[ 36.328219][ T25] audit: type=1800 audit(1554656016.629:27): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.361145][ T25] audit: type=1800 audit(1554656016.639:28): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.092918][ T25] audit: type=1800 audit(1554656017.449:29): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 37.119432][ T25] audit: type=1800 audit(1554656017.459:30): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.146' (ECDSA) to the list of known hosts. 2019/04/07 16:53:52 fuzzer started 2019/04/07 16:53:54 dialing manager at 10.128.0.26:34543 2019/04/07 16:53:54 syscalls: 2408 2019/04/07 16:53:54 code coverage: enabled 2019/04/07 16:53:54 comparison tracing: enabled 2019/04/07 16:53:54 extra coverage: extra coverage is not supported by the kernel 2019/04/07 16:53:54 setuid sandbox: enabled 2019/04/07 16:53:54 namespace sandbox: enabled 2019/04/07 16:53:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/07 16:53:54 fault injection: enabled 2019/04/07 16:53:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/07 16:53:54 net packet injection: enabled 2019/04/07 16:53:54 net device setup: enabled 16:56:05 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x2) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) syzkaller login: [ 185.120234][ T7726] IPVS: ftp: loaded support on port[0] = 21 16:56:05 executing program 1: mknod(&(0x7f0000000080)='./bus\x00', 0x2080008002, 0x20282a) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="000000186004008b00000d27febf0000000100000000000000fffffffe000000000002ff0004000000000000", 0x2c}], 0x1) [ 185.227067][ T7726] chnl_net:caif_netlink_parms(): no params data found [ 185.321048][ T7726] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.355158][ T7726] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.363893][ T7726] device bridge_slave_0 entered promiscuous mode [ 185.385494][ T7726] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.392680][ T7726] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.402504][ T7726] device bridge_slave_1 entered promiscuous mode [ 185.419145][ T7729] IPVS: ftp: loaded support on port[0] = 21 [ 185.447394][ T7726] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.460391][ T7726] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:56:05 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, 0x0, &(0x7f0000000e80)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000480)={0xb}, 0xb) openat(0xffffffffffffff9c, 0x0, 0x200001, 0x6) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)={@initdev, @local}, 0x10) mlockall(0x1) ftruncate(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000d40)={0x3, 'hsr0\x00', 0x3}, 0x18) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000c80)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)="222fb241f160c4f30b348a1f4d35f865f5b7ef350f8efd0ecdaf4d6a", 0x1c}], 0x1}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000800)="36f4bf9bf3647f7b60916a709c84eeb62350a30e2dccb4ce5803cf9335e2648a6759a76ee480fcbdaddcb98ebeda9d69546fc8f034370b17b352e762a9d05ff72563fbf3870f097610922682b470c6560cf0340ad0b0828d2919f1d2ac0ec644af20cca6a424e44f3e101495a104d0c712537eb2ba363e0e28ac46e896ad0aee101e5cc31143ad6b", 0x88}], 0x1, 0x0, 0x0, 0x40000}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x81}], 0x3, 0x1) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffff9) request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) [ 185.519062][ T7726] team0: Port device team_slave_0 added [ 185.539593][ T7726] team0: Port device team_slave_1 added [ 185.654603][ T7729] chnl_net:caif_netlink_parms(): no params data found 16:56:06 executing program 3: recvfrom$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff2e, 0x0, 0x0, 0xc79353489e04367d) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x8000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x2, 0x0, 0x26}) [ 185.748017][ T7726] device hsr_slave_0 entered promiscuous mode [ 185.805404][ T7726] device hsr_slave_1 entered promiscuous mode [ 185.855211][ T7726] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.862455][ T7726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.870397][ T7726] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.877619][ T7726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.914501][ T7732] IPVS: ftp: loaded support on port[0] = 21 [ 185.927328][ T7734] IPVS: ftp: loaded support on port[0] = 21 [ 185.986196][ T7729] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.993299][ T7729] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.002791][ T7729] device bridge_slave_0 entered promiscuous mode [ 186.011104][ T7729] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.018539][ T7729] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.026740][ T7729] device bridge_slave_1 entered promiscuous mode 16:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) dup2(r2, r1) [ 186.100868][ T7729] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.147784][ T7729] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.164785][ T7726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.252538][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.283406][ T2888] bridge0: port 1(bridge_slave_0) entered disabled state 16:56:06 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) close(r0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 186.302590][ T2888] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.312491][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 186.340994][ T7726] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.392609][ T7729] team0: Port device team_slave_0 added [ 186.407240][ T7734] chnl_net:caif_netlink_parms(): no params data found [ 186.451756][ T7729] team0: Port device team_slave_1 added [ 186.458471][ T7732] chnl_net:caif_netlink_parms(): no params data found [ 186.472897][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.482615][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.494672][ T2888] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.501844][ T2888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.510880][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.519583][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.527908][ T2888] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.535018][ T2888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.542542][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.551374][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.591506][ T7739] IPVS: ftp: loaded support on port[0] = 21 [ 186.629236][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.637829][ T7734] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.645779][ T7734] device bridge_slave_0 entered promiscuous mode [ 186.653138][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.662243][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.670635][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.679072][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.687721][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.696100][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.704798][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.709115][ T7743] IPVS: ftp: loaded support on port[0] = 21 [ 186.727432][ T7726] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.739146][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.756832][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.763905][ T7734] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.772280][ T7734] device bridge_slave_1 entered promiscuous mode [ 186.781918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.790565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.877883][ T7729] device hsr_slave_0 entered promiscuous mode [ 186.905274][ T7729] device hsr_slave_1 entered promiscuous mode [ 186.994844][ T7732] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.002660][ T7732] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.010641][ T7732] device bridge_slave_0 entered promiscuous mode [ 187.020575][ T7732] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.028053][ T7732] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.036122][ T7732] device bridge_slave_1 entered promiscuous mode [ 187.046852][ T7734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.056898][ T7734] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.104803][ T7732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.122883][ T7734] team0: Port device team_slave_0 added [ 187.132533][ T7726] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.142905][ T7732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.164871][ T7734] team0: Port device team_slave_1 added [ 187.312633][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 187.322605][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 187.327817][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 187.327845][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.347148][ T7749] Call Trace: [ 187.347178][ T7749] dump_stack+0x172/0x1f0 [ 187.347201][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 