[ 37.624369][ T26] audit: type=1800 audit(1554697886.687:26): pid=7658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.662434][ T26] audit: type=1800 audit(1554697886.687:27): pid=7658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.692330][ T26] audit: type=1800 audit(1554697886.697:28): pid=7658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.682243][ T26] audit: type=1800 audit(1554697887.767:29): pid=7658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. 2019/04/08 04:31:37 fuzzer started 2019/04/08 04:31:40 dialing manager at 10.128.0.26:34543 2019/04/08 04:31:40 syscalls: 2408 2019/04/08 04:31:40 code coverage: enabled 2019/04/08 04:31:40 comparison tracing: enabled 2019/04/08 04:31:40 extra coverage: extra coverage is not supported by the kernel 2019/04/08 04:31:40 setuid sandbox: enabled 2019/04/08 04:31:40 namespace sandbox: enabled 2019/04/08 04:31:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/08 04:31:40 fault injection: enabled 2019/04/08 04:31:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/08 04:31:40 net packet injection: enabled 2019/04/08 04:31:40 net device setup: enabled 04:33:48 executing program 0: syzkaller login: [ 179.357959][ T7823] IPVS: ftp: loaded support on port[0] = 21 04:33:48 executing program 1: [ 179.462917][ T7823] chnl_net:caif_netlink_parms(): no params data found [ 179.547318][ T7823] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.556177][ T7823] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.584906][ T7823] device bridge_slave_0 entered promiscuous mode [ 179.593921][ T7823] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.611098][ T7823] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.620406][ T7823] device bridge_slave_1 entered promiscuous mode [ 179.641083][ T7826] IPVS: ftp: loaded support on port[0] = 21 [ 179.659492][ T7823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.673163][ T7823] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:33:48 executing program 2: [ 179.728865][ T7823] team0: Port device team_slave_0 added [ 179.737975][ T7823] team0: Port device team_slave_1 added [ 179.808692][ T7823] device hsr_slave_0 entered promiscuous mode [ 179.865172][ T7823] device hsr_slave_1 entered promiscuous mode 04:33:49 executing program 3: [ 179.975061][ T7823] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.982364][ T7823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.990323][ T7823] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.997491][ T7823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.098729][ T7828] IPVS: ftp: loaded support on port[0] = 21 [ 180.151490][ T7832] IPVS: ftp: loaded support on port[0] = 21 [ 180.168768][ T7826] chnl_net:caif_netlink_parms(): no params data found 04:33:49 executing program 4: [ 180.206577][ T7823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.262095][ T7823] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.275184][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.289439][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.337610][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.356208][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 180.416980][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.430001][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.437204][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.448035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.456873][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.463959][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.497978][ T7835] IPVS: ftp: loaded support on port[0] = 21 [ 180.517264][ T7826] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.524447][ T7826] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.535256][ T7826] device bridge_slave_0 entered promiscuous mode 04:33:49 executing program 5: [ 180.543940][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.555503][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.606820][ T7826] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.613949][ T7826] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.622538][ T7826] device bridge_slave_1 entered promiscuous mode [ 180.644476][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.657356][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.666843][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.710186][ T7826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.723260][ T7826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.733059][ T7838] IPVS: ftp: loaded support on port[0] = 21 [ 180.762236][ T7828] chnl_net:caif_netlink_parms(): no params data found [ 180.779258][ T7823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.795621][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.831217][ T7826] team0: Port device team_slave_0 added [ 180.837929][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.846616][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.873327][ T7832] chnl_net:caif_netlink_parms(): no params data found [ 180.884471][ T7826] team0: Port device team_slave_1 added [ 180.930274][ T7828] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.937628][ T7828] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.948224][ T7828] device bridge_slave_0 entered promiscuous mode [ 180.958003][ T7828] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.965204][ T7828] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.972859][ T7828] device bridge_slave_1 entered promiscuous mode [ 181.023773][ T7832] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.031401][ T7832] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.039235][ T7832] device bridge_slave_0 entered promiscuous mode [ 181.057478][ T7823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.072284][ T7828] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.136758][ T7826] device hsr_slave_0 entered promiscuous mode [ 181.175157][ T7826] device hsr_slave_1 entered promiscuous mode [ 181.225566][ T7832] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.232683][ T7832] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.241072][ T7832] device bridge_slave_1 entered promiscuous mode [ 181.268687][ T7828] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.302941][ T7832] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.313504][ T7828] team0: Port device team_slave_0 added [ 181.355667][ T7832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.379061][ T7828] team0: Port device team_slave_1 added 04:33:50 executing program 0: r0 = socket(0x2, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="82022e2f66696c000000"], 0x1) dup2(r1, r0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) 04:33:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r1, 0x0, 0x10000) sendfile(r0, r2, &(0x7f0000000080), 0x82) [ 181.427720][ T7828] device hsr_slave_0 entered promiscuous mode [ 181.465684][ T7828] device hsr_slave_1 entered promiscuous mode 04:33:50 executing program 0: capset(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 181.503635][ T7849] syz-executor.0 (7849): /proc/7849/oom_adj is deprecated, please use /proc/7849/oom_score_adj instead. [ 181.521560][ T7832] team0: Port device team_slave_0 added [ 181.529719][ T7832] team0: Port device team_slave_1 added [ 181.562911][ T7835] chnl_net:caif_netlink_parms(): no params data found [ 181.594128][ T7853] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 181.688098][ C1] hrtimer: interrupt took 32776 ns [ 181.713905][ T7838] chnl_net:caif_netlink_parms(): no params data found [ 181.774717][ T7832] device hsr_slave_0 entered promiscuous mode 04:33:50 executing program 0: semget(0x0, 0x1, 0x201) [ 181.815797][ T7832] device hsr_slave_1 entered promiscuous mode 04:33:50 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) 04:33:51 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$GETPID(r0, 0x4, 0x7, 0x0) [ 181.905482][ T7835] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.912799][ T7835] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.927580][ T7835] device bridge_slave_0 entered promiscuous mode [ 181.935996][ T7835] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.943094][ T7835] bridge0: port 2(bridge_slave_1) entered disabled state 04:33:51 executing program 0: semget(0x0, 0x7, 0xfffffffffffffffd) [ 181.952751][ T7835] device bridge_slave_1 entered promiscuous mode [ 182.067296][ T7838] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.074413][ T7838] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.086418][ T7838] device bridge_slave_0 entered promiscuous mode [ 182.093987][ T7838] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.101909][ T7838] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.109955][ T7838] device bridge_slave_1 entered promiscuous mode [ 182.125398][ T7835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.136911][ T7835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.167079][ T7826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.175416][ T7835] team0: Port device team_slave_0 added [ 182.183278][ T7835] team0: Port device team_slave_1 added [ 182.198061][ T7838] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.212244][ T7838] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.277989][ T7835] device hsr_slave_0 entered promiscuous mode [ 182.345922][ T7835] device hsr_slave_1 entered promiscuous mode [ 182.399722][ T7826] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.423028][ T7838] team0: Port device team_slave_0 added [ 182.433040][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.440898][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.455189][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.463765][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.475870][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.482943][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.499441][ T7828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.507545][ T7838] team0: Port device team_slave_1 added [ 182.521748][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.529541][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.538610][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.547072][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.554166][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.562308][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.630078][ T7838] device hsr_slave_0 entered promiscuous mode [ 182.695253][ T7838] device hsr_slave_1 entered promiscuous mode [ 182.769073][ T7828] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.777438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.786496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.794101][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.802336][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.811064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.819697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.839348][ T7832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.861222][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.869903][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.878677][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.887571][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.896186][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.903233][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.911980][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.925972][ T7832] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.943069][ T7826] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 182.954911][ T7826] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 