: 22:43:19 executing program 4: 22:43:19 executing program 3: 22:43:19 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 0: 22:43:19 executing program 1: 22:43:19 executing program 5: 22:43:19 executing program 4: 22:43:19 executing program 0: 22:43:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 3: 22:43:19 executing program 1: 22:43:19 executing program 5: 22:43:19 executing program 3: 22:43:19 executing program 4: 22:43:19 executing program 0: 22:43:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 1: 22:43:19 executing program 3: 22:43:19 executing program 5: 22:43:19 executing program 4: 22:43:19 executing program 0: 22:43:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 5: 22:43:19 executing program 1: 22:43:19 executing program 3: 22:43:19 executing program 4: 22:43:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:19 executing program 0: 22:43:20 executing program 1: 22:43:20 executing program 4: 22:43:20 executing program 5: 22:43:20 executing program 3: 22:43:20 executing program 0: 22:43:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:20 executing program 3: 22:43:20 executing program 1: 22:43:20 executing program 5: 22:43:20 executing program 0: 22:43:20 executing program 4: 22:43:20 executing program 1: 22:43:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:20 executing program 3: 22:43:20 executing program 4: 22:43:20 executing program 0: 22:43:20 executing program 5: 22:43:20 executing program 1: 22:43:20 executing program 3: 22:43:20 executing program 5: 22:43:20 executing program 4: 22:43:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:20 executing program 0: 22:43:20 executing program 1: 22:43:20 executing program 5: 22:43:20 executing program 3: 22:43:20 executing program 4: 22:43:20 executing program 2: 22:43:20 executing program 0: 22:43:20 executing program 1: 22:43:20 executing program 5: 22:43:20 executing program 2: 22:43:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r2 = inotify_init() fcntl$setlease(r1, 0x400, 0x0) inotify_add_watch(r2, &(0x7f0000000200)='./file0\x00', 0x80000002) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x8}) 22:43:20 executing program 3: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x804020000001d, 0xfffffffffffffc04) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)) 22:43:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:20 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:20 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:20 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) [ 209.677562] FAULT_INJECTION: forcing a failure. [ 209.677562] name failslab, interval 1, probability 0, space 0, times 1 [ 209.696565] FAULT_INJECTION: forcing a failure. [ 209.696565] name failslab, interval 1, probability 0, space 0, times 1 [ 209.707258] CPU: 1 PID: 7439 Comm: syz-executor1 Not tainted 4.19.0-rc5+ #251 [ 209.715218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.724745] Call Trace: [ 209.727337] dump_stack+0x1c4/0x2b4 [ 209.730970] ? dump_stack_print_info.cold.2+0x52/0x52 [ 209.736182] should_fail.cold.4+0xa/0x17 [ 209.740271] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.745383] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 209.750574] ? graph_lock+0x170/0x170 [ 209.754370] ? string+0x225/0x2d0 [ 209.757824] ? graph_lock+0x170/0x170 [ 209.761623] ? __lock_acquire+0x7ec/0x4ec0 [ 209.765851] ? mark_held_locks+0x130/0x130 [ 209.770081] ? __lock_acquire+0x7ec/0x4ec0 [ 209.774320] ? find_held_lock+0x36/0x1c0 [ 209.778385] ? __lock_is_held+0xb5/0x140 [ 209.782456] ? ___might_sleep+0x1ed/0x300 [ 209.786605] ? arch_local_save_flags+0x40/0x40 [ 209.791184] ? vsprintf+0x40/0x40 [ 209.794638] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 209.800102] __should_failslab+0x124/0x180 [ 209.804342] should_failslab+0x9/0x14 [ 