187.347218][ T7749] sk_mc_loop+0x1d/0x210 [ 187.347235][ T7749] ip_mc_output+0x2ef/0xf70 [ 187.347253][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 187.347275][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 187.354913][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 187.354929][ T7749] ? dst_release+0x62/0xb0 [ 187.354943][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 187.354961][ T7749] ip_local_out+0xc4/0x1b0 [ 187.354977][ T7749] ip_send_skb+0x42/0xf0 [ 187.355000][ T7749] ip_push_pending_frames+0x64/0x80 [ 187.364774][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 187.364794][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 187.364817][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 187.364841][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 187.374480][ T7749] ? ___might_sleep+0x163/0x280 [ 187.374498][ T7749] ? __might_sleep+0x95/0x190 [ 187.374520][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 187.384815][ T7749] ? aa_sk_perm+0x288/0x880 [ 187.384832][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 187.384862][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 187.394113][ T7749] inet_sendmsg+0x147/0x5e0 [ 187.394131][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 187.394143][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 187.394162][ T7749] ? ipip_gro_receive+0x100/0x100 [ 187.402806][ T7749] sock_sendmsg+0xdd/0x130 [ 187.402826][ T7749] kernel_sendmsg+0x44/0x50 [ 187.402849][ T7749] sock_no_sendpage+0x116/0x150 [ 187.412618][ T7749] ? sock_kfree_s+0x70/0x70 [ 187.412656][ T7749] inet_sendpage+0x44a/0x630 [ 187.412677][ T7749] kernel_sendpage+0x95/0xf0 [ 187.423056][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 187.423078][ T7749] sock_sendpage+0x8b/0xc0 [ 187.423095][ T7749] ? pipe_lock+0x6e/0x80 [ 187.423116][ T7749] pipe_to_sendpage+0x299/0x370 [ 187.432883][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 187.432903][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.432929][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.444781][ T7749] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 187.444803][ T7749] __splice_from_pipe+0x395/0x7d0 [ 187.444830][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.454642][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.454659][ T7749] splice_from_pipe+0x108/0x170 [ 187.454680][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 187.460787][ T7734] device hsr_slave_0 entered promiscuous mode [ 187.464745][ T7749] ? apparmor_file_permission+0x25/0x30 [ 187.464775][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.464800][ T7749] ? security_file_permission+0x94/0x380 [ 187.597533][ T7749] generic_splice_sendpage+0x3c/0x50 [ 187.602811][ T7749] ? splice_from_pipe+0x170/0x170 [ 187.607917][ T7749] do_splice+0x70a/0x13c0 [ 187.612240][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 187.617357][ T7749] ? __fget_light+0x1a9/0x230 [ 187.622050][ T7749] __x64_sys_splice+0x2c6/0x330 [ 187.626916][ T7749] do_syscall_64+0x103/0x610 [ 187.631509][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.637407][ T7749] RIP: 0033:0x4582b9 [ 187.641309][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.660905][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 187.669317][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 187.677289][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 187.685270][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 187.693258][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 187.701233][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 187.712935][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 187.722297][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 187.727450][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 187.736480][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.746541][ T7749] Call Trace: [ 187.749869][ T7749] dump_stack+0x172/0x1f0 [ 187.754226][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 187.759760][ T7749] sk_mc_loop+0x1d/0x210 [ 187.764009][ T7749] ip_mc_output+0x2ef/0xf70 [ 187.768526][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 187.773666][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 187.778509][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 187.783951][ T7749] ? dst_release+0x62/0xb0 [ 187.788351][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 187.793274][ T7749] ip_local_out+0xc4/0x1b0 [ 187.797694][ T7749] ip_send_skb+0x42/0xf0 [ 187.801918][ T7749] ip_push_pending_frames+0x64/0x80 [ 187.807100][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 187.811705][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 187.816647][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 187.822185][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 187.827138][ T7749] ? ___might_sleep+0x163/0x280 [ 187.831998][ T7749] ? __might_sleep+0x95/0x190 [ 187.836668][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 187.842297][ T7749] ? aa_sk_perm+0x288/0x880 [ 187.846787][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 187.852072][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 187.857621][ T7749] inet_sendmsg+0x147/0x5e0 [ 187.862105][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 187.867571][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 187.872234][ T7749] ? ipip_gro_receive+0x100/0x100 [ 187.877271][ T7749] sock_sendmsg+0xdd/0x130 [ 187.881673][ T7749] kernel_sendmsg+0x44/0x50 [ 187.886160][ T7749] sock_no_sendpage+0x116/0x150 [ 187.890994][ T7749] ? sock_kfree_s+0x70/0x70 [ 187.895507][ T7749] inet_sendpage+0x44a/0x630 [ 187.900097][ T7749] kernel_sendpage+0x95/0xf0 [ 187.904681][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 187.909462][ T7749] sock_sendpage+0x8b/0xc0 [ 187.913883][ T7749] ? pipe_lock+0x6e/0x80 [ 187.918133][ T7749] pipe_to_sendpage+0x299/0x370 [ 187.923184][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 187.927934][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.933203][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.939427][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 187.944875][ T7749] __splice_from_pipe+0x395/0x7d0 [ 187.949900][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.955196][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 187.960474][ T7749] splice_from_pipe+0x108/0x170 [ 187.965337][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 187.970287][ T7749] ? apparmor_file_permission+0x25/0x30 [ 187.975840][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.982070][ T7749] ? security_file_permission+0x94/0x380 [ 187.987698][ T7749] generic_splice_sendpage+0x3c/0x50 [ 187.992969][ T7749] ? splice_from_pipe+0x170/0x170 [ 187.997994][ T7749] do_splice+0x70a/0x13c0 [ 188.002313][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 188.007475][ T7749] ? __fget_light+0x1a9/0x230 [ 188.012141][ T7749] __x64_sys_splice+0x2c6/0x330 [ 188.016981][ T7749] do_syscall_64+0x103/0x610 [ 188.021563][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.027434][ T7749] RIP: 0033:0x4582b9 [ 188.031310][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.050910][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 188.059421][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 188.067397][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.075369][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 188.083326][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 188.091280][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 188.101389][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 188.110774][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 188.115469][ T7734] device hsr_slave_1 entered promiscuous mode [ 188.116042][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 188.130886][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.140925][ T7749] Call Trace: [ 188.144237][ T7749] dump_stack+0x172/0x1f0 [ 188.148592][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 188.154155][ T7749] sk_mc_loop+0x1d/0x210 [ 188.158393][ T7749] ip_mc_output+0x2ef/0xf70 [ 188.162908][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 188.168023][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 188.172860][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 188.178308][ T7749] ? dst_release+0x62/0xb0 [ 188.182707][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 188.187583][ T7749] ip_local_out+0xc4/0x1b0 [ 188.191991][ T7749] ip_send_skb+0x42/0xf0 [ 188.196219][ T7749] ip_push_pending_frames+0x64/0x80 [ 188.201415][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 188.205992][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 188.210936][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 188.216395][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 188.221325][ T7749] ? ___might_sleep+0x163/0x280 [ 188.226284][ T7749] ? __might_sleep+0x95/0x190 [ 188.230980][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 188.236642][ T7749] ? aa_sk_perm+0x288/0x880 [ 188.241141][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 188.246946][ T7749] inet_sendmsg+0x147/0x5e0 [ 188.251446][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 188.256891][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 188.261558][ T7749] ? ipip_gro_receive+0x100/0x100 [ 188.266582][ T7749] sock_sendmsg+0xdd/0x130 [ 188.270983][ T7749] kernel_sendmsg+0x44/0x50 [ 188.275468][ T7749] sock_no_sendpage+0x116/0x150 [ 188.280299][ T7749] ? sock_kfree_s+0x70/0x70 [ 188.284788][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 188.290497][ T7749] ? mark_held_locks+0xa4/0xf0 [ 188.295251][ T7749] inet_sendpage+0x44a/0x630 [ 188.299836][ T7749] kernel_sendpage+0x95/0xf0 [ 188.304418][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 188.309085][ T7749] sock_sendpage+0x8b/0xc0 [ 188.313498][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 188.318774][ T7749] pipe_to_sendpage+0x299/0x370 [ 188.323636][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 188.328392][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.333664][ T7749] ? __put_page+0x92/0xd0 [ 188.339097][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 188.344550][ T7749] __splice_from_pipe+0x395/0x7d0 [ 188.349567][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.354854][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.360141][ T7749] splice_from_pipe+0x108/0x170 [ 188.364992][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 188.373996][ T7749] ? apparmor_file_permission+0x25/0x30 [ 188.379530][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.385773][ T7749] ? security_file_permission+0x94/0x380 [ 188.391419][ T7749] generic_splice_sendpage+0x3c/0x50 [ 188.396697][ T7749] ? splice_from_pipe+0x170/0x170 [ 188.401705][ T7749] do_splice+0x70a/0x13c0 [ 188.406023][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 188.411125][ T7749] ? __fget_light+0x1a9/0x230 [ 188.415807][ T7749] __x64_sys_splice+0x2c6/0x330 [ 188.420659][ T7749] do_syscall_64+0x103/0x610 [ 188.425238][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.431113][ T7749] RIP: 0033:0x4582b9 [ 188.434993][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.454600][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 188.463000][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 188.470960][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.478943][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 188.486912][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 188.494897][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 188.504587][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 188.513959][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 188.519148][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 188.528208][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.538351][ T7749] Call Trace: [ 188.541633][ T7749] dump_stack+0x172/0x1f0 [ 188.545957][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 188.551509][ T7749] sk_mc_loop+0x1d/0x210 [ 188.555739][ T7749] ip_mc_output+0x2ef/0xf70 [ 188.560255][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 188.565366][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 188.570219][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 188.575660][ T7749] ? dst_release+0x62/0xb0 [ 188.580079][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 188.584941][ T7749] ip_local_out+0xc4/0x1b0 [ 188.589369][ T7749] ip_send_skb+0x42/0xf0 [ 188.593596][ T7749] ip_push_pending_frames+0x64/0x80 [ 188.598792][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 188.603418][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 188.608378][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 188.613840][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 188.618779][ T7749] ? ___might_sleep+0x163/0x280 [ 188.623615][ T7749] ? __might_sleep+0x95/0x190 [ 188.628301][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 188.633930][ T7749] ? aa_sk_perm+0x288/0x880 [ 188.638427][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 188.643960][ T7749] inet_sendmsg+0x147/0x5e0 [ 188.648448][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 188.653891][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 188.658553][ T7749] ? ipip_gro_receive+0x100/0x100 [ 188.663570][ T7749] sock_sendmsg+0xdd/0x130 [ 188.667989][ T7749] kernel_sendmsg+0x44/0x50 [ 188.672486][ T7749] sock_no_sendpage+0x116/0x150 [ 188.677319][ T7749] ? sock_kfree_s+0x70/0x70 [ 188.681809][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 188.687521][ T7749] ? mark_held_locks+0xa4/0xf0 [ 188.692465][ T7749] inet_sendpage+0x44a/0x630 [ 188.697081][ T7749] kernel_sendpage+0x95/0xf0 [ 188.701652][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 188.706319][ T7749] sock_sendpage+0x8b/0xc0 [ 188.710717][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 188.715987][ T7749] pipe_to_sendpage+0x299/0x370 [ 188.720823][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 188.725587][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.731245][ T7749] ? __put_page+0x92/0xd0 [ 188.735567][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 188.741056][ T7749] __splice_from_pipe+0x395/0x7d0 [ 188.746165][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.751439][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 188.756800][ T7749] splice_from_pipe+0x108/0x170 [ 188.761637][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 188.766591][ T7749] ? apparmor_file_permission+0x25/0x30 [ 188.772134][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.778368][ T7749] ? security_file_permission+0x94/0x380 [ 188.784032][ T7749] generic_splice_sendpage+0x3c/0x50 [ 188.789319][ T7749] ? splice_from_pipe+0x170/0x170 [ 188.794330][ T7749] do_splice+0x70a/0x13c0 [ 188.798668][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 188.803768][ T7749] ? __fget_light+0x1a9/0x230 [ 188.808433][ T7749] __x64_sys_splice+0x2c6/0x330 [ 188.813290][ T7749] do_syscall_64+0x103/0x610 [ 188.817871][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.823768][ T7749] RIP: 0033:0x4582b9 [ 188.827664][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.847264][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 188.855688][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 188.863663][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 188.871627][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 188.879598][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 188.887576][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 188.897114][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 188.906649][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 188.911693][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 188.920705][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.926470][ T7732] team0: Port device team_slave_0 added [ 188.930782][ T7749] Call Trace: [ 188.939713][ T7749] dump_stack+0x172/0x1f0 [ 188.939738][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 188.939761][ T7749] sk_mc_loop+0x1d/0x210 [ 188.949644][ T7749] ip_mc_output+0x2ef/0xf70 [ 188.949663][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 188.949675][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 188.949690][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 188.949702][ T7749] ? dst_release+0x62/0xb0 [ 188.949717][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 188.949737][ T7749] ip_local_out+0xc4/0x1b0 [ 188.963598][ T7749] ip_send_skb+0x42/0xf0 [ 188.963617][ T7749] ip_push_pending_frames+0x64/0x80 [ 188.963638][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 188.973947][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 188.973981][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 188.983275][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 188.983308][ T7749] ? ___might_sleep+0x163/0x280 [ 188.991950][ T7749] ? __might_sleep+0x95/0x190 [ 188.991971][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 188.991992][ T7749] ? aa_sk_perm+0x288/0x880 [ 189.001874][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.001897][ T7749] inet_sendmsg+0x147/0x5e0 [ 189.012275][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.012289][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 189.012311][ T7749] ? ipip_gro_receive+0x100/0x100 [ 189.022091][ T7749] sock_sendmsg+0xdd/0x130 [ 189.022111][ T7749] kernel_sendmsg+0x44/0x50 [ 189.022132][ T7749] sock_no_sendpage+0x116/0x150 [ 189.032428][ T7749] ? sock_kfree_s+0x70/0x70 [ 189.032451][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 189.032477][ T7749] ? mark_held_locks+0xa4/0xf0 [ 189.042521][ T7749] inet_sendpage+0x44a/0x630 [ 189.042551][ T7749] kernel_sendpage+0x95/0xf0 [ 189.042570][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 189.053590][ T7749] sock_sendpage+0x8b/0xc0 [ 189.053608][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.053631][ T7749] pipe_to_sendpage+0x299/0x370 [ 189.063446][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 189.063467][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.063490][ T7749] ? __put_page+0x92/0xd0 [ 189.072399][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 