182.966769][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.974485][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.982275][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.991132][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.000311][ T3483] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.007443][ T3483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.015234][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.023453][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.031870][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.040286][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.048571][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.056839][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.066603][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.081557][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.091561][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.100302][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.107399][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.129457][ T7826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.154999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.162918][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.192410][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:33:52 executing program 1: r0 = gettid() ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x102, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) write$P9_RGETATTR(r1, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 183.249991][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.263445][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.274580][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.283321][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.290422][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.298103][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.307012][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.315718][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.324152][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.332619][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.341734][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.350295][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.358756][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.367386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.376106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.398238][ T7828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.409689][ T7828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.421337][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.429375][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.437781][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.454187][ T7835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.470544][ T7828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.494583][ T7832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 183.506769][ T7832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.527407][ T7838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.534235][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.543043][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.552544][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.560925][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.569286][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.576984][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.585279][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.601943][ T7838] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.617114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.630178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.644310][ T7832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.667652][ T7835] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.682963][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.702704][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:33:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x0) [ 183.727933][ T3483] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.735097][ T3483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.749150][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.758344][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.767284][ T3483] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.774336][ T3483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.782177][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.791133][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.799977][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.808520][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.817015][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.825757][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.834093][ T3483] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.841223][ T3483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.848863][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.857557][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.866569][ T3483] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.873632][ T3483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.886404][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.894350][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.902347][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.918554][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.929167][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.937994][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.947472][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.955884][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.975905][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.985848][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.994306][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.003175][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.012962][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.022054][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.044050][ T7838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.062096][ T7838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.076266][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.084624][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:33:53 executing program 3: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101802, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0x3c9}], 0x1) read(r0, 0x0, 0x3c8) [ 184.108004][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.117087][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.133340][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.147783][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.158057][ T7835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.224431][ T7838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.253446][ T7835] 8021q: adding VLAN 0 to HW filter on device batadv0 04:33:53 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/134, 0x86}], 0x1) 04:33:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet_buf(r1, 0x0, 0x14, 0x0, &(0x7f0000000000)) 04:33:53 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:33:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8968d952ec2d6daf) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0, 0x0}, 0x0) getresuid(0x0, 0x0, 0x0) dup3(r1, r2, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lstat(0x0, 0x0) lstat(0x0, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280), 0xc) 04:33:53 executing program 3: syz_emit_ethernet(0x42, &(0x7f00000001c0)={@empty, @dev, [{}], {@mpls_mc={0x8100, {[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}, @icmp=@redirect={0x5, 0x0, 0x0, @empty, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}}}}}}}, 0x0) 04:33:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f00000001c0)=@short={0xb, @dev, @default, 0x1, @rose}, 0x1c) 04:33:53 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 04:33:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000300)="800000003804000019000300e60100006c00000000f9ffff0000000001000000004000000040000080000000000000016d5ebe5a0000ffff53ef9cace752a9581af5af35eb34b38216eb78b595d6a03fb7ce58a713a0091eb2330e94baacd7146a02e89db865", 0x66, 0x400}], 0x0, 0x0) 04:33:53 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/218, 0xda}], 0x1) 04:33:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) [ 184.631429][ T7914] EXT4-fs warning (device loop2): ext4_fill_super:3628: metadata_csum and uninit_bg are redundant flags; please run fsck. 04:33:53 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f00000001c0)=@short={0xb, @dev, @default, 0x1, @rose}, 0x1c) close(r0) [ 184.705812][ T7914] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 184.729685][ T7925] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:33:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) [ 184.807292][ T7914] EXT4-fs warning (device loop2): ext4_fill_super:3628: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 184.843660][ T7914] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 04:33:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f00000001c0)=@short={0xb, @dev, @default, 0x1, @rose}, 0x1c) write(r0, 0x0, 0x0) 04:33:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @dev, @default, 0x0, [@rose, @netrom, @default, @default, @bcast, @default]}, 0x40) 04:33:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[], 0x0, 0x1a200}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\x13)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:33:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000300)=""/4096, &(0x7f0000000000)=0x1000) 04:33:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@quota_account='quota,account'}]}) 04:33:54 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, 0x1, @rose}, 0x1c) 04:33:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) creat(0x0, 0x0) 04:33:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) syncfs(0xffffffffffffffff) syncfs(r0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 185.357760][ T7953] gfs2: invalid mount option: account [ 185.363339][ T7953] gfs2: can't parse mount arguments 04:33:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f00000001c0)=@short={0xb, @dev, @default, 0x1, @rose}, 0x1c) bind$rose(r0, 0x0, 0x0) 04:33:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev, @remote, 0x1, @rose}, 0x1c) [ 185.488832][ T7969] *** Guest State *** [ 185.496330][ T7969] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 04:33:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x1df, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7a, 0x0, [0x200000480]}) [ 185.535065][ T7969] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 185.585609][ T7969] CR3 = 0x0000000000000000 04:33:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0xffffd}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x90) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0", 0x8) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:33:54 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_getres(0xfffffefffffffff1, 0x0) 04:33:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") get_mempolicy(0x0, &(0x7f0000000540), 0xfffffffffffffff9, &(0x7f0000fff000/0x1000)=nil, 0x4) [ 185.643111][ T7969] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 185.680589][ T7969] RFLAGS=0x0001a202 DR7 = 0x0000000000000400 [ 185.693955][ T7969] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 185.704601][ T7969] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 185.722691][ T7969] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 185.732655][ T7969] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 185.826430][ T7969] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 185.861070][ T7969] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 185.880373][ T7969] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 185.896271][ T7969] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 185.910902][ T7969] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 185.941836][ T7969] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 185.973507][ T7969] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 185.988240][ T7969] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 185.996576][ T7969] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 186.011622][ T7969] Interruptibility = 00000000 ActivityState = 00000000 [ 186.019555][ T7969] *** Host State *** [ 186.023571][ T7969] RIP = 0xffffffff811b4aa0 RSP = 0xffff88805dedf8e0 [ 186.030981][ T7969] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 186.051144][ T7969] FSBase=00007f0a8edd0700 GSBase=ffff8880ae800000 TRBase=fffffe0000033000 [ 186.062326][ T7969] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 186.073997][ T7969] CR0=0000000080050033 CR3=00000000a0811000 CR4=00000000001426f0 [ 186.095654][ T7969] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87201360 [ 186.103592][ T7969] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 186.113924][ T7969] *** Control State *** [ 186.118747][ T7969] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c3 [ 186.126617][ T7969] EntryControls=0000d1ff ExitControls=002fefff [ 186.132911][ T7969] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 186.140690][ T7969] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 186.148898][ T7969] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 186.158260][ T7969] reason=80000021 qualification=0000000000000000 [ 186.165590][ T7969] IDTVectoring: info=00000000 errcode=00000000 [ 186.174575][ T7969] TSC Offset = 0xffffff9a69bae14b [ 186.179942][ T7969] TPR Threshold = 0x00 [ 186.184027][ T7969] EPT pointer = 0x000000008632101e [ 186.199500][ T7969] *** Guest State *** [ 186.203980][ T7969] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 186.214143][ T7969] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 186.224351][ T7969] CR3 = 0x0000000000000000 [ 186.232690][ T7969] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 186.239848][ T7969] RFLAGS=0x0001a202 DR7 = 0x0000000000000400 [ 186.247509][ T7969] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 186.259187][ T7969] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 186.269158][ T7969] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 186.278246][ T7969] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 186.287843][ T7969] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 186.296776][ T7969] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 186.305875][ T7969] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 186.314555][ T7969] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 186.323290][ T7969] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 186.332217][ T7969] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 186.340976][ T7969] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 186.349816][ T7969] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 186.357846][ T7969] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 186.366205][ T7969] Interruptibility = 00000000 ActivityState = 00000000 [ 186.373179][ T7969] *** Host State *** [ 186.377128][ T7969] RIP = 0xffffffff811b4aa0 RSP = 0xffff88805dedf8e0 [ 186.384008][ T7969] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 186.391211][ T7969] FSBase=00007f0a8edd0700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 186.399799][ T7969] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 186.406463][ T7969] CR0=0000000080050033 CR3=00000000a0811000 CR4=00000000001426f0 [ 186.414193][ T7969] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 186.421628][ T7969] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 186.428678][ T7969] *** Control State *** [ 186.432848][ T7969] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c3 [ 186.440342][ T7969] EntryControls=0000d1ff ExitControls=002fefff [ 186.446576][ T7969] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 04:33:55 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x80008005, 0x4300) r0 = open$dir(&(0x7f0000000280)='./bus\x00', 0x381, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 04:33:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x5f, 0x84e, 0xe1}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x6}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x100000000, 0x1}, {0x9d, 0x3}]}) unshare(0x40000000) 04:33:55 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000900)={@loopback, 0x76, r0}) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4004010) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x8001, 0x100000001, 0x400, 0x7, 0x0, 0x10000, 0x0, 0x2, 0x5, 0x5, 0xc457, 0x401, 0x17b0, 0x5, 0x4, 0xec02, 0x100, 0x3, 0x0, 0x0, 0x9, 0x9, 0x0, 0x9, 0x9, 0x0, 0x1, 0x6, 0x0, 0x0, 0x8ca6, 0x0, 0x0, 0xfffffffffffffffe, 0x8, 0x80, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x2020, 0xfff, 0x400, 0x0, 0xffffffff, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = open(0x0, 0x0, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000540)={0x2, 0x4, 0x2, 0x4, 0x0, 0x6}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0x0, [], 0x6, &(0x7f0000001b00)=[{}, {}, {}, {}, {}, {}], 0x0}, &(0x7f00000003c0)=0x78) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) [ 186.454272][ T7969] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 186.461755][ T7969] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 186.469173][ T7969] reason=80000021 qualification=0000000000000000 [ 186.476296][ T7969] IDTVectoring: info=00000000 