209.808139] __kmalloc+0x2d4/0x760 [ 209.811682] ? aa_getprocattr+0x39c/0xcc0 [ 209.815833] aa_getprocattr+0x39c/0xcc0 [ 209.819813] ? lock_downgrade+0x900/0x900 [ 209.823963] ? aa_unpack+0x1570/0x1570 [ 209.827853] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 209.833657] apparmor_getprocattr+0x6a3/0x104e [ 209.838243] ? apparmor_socket_post_create+0x11e0/0x11e0 [ 209.843691] ? lock_downgrade+0x900/0x900 [ 209.847837] ? check_preemption_disabled+0x48/0x200 [ 209.852860] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 209.858654] ? kasan_check_read+0x11/0x20 [ 209.862805] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 209.868083] ? rcu_bh_qs+0xc0/0xc0 [ 209.871617] ? find_vpid+0xf0/0xf0 [ 209.875168] security_getprocattr+0x66/0xc0 [ 209.879499] proc_pid_attr_read+0x158/0x2e0 [ 209.883825] ? proc_fail_nth_write+0x9e/0x210 [ 209.888315] ? oom_adj_read+0x260/0x260 [ 209.892291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.897834] __vfs_read+0x117/0x9b0 [ 209.901470] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 209.906429] ? oom_adj_read+0x260/0x260 [ 209.910495] ? vfs_copy_file_range+0xb90/0xb90 [ 209.915081] ? fsnotify+0x1330/0x1330 [ 209.918899] ? security_file_permission+0x1c2/0x230 [ 209.923921] ? rw_verify_area+0x118/0x360 [ 209.928072] vfs_read+0x17f/0x3c0 [ 209.931536] ksys_read+0x101/0x260 [ 209.935079] ? kernel_write+0x120/0x120 [ 209.939058] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 209.944521] __x64_sys_read+0x73/0xb0 [ 209.948324] do_syscall_64+0x1b9/0x820 [ 209.952213] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.957576] ? syscall_return_slowpath+0x5e0/0x5e0 [ 209.962524] ? trace_hardirqs_on_caller+0x310/0x310 [ 209.967543] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 209.972560] ? recalc_sigpending_tsk+0x180/0x180 [ 209.977311] ? kasan_check_write+0x14/0x20 [ 209.981551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.986403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.991588] RIP: 0033:0x457679 [ 209.994777] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.013672] RSP: 002b:00007fadcd183c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 210.021381] RAX: ffffffffffffffda RBX: 00007fadcd1846d4 RCX: 0000000000457679 22:43:21 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) [ 210.028650] RDX: 0000000000001000 RSI: 0000000020000440 RDI: 0000000000000003 [ 210.035916] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.043182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 210.050446] R13: 00000000004d4e10 R14: 00000000004c2764 R15: 0000000000000000 [ 210.057780] CPU: 0 PID: 7443 Comm: syz-executor0 Not tainted 4.19.0-rc5+ #251 [ 210.065065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.074408] Call Trace: [ 210.074448] dump_stack+0x1c4/0x2b4 [ 210.074466] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.074479] ? mark_held_locks+0x130/0x130 [ 210.074504] should_fail.cold.4+0xa/0x17 [ 210.074519] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.074532] ? __lock_acquire+0x7ec/0x4ec0 [ 210.074544] ? find_held_lock+0x36/0x1c0 [ 210.074556] ? graph_lock+0x170/0x170 [ 210.111569] ? graph_lock+0x170/0x170 [ 210.115380] ? mark_held_locks+0x130/0x130 [ 210.119629] ? find_held_lock+0x36/0x1c0 [ 210.123702] ? __lock_is_held+0xb5/0x140 [ 210.127782] ? ___might_sleep+0x1ed/0x300 [ 210.129870] FAULT_INJECTION: forcing a failure. [ 210.129870] name failslab, interval 1, probability 0, space 0, times 0 [ 210.131940] ? arch_local_save_flags+0x40/0x40 [ 210.131968] __should_failslab+0x124/0x180 [ 210.132002] should_failslab+0x9/0x14 [ 210.155827] __kmalloc_track_caller+0x2d0/0x750 [ 210.160500] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 210.165781] ? rcu_bh_qs+0xc0/0xc0 [ 210.169404] ? find_vpid+0xf0/0xf0 [ 210.172945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 