189.072420][ T7749] __splice_from_pipe+0x395/0x7d0 [ 189.072441][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.081878][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.081894][ T7749] splice_from_pipe+0x108/0x170 [ 189.081916][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 189.092497][ T7749] ? apparmor_file_permission+0x25/0x30 [ 189.092516][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.092540][ T7749] ? security_file_permission+0x94/0x380 [ 189.101712][ T7749] generic_splice_sendpage+0x3c/0x50 [ 189.101727][ T7749] ? splice_from_pipe+0x170/0x170 [ 189.101747][ T7749] do_splice+0x70a/0x13c0 [ 189.110838][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 189.110865][ T7749] ? __fget_light+0x1a9/0x230 [ 189.120982][ T7749] __x64_sys_splice+0x2c6/0x330 [ 189.121015][ T7749] do_syscall_64+0x103/0x610 [ 189.131194][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.131208][ T7749] RIP: 0033:0x4582b9 [ 189.131228][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.140985][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.141000][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 189.141008][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.141016][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 189.141032][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 189.151317][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 189.152906][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 189.166586][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 189.178431][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.178440][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.178446][ T7749] Call Trace: [ 189.178471][ T7749] dump_stack+0x172/0x1f0 [ 189.178496][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 189.178515][ T7749] sk_mc_loop+0x1d/0x210 [ 189.178537][ T7749] ip_mc_output+0x2ef/0xf70 [ 189.194669][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.194684][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 189.194706][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 189.204140][ T7749] ? dst_release+0x62/0xb0 [ 189.204160][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 189.204180][ T7749] ip_local_out+0xc4/0x1b0 [ 189.213816][ T7749] ip_send_skb+0x42/0xf0 [ 189.213835][ T7749] ip_push_pending_frames+0x64/0x80 [ 189.213854][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 189.224457][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 189.224482][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.224505][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 189.248037][ T7749] ? ___might_sleep+0x163/0x280 [ 189.248055][ T7749] ? __might_sleep+0x95/0x190 [ 189.248074][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.248088][ T7749] ? aa_sk_perm+0x288/0x880 [ 189.248112][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.248135][ T7749] inet_sendmsg+0x147/0x5e0 [ 189.264625][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.264639][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 189.264653][ T7749] ? ipip_gro_receive+0x100/0x100 [ 189.264679][ T7749] sock_sendmsg+0xdd/0x130 [ 189.280716][ T7749] kernel_sendmsg+0x44/0x50 [ 189.280734][ T7749] sock_no_sendpage+0x116/0x150 [ 189.280748][ T7749] ? sock_kfree_s+0x70/0x70 [ 189.280769][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 189.280793][ T7749] ? mark_held_locks+0xa4/0xf0 [ 189.280814][ T7749] inet_sendpage+0x44a/0x630 [ 189.296805][ T7749] kernel_sendpage+0x95/0xf0 [ 189.296820][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 189.296836][ T7749] sock_sendpage+0x8b/0xc0 [ 189.296851][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.296869][ T7749] pipe_to_sendpage+0x299/0x370 [ 189.296891][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 189.311215][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.311234][ T7749] ? __put_page+0x92/0xd0 [ 189.311258][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 189.330447][ T7749] __splice_from_pipe+0x395/0x7d0 [ 189.330464][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.330483][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.330497][ T7749] splice_from_pipe+0x108/0x170 [ 189.330512][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 189.330535][ T7749] ? apparmor_file_permission+0x25/0x30 [ 189.330564][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.338165][ T7749] ? security_file_permission+0x94/0x380 [ 189.338188][ T7749] generic_splice_sendpage+0x3c/0x50 [ 189.338201][ T7749] ? splice_from_pipe+0x170/0x170 [ 189.338216][ T7749] do_splice+0x70a/0x13c0 [ 189.338248][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 189.348080][ T7749] ? __fget_light+0x1a9/0x230 [ 189.348110][ T7749] __x64_sys_splice+0x2c6/0x330 [ 189.357987][ T7749] do_syscall_64+0x103/0x610 [ 189.358008][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.358020][ T7749] RIP: 0033:0x4582b9 [ 189.358036][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.358043][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.358057][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 189.358073][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.368365][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 189.368375][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 189.368384][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 189.369968][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 189.377871][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 189.377889][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.377898][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.377903][ T7749] Call Trace: [ 189.377922][ T7749] dump_stack+0x172/0x1f0 [ 189.377945][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 189.377960][ T7749] sk_mc_loop+0x1d/0x210 [ 189.377982][ T7749] ip_mc_output+0x2ef/0xf70 [ 189.391840][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.401355][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 189.401374][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 189.401395][ T7749] ? dst_release+0x62/0xb0 [ 189.411778][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 189.411797][ T7749] ip_local_out+0xc4/0x1b0 [ 189.411819][ T7749] ip_send_skb+0x42/0xf0 [ 189.421346][ T7749] ip_push_pending_frames+0x64/0x80 [ 189.421363][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 189.421387][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 189.431552][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.431581][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 189.441635][ T7749] ? ___might_sleep+0x163/0x280 [ 189.441656][ T7749] ? __might_sleep+0x95/0x190 [ 189.452768][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.452792][ T7749] ? aa_sk_perm+0x288/0x880 [ 189.462245][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.462275][ T7749] inet_sendmsg+0x147/0x5e0 [ 189.471623][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.471637][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 189.471658][ T7749] ? ipip_gro_receive+0x100/0x100 [ 189.481888][ T7749] sock_sendmsg+0xdd/0x130 [ 189.481908][ T7749] kernel_sendmsg+0x44/0x50 [ 189.481929][ T7749] sock_no_sendpage+0x116/0x150 [ 189.491278][ T7749] ? sock_kfree_s+0x70/0x70 [ 189.491301][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 189.491326][ T7749] ? mark_held_locks+0xa4/0xf0 [ 189.500828][ T7749] inet_sendpage+0x44a/0x630 [ 189.500851][ T7749] kernel_sendpage+0x95/0xf0 [ 189.500862][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 189.500891][ T7749] sock_sendpage+0x8b/0xc0 [ 189.510631][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.510652][ T7749] pipe_to_sendpage+0x299/0x370 [ 189.510671][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 189.510692][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.520405][ T7749] ? __put_page+0x92/0xd0 [ 189.520426][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 189.520450][ T7749] __splice_from_pipe+0x395/0x7d0 [ 189.530076][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.530098][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.530119][ T7749] splice_from_pipe+0x108/0x170 [ 189.540607][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 189.540632][ T7749] ? apparmor_file_permission+0x25/0x30 [ 189.540655][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.551221][ T7749] ? security_file_permission+0x94/0x380 [ 189.551246][ T7749] generic_splice_sendpage+0x3c/0x50 [ 189.551266][ T7749] ? splice_from_pipe+0x170/0x170 [ 189.561054][ T7749] do_splice+0x70a/0x13c0 [ 189.561081][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 189.561102][ T7749] ? __fget_light+0x1a9/0x230 [ 189.572875][ T7749] __x64_sys_splice+0x2c6/0x330 [ 189.572902][ T7749] do_syscall_64+0x103/0x610 [ 189.572926][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.583838][ T7749] RIP: 0033:0x4582b9 [ 189.583854][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.583862][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.593227][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 