210.178490] ? proc_pid_attr_write+0x198/0x540 [ 210.183081] memdup_user+0x2c/0xa0 [ 210.186623] proc_pid_attr_write+0x198/0x540 [ 210.191033] __vfs_write+0x119/0x9f0 [ 210.194745] ? check_preemption_disabled+0x48/0x200 [ 210.199759] ? proc_loginuid_write+0x4f0/0x4f0 [ 210.204340] ? kernel_read+0x120/0x120 [ 210.208232] ? __lock_is_held+0xb5/0x140 [ 210.212303] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.217355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.222902] ? __sb_start_write+0x1b2/0x370 [ 210.227224] vfs_write+0x1fc/0x560 [ 210.230771] ksys_write+0x101/0x260 [ 210.234402] ? __ia32_sys_read+0xb0/0xb0 [ 210.238465] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 210.243925] __x64_sys_write+0x73/0xb0 [ 210.247817] do_syscall_64+0x1b9/0x820 [ 210.251703] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.257066] ? syscall_return_slowpath+0x5e0/0x5e0 [ 210.262005] ? trace_hardirqs_on_caller+0x310/0x310 [ 210.267021] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 210.272040] ? recalc_sigpending_tsk+0x180/0x180 [ 210.276803] ? kasan_check_write+0x14/0x20 [ 210.281051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.285925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.291111] RIP: 0033:0x457679 [ 210.294306] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.313207] RSP: 002b:00007f7b9432bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.320914] RAX: ffffffffffffffda RBX: 00007f7b9432c6d4 RCX: 0000000000457679 [ 210.328176] RDX: 0000000000000009 RSI: 0000000020000040 RDI: 0000000000000005 [ 210.335439] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.342710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 210.349988] R13: 00000000004d8f38 R14: 00000000004c55ed R15: 0000000000000000 [ 210.357277] CPU: 1 PID: 7453 Comm: syz-executor2 Not tainted 4.19.0-rc5+ #251 [ 210.364555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.373905] Call Trace: [ 210.376503] dump_stack+0x1c4/0x2b4 22:43:21 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) 22:43:21 executing program 1 (fault-call:2 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:21 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) [ 210.380137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.385330] ? mark_held_locks+0x130/0x130 [ 210.389566] should_fail.cold.4+0xa/0x17 [ 210.393626] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.398734] ? __lock_acquire+0x7ec/0x4ec0 [ 210.402979] ? find_held_lock+0x36/0x1c0 [ 210.407064] ? graph_lock+0x170/0x170 [ 210.410873] ? graph_lock+0x170/0x170 [ 210.414681] ? mark_held_locks+0x130/0x130 [ 210.418921] ? find_held_lock+0x36/0x1c0 [ 210.422999] ? __lock_is_held+0xb5/0x140 [ 210.427507] ? ___might_sleep+0x1ed/0x300 [ 210.431670] ? arch_local_save_flags+0x40/0x40 [ 210.436271] __should_failslab+0x124/0x180 [ 210.440522] should_failslab+0x9/0x14 [ 210.444331] __kmalloc_track_caller+0x2d0/0x750 [ 210.449005] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 210.454290] ? rcu_bh_qs+0xc0/0xc0 [ 210.457835] ? find_vpid+0xf0/0xf0 [ 210.461380] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 210.466916] ? proc_pid_attr_write+0x198/0x540 [ 210.471960] memdup_user+0x2c/0xa0 [ 210.475508] proc_pid_attr_write+0x198/0x540 22:43:21 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1000) 22:43:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&:\x00'}, 0x9) [ 210.479923] __vfs_write+0x119/0x9f0 [ 210.483654] ? check_preemption_disabled+0x48/0x200 [ 210.488673] ? proc_loginuid_write+0x4f0/0x4f0 [ 210.493263] ? kernel_read+0x120/0x120 [ 210.497164] ? __lock_is_held+0xb5/0x140 [ 210.501628] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.506655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.512202] ? __sb_start_write+0x1b2/0x370 [ 210.516533] vfs_write+0x1fc/0x560 [ 210.520090] ksys_write+0x101/0x260 [ 210.523728] ? __ia32_sys_read+0xb0/0xb0 [ 210.527797] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 210.533349] __x64_sys_write+0x73/0xb0 [ 210.537254] do_syscall_64+0x1b9/0x820 [ 210.541145] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.546517] ? syscall_return_slowpath+0x5e0/0x5e0 [ 210.551463] ? trace_hardirqs_on_caller+0x310/0x310 [ 210.556487] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 210.561510] ? recalc_sigpending_tsk+0x180/0x180 [ 210.566271] ? kasan_check_write+0x14/0x20 [ 210.570522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.575377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.580569] RIP: 0033:0x457679 [ 210.583771] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.602669] RSP: 002b:00007f22efa95c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.602688] RAX: ffffffffffffffda RBX: 00007f22efa966d4 RCX: 0000000000457679 [ 210.602700] RDX: 0000000000000008 RSI: 0000000020000000 RDI: 0000000000000003 [ 210.618038] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.618047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 210.618057] R13: 00000000004d8f38 R14: 00000000004c55ed R15: 0000000000000000 22:43:22 executing program 4: r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x335, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000001c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:43:22 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '&&\x00'}, 0x9) 22:43:22 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r0, &(0x7f0000000440)=""/4096, 0x1002) 22:43:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&&\x00'}, 0x9) 22:43:22 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) 22:43:22 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24a18b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be62c7e0fa0000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) mq_open(&(0x7f0000000000)='systemuser\x00', 0x80, 0x82, &(0x7f0000000040)={0x7fff, 0x8001, 0x3f, 0x1, 0x1ff, 0x0, 0x4, 0x7fffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0xffffffffffffff0a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 210.771803] kasan: CONFIG_KASAN_INLINE enabled [ 210.774479] kasan: CONFIG_KASAN_INLINE enabled [ 210.776609] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 210.776628] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 210.776642] CPU: 1 PID: 7484 Comm: syz-executor0 Not tainted 4.19.0-rc5+ #251 [ 210.776656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.804641] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 210.811429] RIP: 0010:memcmp+0x28/0x160 [ 210.811444] Code: 00 00 48 85 d2 0f 84 0a 01 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 f9 48 89 e5 48 c1 e9 03 41 54 53 48 89 fb 48 83 ec 18 <0f> b6 04 01 48 89 f9 83 e1 07 38 c8 7f 08 84 c0 0f 85 98 00 00 00 [ 210.811464] RSP: 0018:ffff88018a6c6f98 EFLAGS: 00010292 [ 210.846984] RAX: dffffc0000000000 RBX: 1ffff100314d8e4f RCX: 03fffe200629b1c9 [ 210.854236] RDX: 0000000000000002 RSI: ffffffff883f7980 RDI: 1ffff100314d8e4f [ 210.861491] RBP: ffff88018a6c6fc0 R08: ffff88018a43e300 R09: ffffed003b5a4732 [ 210.868742] R10: ffffed003b5a4732 R11: ffff8801dad23993 R12: 0000000000000002 [ 210.876004] R13: ffffffff883f7980 R14: 1fff7901bbba019f R15: dffffc0000000000 [ 210.883257] FS: 00007f7b9432c700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 210.891466] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 210.897327] CR2: 0000001b2db23000 CR3: 00000001bda15000 CR4: 00000000001406e0 [ 210.904600] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 210.911850] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 210.919100] Call Trace: [ 210.921678] ? _raw_spin_unlock_irq+0x27/0x80 [ 210.926156] strnstr+0x4b/0x70 [ 210.929335] __aa_lookupn_ns+0xc1/0x570 [ 210.933294] ? compat_start_thread+0x80/0x80 [ 