189.593236][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.593244][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 189.593253][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 189.593269][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 189.606978][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 189.618667][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 189.642443][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.642454][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.642459][ T7749] Call Trace: [ 189.642488][ T7749] dump_stack+0x172/0x1f0 [ 189.642513][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 189.642536][ T7749] sk_mc_loop+0x1d/0x210 [ 189.658925][ T7749] ip_mc_output+0x2ef/0xf70 [ 189.658954][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.675244][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 189.675263][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 189.675278][ T7749] ? dst_release+0x62/0xb0 [ 189.675293][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 189.675313][ T7749] ip_local_out+0xc4/0x1b0 [ 189.691264][ T7749] ip_send_skb+0x42/0xf0 [ 189.691281][ T7749] ip_push_pending_frames+0x64/0x80 [ 189.691297][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 189.691314][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 189.691336][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.705632][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 189.705666][ T7749] ? ___might_sleep+0x163/0x280 [ 189.705686][ T7749] ? __might_sleep+0x95/0x190 [ 189.724750][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.724776][ T7749] ? aa_sk_perm+0x288/0x880 [ 189.724801][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.732399][ T7749] inet_sendmsg+0x147/0x5e0 [ 189.732416][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.732435][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 189.742210][ T7749] ? ipip_gro_receive+0x100/0x100 [ 189.742231][ T7749] sock_sendmsg+0xdd/0x130 [ 189.742252][ T7749] kernel_sendmsg+0x44/0x50 [ 189.751867][ T7749] sock_no_sendpage+0x116/0x150 [ 189.751883][ T7749] ? sock_kfree_s+0x70/0x70 [ 189.751909][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 189.762292][ T7749] ? mark_held_locks+0xa4/0xf0 [ 189.762318][ T7749] inet_sendpage+0x44a/0x630 [ 189.771587][ T7749] kernel_sendpage+0x95/0xf0 [ 189.771602][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 189.771623][ T7749] sock_sendpage+0x8b/0xc0 [ 189.780258][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.780280][ T7749] pipe_to_sendpage+0x299/0x370 [ 189.780302][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 189.790083][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.790103][ T7749] ? __put_page+0x92/0xd0 [ 189.790126][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 189.800595][ T7749] __splice_from_pipe+0x395/0x7d0 [ 189.800613][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.800634][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 189.810409][ T7749] splice_from_pipe+0x108/0x170 [ 189.810427][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 189.810452][ T7749] ? apparmor_file_permission+0x25/0x30 [ 189.820735][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.820757][ T7749] ? security_file_permission+0x94/0x380 [ 189.820783][ T7749] generic_splice_sendpage+0x3c/0x50 [ 189.830905][ T7749] ? splice_from_pipe+0x170/0x170 [ 189.830921][ T7749] do_splice+0x70a/0x13c0 [ 189.830945][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 189.840902][ T7749] ? __fget_light+0x1a9/0x230 [ 189.840924][ T7749] __x64_sys_splice+0x2c6/0x330 [ 189.840949][ T7749] do_syscall_64+0x103/0x610 [ 189.850640][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.850653][ T7749] RIP: 0033:0x4582b9 [ 189.850670][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.850691][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.859615][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 189.859624][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.859632][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 189.859641][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 189.859650][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 189.861789][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 189.874831][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 189.884251][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.884260][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.884265][ T7749] Call Trace: [ 189.884296][ T7749] dump_stack+0x172/0x1f0 [ 189.893553][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 189.893574][ T7749] sk_mc_loop+0x1d/0x210 [ 189.903260][ T7749] ip_mc_output+0x2ef/0xf70 [ 189.903282][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.903301][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 189.913071][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 189.913087][ T7749] ? dst_release+0x62/0xb0 [ 189.913108][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 189.922717][ T7749] ip_local_out+0xc4/0x1b0 [ 189.922737][ T7749] ip_send_skb+0x42/0xf0 [ 189.922792][ T7749] ip_push_pending_frames+0x64/0x80 [ 189.933255][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 189.933274][ T7749] ? __lock_acquire+0x4d2/0x3fb0 [ 189.933297][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.943858][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 189.943891][ T7749] ? ___might_sleep+0x163/0x280 [ 189.953682][ T7749] ? __might_sleep+0x95/0x190 [ 189.953703][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.953725][ T7749] ? aa_sk_perm+0x288/0x880 [ 189.965508][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.965529][ T7749] inet_sendmsg+0x147/0x5e0 [ 189.965544][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 189.965567][ T7749] ? inet_sendmsg+0x147/0x5e0 [ 189.976649][ T7749] ? ipip_gro_receive+0x100/0x100 [ 189.976669][ T7749] sock_sendmsg+0xdd/0x130 [ 189.976687][ T7749] kernel_sendmsg+0x44/0x50 [ 189.976704][ T7749] sock_no_sendpage+0x116/0x150 [ 189.976724][ T7749] ? sock_kfree_s+0x70/0x70 [ 189.986070][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 189.986096][ T7749] ? mark_held_locks+0xa4/0xf0 [ 189.986115][ T7749] inet_sendpage+0x44a/0x630 [ 189.986139][ T7749] kernel_sendpage+0x95/0xf0 [ 189.995935][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 189.995955][ T7749] sock_sendpage+0x8b/0xc0 [ 189.995970][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.995990][ T7749] pipe_to_sendpage+0x299/0x370 [ 189.996011][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 190.005439][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.005457][ T7749] ? __put_page+0x92/0xd0 [ 190.005476][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 190.005497][ T7749] __splice_from_pipe+0x395/0x7d0 [ 190.015356][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.015376][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.015398][ T7749] splice_from_pipe+0x108/0x170 [ 190.043444][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 190.043471][ T7749] ? apparmor_file_permission+0x25/0x30 [ 190.043497][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.059666][ T7749] ? security_file_permission+0x94/0x380 [ 190.059691][ T7749] generic_splice_sendpage+0x3c/0x50 [ 190.059705][ T7749] ? splice_from_pipe+0x170/0x170 [ 190.059719][ T7749] do_splice+0x70a/0x13c0 [ 190.059743][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 190.075732][ T7749] ? __fget_light+0x1a9/0x230 [ 190.075753][ T7749] __x64_sys_splice+0x2c6/0x330 [ 190.075777][ T7749] do_syscall_64+0x103/0x610 [ 190.075797][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.075809][ T7749] RIP: 0033:0x4582b9 [ 190.075831][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.093060][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 190.093075][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 190.093083][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 190.093091][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 190.093099][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 190.093108][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 190.094731][ T7749] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7749 [ 190.107377][ T7749] caller is sk_mc_loop+0x1d/0x210 [ 190.125149][ T7749] CPU: 1 PID: 7749 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 190.125165][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.134939][ T7749] Call Trace: [ 190.134964][ T7749] dump_stack+0x172/0x1f0 [ 190.134989][ T7749] __this_cpu_preempt_check+0x246/0x270 [ 190.135011][ T7749] sk_mc_loop+0x1d/0x210 [ 190.144629][ T7749] ip_mc_output+0x2ef/0xf70 16:56:11 executing program 0: [ 190.154915][ T7749] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 190.154930][ T7749] ? __ip_make_skb+0xf15/0x1820 [ 190.154948][ T7749] ? ip_append_data.part.0+0x170/0x170 [ 190.154962][ T7749] ? dst_release+0x62/0xb0 [ 190.154982][ T7749] ? __ip_make_skb+0xf93/0x1820 [ 190.164242][ T7749] ip_local_out+0xc4/0x1b0 [ 190.164261][ T7749] ip_send_skb+0x42/0xf0 [ 190.164281][ T7749] ip_push_pending_frames+0x64/0x80 [ 190.172915][ T7749] raw_sendmsg+0x1e6d/0x2f20 [ 190.172934][ T7749] ? __lock_acquire+0x4d2/0x3fb0 16:56:11 executing program 0: 16:56:11 executing program 0: [ 190.172956][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 190.182824][ T7749] ? __lock_acquire+0x548/0x3fb0 [ 190.182857][ T7749] ? ___might_sleep+0x163/0x280 [ 190.193232][ T7749] ? __might_sleep+0x95/0x190 [ 190.193252][ T7749] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 190.193273][ T7749] ? aa_sk_perm+0x288/0x880 [ 190.203063][ T7749] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 190.203085][ T7749] inet_sendmsg+0x147/0x5e0 [ 190.203106][ T7749] ? compat_raw_getsockopt+0x100/0x100 [ 190.213393][ T7749] ? inet_sendmsg+0x147/0x5e0 16:56:11 executing program 0: 16:56:11 executing program 0: [ 190.213408][ T7749] ? ipip_gro_receive+0x100/0x100 [ 190.213434][ T7749] sock_sendmsg+0xdd/0x130 [ 190.223492][ T7749] kernel_sendmsg+0x44/0x50 [ 190.223511][ T7749] sock_no_sendpage+0x116/0x150 [ 190.223534][ T7749] ? sock_kfree_s+0x70/0x70 [ 190.233497][ T7749] ? debug_check_no_obj_freed+0x211/0x444 [ 190.233531][ T7749] ? mark_held_locks+0xa4/0xf0 [ 190.243214][ T7749] inet_sendpage+0x44a/0x630 [ 190.243246][ T7749] kernel_sendpage+0x95/0xf0 [ 190.252145][ T7749] ? inet_sendmsg+0x5e0/0x5e0 [ 190.252168][ T7749] sock_sendpage+0x8b/0xc0 16:56:11 executing program 0: [ 190.252190][ T7749] ? lockdep_hardirqs_on+0x418/0x5d0 [ 190.261532][ T7749] pipe_to_sendpage+0x299/0x370 [ 190.261567][ T7749] ? kernel_sendpage+0xf0/0xf0 [ 190.272136][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.272155][ T7749] ? __put_page+0x92/0xd0 [ 190.272179][ T7749] ? anon_pipe_buf_release+0x1c6/0x270 [ 190.281364][ T7749] __splice_from_pipe+0x395/0x7d0 [ 190.281381][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.281403][ T7749] ? direct_splice_actor+0x1a0/0x1a0 [ 190.290490][ T7749] splice_from_pipe+0x108/0x170 16:56:11 executing program 0: [ 190.290510][ T7749] ? splice_shrink_spd+0xd0/0xd0 [ 190.290535][ T7749] ? apparmor_file_permission+0x25/0x30 [ 190.300691][ T7749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.300711][ T7749] ? security_file_permission+0x94/0x380 [ 190.300743][ T7749] generic_splice_sendpage+0x3c/0x50 [ 190.310896][ T7749] ? splice_from_pipe+0x170/0x170 [ 190.310912][ T7749] do_splice+0x70a/0x13c0 [ 190.310942][ T7749] ? opipe_prep.part.0+0x2d0/0x2d0 [ 190.320750][ T7749] ? __fget_light+0x1a9/0x230 [ 190.320779][ T7749] __x64_sys_splice+0x2c6/0x330 [ 190.320805][ T7749] do_syscall_64+0x103/0x610 [ 190.331119][ T7749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.331133][ T7749] RIP: 0033:0x4582b9 [ 190.331153][ T7749] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.342813][ T7749] RSP: 002b:00007f43232e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 190.342829][ T7749] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 190.342836][ T7749] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 190.342844][ T7749] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 190.342860][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f43232e26d4 [ 190.353343][ T7749] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 191.311886][ T7732] team0: Port device team_slave_1 added [ 191.320554][ T7739] chnl_net:caif_netlink_parms(): no params data found [ 191.335614][ T7743] chnl_net:caif_netlink_parms(): no params data found [ 191.426848][ T7732] device hsr_slave_0 entered promiscuous mode [ 191.475463][ T7732] device hsr_slave_1 entered promiscuous mode [ 191.569189][ T7739] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.576593][ T7739] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.584158][ T7739] device bridge_slave_0 entered promiscuous mode [ 191.614112][ T7729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.623044][ T7739] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.630417][ T7739] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.638310][ T7739] device bridge_slave_1 entered promiscuous mode [ 191.672867][ T7743] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.680417][ T7743] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.688244][ T7743] device bridge_slave_0 entered promiscuous mode [ 191.704816][ T7739] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.716178][ T7743] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.723265][ T7743] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.733446][ T7743] device bridge_slave_1 entered promiscuous mode [ 191.755900][ T7739] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.779796][ T7734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.801824][ T7739] team0: Port device team_slave_0 added [ 191.809369][ T7743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.820536][ T7743] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.847166][ T7739] team0: Port device team_slave_1 added [ 191.864086][ T7743] team0: Port device team_slave_0 added [ 191.872939][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.881249][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.895480][ T7729] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.915720][ T7743] team0: Port device team_slave_1 added [ 191.966895][ T7739] device hsr_slave_0 entered promiscuous mode [ 192.025449][ T7739] device hsr_slave_1 entered promiscuous mode [ 192.076231][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.083893][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.092367][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.100904][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.109545][ T2888] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.117206][ T2888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.125480][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.152765][ T7734] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.161385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.170593][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.179157][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.186265][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.267145][ T7743] device hsr_slave_0 entered promiscuous mode [ 192.315330][ T7743] device hsr_slave_1 entered promiscuous mode [ 192.372922][ T7732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.381985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.390929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.400498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.409426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.434393][ T7732] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.443002][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.451256][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.460018][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.468500][ T2888] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.475599][ T2888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.483514][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.492273][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.500581][ T2888] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.507687][ T2888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.515536][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.523183][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.530967][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.539693][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.548673][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.576582][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.586332][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.594796][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.603711][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.610811][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.619151][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.627783][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.636837][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.645233][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.652278][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.659970][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.668523][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.677423][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.685809][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.694003][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.702342][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.711349][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.719307][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.737501][ T7729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.757304][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.766090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.774547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.788475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.797087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.805429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.831636][ T7734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.842806][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.866774][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.878730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.919357][ T7743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.932447][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.941709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.950341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.958939][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.967685][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.976043][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.984146][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.997704][ T7732] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.010191][ T7732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.028320][ T7734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.036929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.048831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.057101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.064654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.076426][ T7729] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.097839][ T7743] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.110537][ T7739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.132871][ T7732] 8021q: adding VLAN 0 to HW filter on device batadv0 16:56:13 executing program 1: [ 193.175427][ T7739] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.198638][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.211520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.228976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.255610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.264057][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.271176][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.284657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.293507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.303307][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.310455][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.318654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.328520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.366291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.374646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.391812][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.403300][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.410427][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.419269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.428118][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.440793][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.448860][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.469436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.487319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.496319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.504816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.514206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.523247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.532481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.541260][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.550227][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.566664][ T7739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.577663][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.586377][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.594511][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.622254][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.631348][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.646031][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.661193][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.671042][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.680717][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.689276][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.710790][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.720103][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.737927][ T7743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.762242][ T7739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.815447][ T7743] 8021q: adding VLAN 0 to HW filter on device batadv0 16:56:14 executing program 2: 16:56:14 executing program 0: 16:56:14 executing program 1: 16:56:14 executing program 5: 16:56:14 executing program 3: 16:56:14 executing program 4: 16:56:14 executing program 1: 16:56:14 executing program 0: 16:56:14 executing program 4: 16:56:14 executing program 5: 16:56:14 executing program 3: 16:56:14 executing program 1: 16:56:14 executing program 2: 16:56:14 executing program 0: 16:56:14 executing program 5: 16:56:14 executing program 1: 16:56:14 executing program 4: 16:56:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000002c0)=0x411) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) dup2(r0, r2) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000180), 0x4) 16:56:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='\x00\xbc\xce\x9b\"\x1d\xcc\x1d\x81\x95d%cw@9\x98\xf3g\xb8C\x0eb\xeb\x8e]\xb0U9\x8d[iZM{\x1a\xf0\xb3\xc2 \x9a\xf6\xc4B\xcc\x18\x92c\xf4\"\x89\xef\x85\x9f\x81\xb2\x18\xd6\xb4\x83\x82}#\xc8\xc1.\fE\xf3P\x93\x17B\x87$\xc1\xf8\xa8\x8f\xf2\'<\xddS\x81\xc2`\xfc\xc5\xf4}\xa1\xe4\xaa\xa3g!r\x9b\xa6$e\xd1\ru\xf2^\xc0\xe6J\xd0\x93\x17\xb8\xca%\xa764\xe6\xcct\xcf\x91B\x1a\rT1E\x83\xfey\x04\xa2\x84\\}\xbd\xddOp4Z\x87S\t\x96\xd7q\x8d\x84\x1cOS\xe9\xc5\x87\xec\x13\a\"\x0e\xe8\xa5\n\"\xdd\x81V\xed\xca\xc5\x91FnA\xfaA\x9f\xc8\xb9F\xdb\xec\x1b?#\xb9\x13\xafh\xf6\xab>,\xc7\xbb\xbbU9\xef\xb5\xb4\xe9\xf9\r\xc6\x1c\xdc\x1a\xf0\x0fw6\xb7\x99\x92\x9e\vG\xb4R\xd2cY>\xdd\xf3K\x1aOOP\xdcbW\xc9\xf5\xefHi\xd6\x93\x15#\xaf\xec\xac\xe8\x16\xd5\x1e\xd1\x05\x062\x11\xba9\xb1\x1b\xfcS\xaf$\x1a\xf9<;\r\x9a\xe19\xa4[\x04\x90\xc9e\x82\xee\xb5ZS\x06pA\x15\xa9\xb4\xf2\xbd\xf8\x82\x12r\xb5\x9d\xe5\x02\x15X;D\xbew\x88|\xb4\xe5lg\x8bw:Q\x10\xceZM\xc6\x83S\xe5c\xca\xad+r\xbf\xdb\x17c\xf4D\xa4\x1d\xb6\xbf\x98\x06\xb7\xcf(\"\x80_\xe9\xbd7G\xbf#\xdbP\xd1E\xb4s\x15\xe5Z\xbdS\x89:\xe7\xf9\xbf\x99$\x87o\x12\x184C>\x96\vo\xa2M\xf7\xd3\xe9\xe1\xd2\x1eA\xec5T!\xf6\\\xdc\x8a\xac\x96\xb7U\x16\xa9\xc6\xeb\x92\x01H%\v\x13\x81J\x87\x82\x10\x19V\xb6\xb5Y\xa4\xd4h\xdf\xdf`\xd9\xb1`\xb1', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) sendfile(r0, r0, 0x0, 0x24000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:56:14 executing program 5: 16:56:14 executing program 0: 16:56:14 executing program 1: 16:56:14 executing program 5: 16:56:14 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x0, 0x20}, 0xc) 16:56:15 executing program 3: unshare(0x2000400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x3, &(0x7f00000affc8)=@framed, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r0, 0xfffffffffffffdd4, 0x0}, 0x10) 16:56:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) write$binfmt_aout(r0, 0x0, 0x0) 16:56:15 executing program 2: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') 16:56:15 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/122, 0x425}, {&(0x7f0000000440)=""/109, 0xffc8}, {&(0x7f0000000040)=""/202}, {&(0x7f0000000180)=""/9}, {&(0x7f0000000280)=""/96}, {&(0x7f0000000300)=""/167, 0x28}, {&(0x7f0000000000)=""/40}], 0x2, 0x0) mknod(&(0x7f00000001c0)='./bus\x00', 0x8003, 0xa6138) r0 = open(&(0x7f0000001ac0)='./bus\x00', 0x301, 0x0) pwritev(r0, &(0x7f00000002c0), 0x88, 0x0) pwritev(r0, &(0x7f0000000280), 0x1000000000000042, 0x0) 16:56:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) r1 = syz_open_pts(r0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(r1, 0x8, 0x0) 16:56:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) write$ppp(r1, &(0x7f0000000200)="912437", 0x3) read(r0, 0x0, 0x0) 16:56:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x5}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 16:56:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) unlinkat(r0, 0x0, 0x8) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) getdents(r0, &(0x7f00000000c0)=""/4096, 0x1000) 16:56:15 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) read(r0, &(0x7f0000000140)=""/226, 0xe2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x2000005) 16:56:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 16:56:15 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000780)={0x81, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x500}) 16:56:15 executing program 3: 16:56:15 executing program 2: socketpair$unix(0x1, 0x1000000000080005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 16:56:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000140)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 16:56:15 executing program 0: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000004c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x102f9) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_group_source_req(r2, 0x29, 0x2000000002c, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) fcntl$setstatus(r3, 0x4, 0x42803) [ 195.176485][ T7892] usb usb3: usbfs: process 7892 (syz-executor.5) did not claim interface 0 before use 16:56:15 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="2321202e2f66696c282ef1fd64f176f7f8076647504c72656375726974766d6e657431657e0ef8d0416d3125232073656c662320657468312065ed31716e6f6465766d643573756d200100000070726f63202f6465642300202f642f6361726023004c5744d3611e6420636966732e7372676f4cb85da4324c5744d3611e640a17fe4c0800000047725ea45eb30604d5660826a1e4e933b6f1c0e90be92db8de55f9a53afbaf870e2c4ca35c5248863f4d867c2615f994014fb20ab05c7ebf8eccb13abf90b015e1c8ecededfff49e56156c9f0dd3d1d02f5669000000000000000000fffff8320854ceb29fba9c0100000000000000000000000000586f636ac24726550ff04cb8d15316990b3c0081b3a401e32ff8309c91a0fb8486c9011f0a2f9317327fc16d3e4f649985a96629c4fa507651d816a6a6aeb0c9557075e82d296d000683c446c3caa563b3f7858a25da22600e71a344b0f89634646900020000000000005b2edb6228165696821e6287c3609530a3000000000000000000000000008085e4df7d7bfa04f907adc42626fd599dba96f792834d05469f3114e976957d0aee3c40beeced1e724eaf1d6d77c0c8d00d156cacdf6c3865a78f3691655907c08265acb22d22fd7aebca827a3651bc361d5bc647ae954911455b9181f6e44956e844a001ce45a35ebab989cc84f6787b667adc8484fb0b532a00054042862b1e7d839c67375623fada390f43b46060590e3d8b23576e9995c33123714ab0d449de464c0180d3cc13dd98d2ba0d6f831ec1e931749509b0cb8ed892e499770556319024392f1f754992214714d30aa427026220591a5a22926aa06d0eb0e14d19c1cd5f2b6d1743f039fa0fe73270c9fbae1b10386709e76b79fef093890cb5afd3543423ad604344b261360740742f01495d"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:15 executing program 4: 16:56:15 executing program 5: 16:56:15 executing program 1: 16:56:15 executing program 5: 16:56:15 executing program 4: [ 195.416774][ C1] hrtimer: interrupt took 30898 ns 16:56:15 executing program 1: [ 195.535603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.535825][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 195.541621][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 195.547415][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:56:15 executing program 5: 16:56:16 executing program 1: 16:56:16 executing program 4: 16:56:16 executing program 0: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:16 executing program 5: 16:56:16 executing program 4: 16:56:16 executing program 1: 16:56:16 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:16 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:16 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:16 executing program 4: 16:56:16 executing program 5: 16:56:16 executing program 3: [ 196.255015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 196.261078][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:56:16 executing program 3: 16:56:16 executing program 0: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x297) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x20400, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) sendmsg$nl_generic(r6, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200003}, 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="9c6ece1afe8b86403fd041244c52521cbef97886ec93642a14c78dd97506619a511117b82b89829bed152b664c9925517881fba5699eaf4c6b9aec5ccde148dd5b4aae29db55ca7be092d1e67c479d376a345acd1e52525df0d3bc39b77de46a4834f634570813106bb5a130f369d7a65541b661edb33555c43a18ea7c72e3ff34966b2ff17a74f4b533f390a7102332819de71664ccce3ee0c3f66ceecd2596f7f936e009", @ANYRES32=0x0, @ANYPTR64], @ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRES32=r1], 0x4}, 0x1, 0x0, 0x0, 0x42}, 0x24000811) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x7001) ioctl$RTC_AIE_OFF(r7, 0x7002) 16:56:16 executing program 5: 16:56:16 executing program 4: 16:56:16 executing program 1: 16:56:16 executing program 2: 16:56:16 executing program 3: 16:56:16 executing program 5: 16:56:17 executing program 4: 16:56:17 executing program 0: 16:56:17 executing program 2: 16:56:17 executing program 1: 16:56:17 executing program 4: 16:56:17 executing program 5: 16:56:17 executing program 3: 16:56:17 executing program 2: 16:56:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x5a) setsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f0000000080)="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", 0x108) 16:56:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2}) 16:56:17 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$UHID_INPUT(r0, &(0x7f00000007c0)={0x8, "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", 0x1000}, 0x1006) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x1f}) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r2 = dup2(r1, r0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0xfa, &(0x7f0000000180)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x2000}]) 16:56:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000080)="0adc1f123c12a41d88b070") socket$alg(0x26, 0x5, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x2d7) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000a00), &(0x7f0000000a40)=0x18) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYRES32=r1], 0x100000530) 16:56:17 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xffffffffffffff41) unlink(&(0x7f0000000200)='./file0\x00') clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() unlink(&(0x7f0000000000)='./file0\x00') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ftruncate(r0, 0x0) 16:56:17 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, &(0x7f0000000500)={0x77359400}, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r2) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) accept$packet(r1, &(0x7f0000000400), &(0x7f0000000440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000940)={0x0, @dev, @local}, &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x4e23, @broadcast}}) 16:56:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x1d3, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39f, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xfffffe4f) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlink(0x0, &(0x7f0000000440)='./file0\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdf9, &(0x7f0000000200)=0x400000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) init_module(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) fallocate(r2, 0x0, 0x81, 0x401) prctl$PR_GET_KEEPCAPS(0x7) sendmmsg$alg(r4, &(0x7f0000000c80), 0x4924924924921ae, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000500), 0x0) [ 196.992489][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 196.992507][ T25] audit: type=1804 audit(1554656177.349:31): pid=8007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir170034021/syzkaller.9BMvw0/13/bus" dev="sda1" ino=16572 res=1 16:56:17 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e24, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000006200)=[{{&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=""/118, 0x76}, 0x7fff}, {{&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}, 0x8000}, {{&(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000580)=""/226, 0xe2}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000680)=""/136, 0x88}, {&(0x7f0000000740)=""/174, 0xae}, {&(0x7f0000000800)=""/236, 0xec}, {&(0x7f0000000900)=""/55, 0x37}, {&(0x7f0000000940)=""/27, 0x1b}], 0x7, &(0x7f0000001a40)=""/121, 0x79}, 0x401}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000001ac0)=""/129, 0x81}, {&(0x7f0000001b80)=""/137, 0x89}, {&(0x7f0000001c40)=""/218, 0xda}, {&(0x7f0000001d40)=""/205, 0xcd}, {&(0x7f0000001e40)=""/162, 0xa2}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/150, 0x96}, {&(0x7f00000030c0)=""/37, 0x25}], 0x8, &(0x7f00000031c0)=""/1, 0x1}, 0x5}, {{&(0x7f0000003200)=@caif=@dgm, 0x80, &(0x7f00000032c0)=[{&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000003280)=""/15, 0xf}], 0x2}}, {{&(0x7f0000003300)=@l2, 0x80, &(0x7f0000003440)=[{&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f0000003380)=""/129, 0x81}], 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000003540)=""/211, 0xd3}, {&(0x7f0000003880)=""/245, 0xf5}], 0x2, &(0x7f00000049c0)=""/9, 0x9}, 0x2}, {{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000006a80)=""/4096, 0x1000}, {&(0x7f0000005f80)=""/8, 0x8}, {&(0x7f0000005fc0)=""/165, 0xa5}, {&(0x7f0000006080)=""/52, 0x34}, {&(0x7f00000060c0)=""/25, 0x19}], 0x5, &(0x7f0000006180)=""/79, 0x4f}}], 0x8, 0x62, 0x0) 16:56:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004060b0bb20550829b380000001607a90f3d2ed90920515e827507000000162d0000518cdf6d1e4c33bb98394c9f72b500004f3636219433040089cb003b2c040000710e13"], 0x46) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000400)=0xffffffff00000001) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)) [ 197.135615][ T25] audit: type=1804 audit(1554656177.379:32): pid=8007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir170034021/syzkaller.9BMvw0/13/bus" dev="sda1" ino=16572 res=1 16:56:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd2c, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getgid() listen(r1, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) r2 = accept$unix(r1, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, 0x0, 0x0)