210.937705] ? aa_find_ns+0x30/0x30 [ 210.941316] ? lock_acquire+0x1ed/0x520 [ 210.945275] ? __aa_lookupn_ns+0x570/0x570 [ 210.949495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.955018] ? check_preemption_disabled+0x48/0x200 [ 210.960020] ? kasan_check_read+0x11/0x20 [ 210.964156] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 210.969422] ? __switch_to_asm+0x34/0x70 [ 210.973469] ? rcu_bh_qs+0xc0/0xc0 [ 210.976996] ? print_usage_bug+0xc0/0xc0 [ 210.981041] ? __switch_to_asm+0x34/0x70 [ 210.985087] ? __switch_to_asm+0x40/0x70 [ 210.989136] aa_lookupn_ns+0x88/0x1e0 [ 210.992923] aa_fqlookupn_profile+0x1b9/0x1010 [ 210.997502] ? aa_lookup_profile+0x30/0x30 [ 211.001720] ? __lock_acquire+0x7ec/0x4ec0 [ 211.005967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.011489] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 211.016925] ? refcount_add_not_zero_checked+0x330/0x330 [ 211.022361] ? mark_held_locks+0x130/0x130 [ 211.026578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.032099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.037620] fqlookupn_profile+0x80/0xc0 [ 211.041668] aa_label_strn_parse+0xa3a/0x1230 [ 211.046151] ? aa_label_printk+0x850/0x850 [ 211.050369] ? __lock_acquire+0x7ec/0x4ec0 [ 211.054590] ? lock_acquire+0x1ed/0x520 [ 211.058560] ? __might_sleep+0x95/0x190 [ 211.062529] ? graph_lock+0x170/0x170 [ 211.066312] ? __lock_acquire+0x7ec/0x4ec0 [ 211.070531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.076069] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 211.081500] ? refcount_add_not_zero_checked+0x330/0x330 [ 211.086932] ? graph_lock+0x170/0x170 [ 211.090717] ? find_held_lock+0x36/0x1c0 [ 211.094762] aa_label_parse+0x42/0x50 [ 211.098544] aa_change_profile+0x513/0x3510 [ 211.102855] ? lock_acquire+0x1ed/0x520 [ 211.106818] ? aa_change_hat+0x1a20/0x1a20 [ 211.111040] ? is_bpf_text_address+0xd3/0x170 [ 211.115520] ? __mutex_lock+0x85e/0x1700 [ 211.119567] ? proc_pid_attr_write+0x28a/0x540 [ 211.124131] ? mutex_trylock+0x2b0/0x2b0 [ 211.128175] ? save_stack+0xa9/0xd0 [ 211.131784] ? save_stack+0x43/0xd0 [ 211.135390] ? kasan_kmalloc+0xc7/0xe0 [ 211.139264] ? __kmalloc_track_caller+0x14a/0x750 [ 211.144090] ? memdup_user+0x2c/0xa0 [ 211.147806] ? proc_pid_attr_write+0x198/0x540 [ 211.152369] ? graph_lock+0x170/0x170 [ 211.156155] ? __x64_sys_write+0x73/0xb0 [ 211.160201] ? graph_lock+0x170/0x170 [ 211.163985] ? mark_held_locks+0x130/0x130 [ 211.168205] apparmor_setprocattr+0xaa4/0x1150 [ 211.172776] ? apparmor_task_kill+0xcb0/0xcb0 [ 211.177270] ? lock_downgrade+0x900/0x900 [ 211.181406] ? arch_local_save_flags+0x40/0x40 [ 211.185987] security_setprocattr+0x66/0xc0 [ 211.190297] proc_pid_attr_write+0x301/0x540 [ 211.194706] __vfs_write+0x119/0x9f0 [ 211.198422] ? check_preemption_disabled+0x48/0x200 [ 211.203421] ? proc_loginuid_write+0x4f0/0x4f0 [ 211.208007] ? kernel_read+0x120/0x120 [ 211.211889] ? __lock_is_held+0xb5/0x140 [ 211.215942] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.220944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.226465] ? __sb_start_write+0x1b2/0x370 [ 211.230775] vfs_write+0x1fc/0x560 [ 211.234300] ksys_write+0x101/0x260 [ 211.237925] ? __ia32_sys_read+0xb0/0xb0 [ 211.241974] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 211.247412] __x64_sys_write+0x73/0xb0 [ 211.251283] do_syscall_64+0x1b9/0x820 [ 211.255157] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.260505] ? syscall_return_slowpath+0x5e0/0x5e0 [ 211.265422] ? trace_hardirqs_on_caller+0x310/0x310 [ 211.270424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 211.275427] ? recalc_sigpending_tsk+0x180/0x180 [ 211.280167] ? kasan_check_write+0x14/0x20 [ 211.284394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.289227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.294399] RIP: 0033:0x457679 [ 211.297577] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.316460] RSP: 002b:00007f7b9432bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.324152] RAX: ffffffffffffffda RBX: 00007f7b9432c6d4 RCX: 0000000000457679 [ 211.331404] RDX: 0000000000000009 RSI: 0000000020000040 RDI: 0000000000000005 [ 211.338655] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 211.345905] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 211.353156] R13: 00000000004d8f38 R14: 00000000004c55ed R15: 0000000000000000 [ 211.360411] Modules linked in: [ 211.363604] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 211.369850] CPU: 0 PID: 7485 Comm: syz-executor5 Tainted: G D 4.19.0-rc5+ #251 [ 211.378524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.387904] RIP: 0010:memcmp+0x28/0x160 [ 211.388259] ---[ end trace dd38614b0ee04318 ]--- [ 211.391885] Code: 00 00 48 85 d2 0f 84 0a 01 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 f9 48 89 e5 48 c1 e9 03 41 54 53 48 89 fb 48 83 ec 18 <0f> b6 04 01 48 89 f9 83 e1 07 38 c8 7f 08 84 c0 0f 85 98 00 00 00 [ 211.391894] RSP: 0018:ffff88018a5c6f98 EFLAGS: 00010292 [ 211.391910] RAX: dffffc0000000000 RBX: 1ffff100314b8e4f RCX: 03fffe20062971c9 [ 211.396724] RIP: 0010:memcmp+0x28/0x160 [ 211.415524] RDX: 0000000000000002 RSI: ffffffff883f7980 RDI: 1ffff100314b8e4f [ 211.415532] RBP: ffff88018a5c6fc0 R08: ffff88018a6da340 R09: ffffed003b584732 [ 211.415540] R10: ffffed003b584732 R11: ffff8801dac23993 R12: 0000000000000002 [ 211.415549] R13: ffffffff883f7980 R14: 1fff7901bba8019f R15: dffffc0000000000 [ 211.415561] FS: 00007fb397fb1700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 211.415569] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 211.415577] CR2: 0000000000f47e80 CR3: 00000001bb12f000 CR4: 00000000001406f0 [ 211.415589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 211.422265] Code: 00 00 48 85 d2 0f 84 0a 01 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 f9 48 89 e5 48 c1 e9 03 41 54 53 48 89 fb 48 83 ec 18 <0f> b6 04 01 48 89 f9 83 e1 07 38 c8 7f 08 84 c0 0f 85 98 00 00 00 [ 211.428179] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 211.428184] Call Trace: [ 211.428219] ? _raw_spin_unlock_irq+0x27/0x80 [ 211.428231] strnstr+0x4b/0x70 [ 211.428249] __aa_lookupn_ns+0xc1/0x570 [ 211.428265] ? compat_start_thread+0x80/0x80 [ 211.432611] RSP: 0018:ffff88018a6c6f98 EFLAGS: 00010292 [ 211.439470] ? aa_find_ns+0x30/0x30 [ 211.439486] ? lock_acquire+0x1ed/0x520 [ 211.439500] ? __aa_lookupn_ns+0x570/0x570 [ 211.439515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.439531] ? check_preemption_disabled+0x48/0x200 [ 211.454050] ? kasan_check_read+0x11/0x20 [ 211.454068] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 211.454082] ? __switch_to_asm+0x34/0x70 [ 211.454093] ? rcu_bh_qs+0xc0/0xc0 [ 211.454110] ? print_usage_bug+0xc0/0xc0 [ 211.461775] RAX: dffffc0000000000 RBX: 1ffff100314d8e4f RCX: 03fffe200629b1c9 [ 211.469571] ? __switch_to_asm+0x34/0x70 [ 211.469584] ? __switch_to_asm+0x40/0x70 [ 211.469602] aa_lookupn_ns+0x88/0x1e0 [ 211.469617] aa_fqlookupn_profile+0x1b9/0x1010 [ 211.469633] ? aa_lookup_profile+0x30/0x30 [ 211.475838] RDX: 0000000000000002 RSI: ffffffff883f7980 RDI: 1ffff100314d8e4f [ 211.482748] ? __lock_acquire+0x7ec/0x4ec0 [ 211.482769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.482785] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 211.482800] ? refcount_add_not_zero_checked+0x330/0x330 [ 211.482816] ? mark_held_locks+0x130/0x130 [ 211.490459] RBP: ffff88018a6c6fc0 R08: ffff88018a43e300 R09: ffffed003b5a4732 [ 211.508950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.508966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.508985] fqlookupn_profile+0x80/0xc0 [ 211.508999] aa_label_strn_parse+0xa3a/0x1230 [ 211.509015] ? aa_label_printk+0x850/0x850 [ 211.509027] ? __lock_acquire+0x7ec/0x4ec0 [ 211.509043] ? lock_acquire+0x1ed/0x520 [ 211.516801] R10: ffffed003b5a4732 R11: ffff8801dad23993 R12: 0000000000000002 [ 211.518906] ? __might_sleep+0x95/0x190 [ 211.518922] ? graph_lock+0x170/0x170 [ 211.518935] ? __lock_acquire+0x7ec/0x4ec0 [ 211.518949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.518967] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 211.523743] R13: ffffffff883f7980 R14: 1fff7901bbba019f R15: dffffc0000000000 [ 211.526613] ? refcount_add_not_zero_checked+0x330/0x330 [ 211.526628] ? graph_lock+0x170/0x170 [ 211.526644] ? find_held_lock+0x36/0x1c0 [ 211.530957] FS: 00007f7b9432c700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 211.534981] aa_label_parse+0x42/0x50 [ 211.534998] aa_change_profile+0x513/0x3510 [ 211.535018] ? lock_acquire+0x1ed/0x520 [ 211.540700] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 211.543965] ? aa_change_hat+0x1a20/0x1a20 [ 211.543984] ? is_bpf_text_address+0xd3/0x170 [ 211.544003] ? __mutex_lock+0x85e/0x1700 [ 211.548302] CR2: 000000000072c000 CR3: 00000001bda15000 CR4: 00000000001406e0 [ 211.552162] ? proc_pid_attr_write+0x28a/0x540 [ 211.552180] ? mutex_trylock+0x2b0/0x2b0 [ 211.552191] ? save_stack+0xa9/0xd0 [ 211.552205] ? save_stack+0x43/0xd0 [ 211.558063] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 211.562707] ? kasan_kmalloc+0xc7/0xe0 [ 211.562723] ? __kmalloc_track_caller+0x14a/0x750 [ 211.562736] ? memdup_user+0x2c/0xa0 [ 211.562752] ? proc_pid_attr_write+0x198/0x540 [ 211.568169] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 211.572129] ? graph_lock+0x170/0x170 [ 211.572144] ? __x64_sys_write+0x73/0xb0 [ 211.572159] ? graph_lock+0x170/0x170 [ 211.578051] Kernel panic - not syncing: Fatal exception [ 211.579718] ? mark_held_locks+0x130/0x130 [ 211.847993] apparmor_setprocattr+0xaa4/0x1150 [ 211.852568] ? apparmor_task_kill+0xcb0/0xcb0 [ 211.857053] ? lock_downgrade+0x900/0x900 [ 211.861197] ? arch_local_save_flags+0x40/0x40 [ 211.865783] security_setprocattr+0x66/0xc0 [ 211.870094] proc_pid_attr_write+0x301/0x540 [ 211.874491] __vfs_write+0x119/0x9f0 [ 211.878192] ? check_preemption_disabled+0x48/0x200 [ 211.883195] ? proc_loginuid_write+0x4f0/0x4f0 [ 211.887764] ? kernel_read+0x120/0x120 [ 211.891642] ? __lock_is_held+0xb5/0x140 [ 211.895698] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.900708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.906235] ? __sb_start_write+0x1b2/0x370 [ 211.910638] vfs_write+0x1fc/0x560 [ 211.914171] ksys_write+0x101/0x260 [ 211.917792] ? __ia32_sys_read+0xb0/0xb0 [ 211.921853] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 211.927293] __x64_sys_write+0x73/0xb0 [ 211.931168] do_syscall_64+0x1b9/0x820 [ 211.935042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.940397] ? syscall_return_slowpath+0x5e0/0x5e0 [ 211.945313] ? trace_hardirqs_on_caller+0x310/0x310 [ 211.950319] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 211.955324] ? recalc_sigpending_tsk+0x180/0x180 [ 211.960067] ? kasan_check_write+0x14/0x20 [ 211.964290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.969124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.974296] RIP: 0033:0x457679 [ 211.977496] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.996381] RSP: 002b:00007fb397fb0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 212.004078] RAX: ffffffffffffffda RBX: 00007fb397fb16d4 RCX: 0000000000457679 [ 212.011337] RDX: 0000000000000009 RSI: 0000000020000040 RDI: 0000000000000003 [ 212.018591] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 212.025845] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 212.033100] R13: 00000000004d8f38 R14: 00000000004c55ed R15: 0000000000000000 [ 212.040359] Modules linked in: [ 212.044650] Kernel Offset: disabled [ 212.048266] Rebooting in 86400 seconds..