errcode=00000000 [ 186.482482][ T7969] TSC Offset = 0xffffff9a69bae14b [ 186.488219][ T7969] TPR Threshold = 0x00 [ 186.492324][ T7969] EPT pointer = 0x000000008632101e 04:33:55 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r0, 0x1) 04:33:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:33:55 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r0, &(0x7f0000000040)='N', 0x1) [ 186.576177][ T8018] hfs: can't find a HFS filesystem on dev loop1 [ 186.604920][ C0] sched: DL replenish lagged too much [ 186.679484][ T8014] IPVS: ftp: loaded support on port[0] = 21 04:33:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xa, 0x100000000000913, 0x6, 0x2}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000011c0)={r0, &(0x7f0000000180), 0x0, 0x1}, 0x20) [ 186.762253][ T8031] hfs: can't find a HFS filesystem on dev loop1 04:33:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xa, 0x100000000000913, 0x6, 0x2}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={r0, &(0x7f0000000580), 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) 04:33:55 executing program 5: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:33:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 04:33:56 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r0, 0x1) 04:33:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:33:56 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x1, @vbi}) [ 187.346382][ T8059] IPVS: ftp: loaded support on port[0] = 21 [ 187.436635][ T8056] REISERFS warning (device loop4): sh-2006 read_super_block: bread failed (dev loop4, block 2, size 4096) 04:33:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:33:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x9, 0x0, [{0x0, 0xfd4}]}}) 04:33:56 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x5f, 0x84e, 0xe1}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x6}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x100000000, 0x1}, {0x9d, 0x3}]}) unshare(0x40000000) [ 187.487608][ T8056] REISERFS warning (device loop4): sh-2006 read_super_block: bread failed (dev loop4, block 16, size 4096) [ 187.555622][ T8056] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 04:33:56 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r0, 0x1) 04:33:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 187.701069][ T8056] REISERFS warning (device loop4): sh-2006 read_super_block: bread failed (dev loop4, block 2, size 4096) [ 187.734257][ T8056] REISERFS warning (device loop4): sh-2006 read_super_block: bread failed (dev loop4, block 16, size 4096) 04:33:56 executing program 1: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 187.789019][ T8056] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 04:33:57 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:33:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000300)='\x00', 0x2) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) sendfile(r0, r0, 0x0, 0x24000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 04:33:57 executing program 1: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:57 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x2) 04:33:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:33:57 executing program 3: clone(0x8000003002001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x2000000000000002, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:33:58 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x5f, 0x84e, 0xe1}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x6}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x100000000, 0x1}, {0x9d, 0x3}]}) unshare(0x40000000) 04:33:58 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3ffd) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000480)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r0, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000d60) mkdir(&(0x7f0000000200)='./control/file1\x00', 0x0) 04:33:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:33:58 executing program 1: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:58 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @empty=[0xf0ffff, 0x0, 0x0, 0x0, 0xf0ffffffffffff, 0xe0000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 04:33:58 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:58 executing program 1: socket$packet(0x11, 0x0, 0x300) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0xffffff7c) r3 = socket$inet(0x2, 0x3, 0x7f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_group_source_req(r2, 0x0, 0x0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x110005, 0x0) [ 189.461985][ T8147] IPVS: ftp: loaded support on port[0] = 21 04:33:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 189.610764][ T8161] check_preemption_disabled: 1 callbacks suppressed [ 189.610899][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 189.618401][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 189.636497][ T8161] CPU: 0 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.645523][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.655603][ T8161] Call Trace: 04:33:58 executing program 3: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)='./file1\x00') r0 = getpid() syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") mknod(&(0x7f0000000140)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000480)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) ptrace(0x11, r0) [ 189.655630][ T8161] dump_stack+0x172/0x1f0 [ 189.655651][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 189.655667][ T8161] sk_mc_loop+0x1d/0x210 [ 189.655685][ T8161] ip_mc_output+0x2ef/0xf70 [ 189.655705][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.655721][ T8161] ? retint_kernel+0x2d/0x2d [ 189.655747][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 189.655769][ T8161] ip_local_out+0xc4/0x1b0 [ 189.655787][ T8161] ip_send_skb+0x42/0xf0 [ 189.655803][ T8161] ip_push_pending_frames+0x64/0x80 04:33:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) ioperm(0x0, 0x80, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0xfffffffffffffffe, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) [ 189.655820][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 189.655846][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 189.655875][ T8161] ? finish_task_switch+0x146/0x780 [ 189.655904][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.663607][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.663623][ T8161] ? retint_kernel+0x2d/0x2d [ 189.663639][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 [ 189.663660][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.663681][ T8161] ? retint_kernel+0x2d/0x2d [ 189.663696][ T8161] ? ipip_gro_receive+0x100/0x100 [ 189.663721][ T8161] inet_sendmsg+0x147/0x5e0 [ 189.673531][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 189.673545][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 189.673560][ T8161] ? ipip_gro_receive+0x100/0x100 [ 189.673579][ T8161] sock_sendmsg+0xdd/0x130 [ 189.673597][ T8161] kernel_sendmsg+0x44/0x50 [ 189.673618][ T8161] sock_no_sendpage+0x116/0x150 [ 189.687914][ T8161] ? sock_kfree_s+0x70/0x70 [ 189.687929][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 04:33:58 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./bus\x00', 0x0) 04:33:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 189.687954][ T8161] ? retint_kernel+0x2d/0x2d [ 189.687974][ T8161] inet_sendpage+0x44a/0x630 [ 189.687997][ T8161] kernel_sendpage+0x95/0xf0 [ 189.688009][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 189.688027][ T8161] sock_sendpage+0x8b/0xc0 [ 189.688054][ T8161] pipe_to_sendpage+0x299/0x370 [ 189.698016][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 189.698036][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 189.698055][ T8161] ? __splice_from_pipe+0x245/0x7d0 [ 189.698073][ T8161] __splice_from_pipe+0x395/0x7d0 [ 189.698089][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 189.698122][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 189.707552][ T8161] splice_from_pipe+0x108/0x170 [ 189.707569][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 189.707592][ T8161] ? security_file_permission+0x7e/0x380 [ 189.707609][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.707624][ T8161] ? security_file_permission+0x94/0x380 [ 189.707637][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 189.707654][ T8161] generic_splice_sendpage+0x3c/0x50 [ 189.707667][ T8161] ? splice_from_pipe+0x170/0x170 [ 189.707681][ T8161] do_splice+0x70a/0x13c0 [ 189.707705][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 189.707724][ T8161] ? __fget_light+0x1a9/0x230 [ 189.707754][ T8161] __x64_sys_splice+0x2c6/0x330 [ 189.707779][ T8161] do_syscall_64+0x103/0x610 [ 189.707798][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.707810][ T8161] RIP: 0033:0x4582b9 [ 189.707826][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.707834][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 189.707848][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 189.707857][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 189.707866][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 189.707875][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 189.707884][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 189.791848][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 189.875074][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 189.875149][ T8161] CPU: 1 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 189.907869][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.907876][ T8161] Call Trace: [ 189.907899][ T8161] dump_stack+0x172/0x1f0 [ 189.907925][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 189.907943][ T8161] sk_mc_loop+0x1d/0x210 [ 189.907959][ T8161] ip_mc_output+0x2ef/0xf70 [ 189.907978][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 189.907992][ T8161] ? __ip_make_skb+0xf15/0x1820 [ 189.908012][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 190.090734][ T8161] ? dst_release+0x62/0xb0 [ 190.095866][ T8161] ? __ip_make_skb+0xf93/0x1820 [ 190.100825][ T8161] ip_local_out+0xc4/0x1b0 [ 190.105266][ T8161] ip_send_skb+0x42/0xf0 [ 190.109515][ T8161] ip_push_pending_frames+0x64/0x80 [ 190.114714][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 190.119330][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 190.124803][ T8161] ? finish_task_switch+0x146/0x780 [ 190.130119][ T8161] ? ___might_sleep+0x163/0x280 [ 190.134971][ T8161] ? __might_sleep+0x95/0x190 [ 190.139648][ T8161] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 190.145298][ T8161] ? aa_sk_perm+0x288/0x880 [ 190.149818][ T8161] ? retint_kernel+0x2d/0x2d [ 190.154421][ T8161] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 190.160077][ T8161] inet_sendmsg+0x147/0x5e0 [ 190.164669][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 190.170127][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 190.174814][ T8161] ? ipip_gro_receive+0x100/0x100 [ 190.179847][ T8161] sock_sendmsg+0xdd/0x130 [ 190.184266][ T8161] kernel_sendmsg+0x44/0x50 [ 190.188786][ T8161] sock_no_sendpage+0x116/0x150 [ 190.193637][ T8161] ? sock_kfree_s+0x70/0x70 [ 190.198140][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 [ 190.203795][ T8161] ? retint_kernel+0x2d/0x2d [ 190.208409][ T8161] inet_sendpage+0x44a/0x630 [ 190.213008][ T8161] kernel_sendpage+0x95/0xf0 [ 190.217594][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 190.222294][ T8161] sock_sendpage+0x8b/0xc0 [ 190.226716][ T8161] pipe_to_sendpage+0x299/0x370 [ 190.231669][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 190.236450][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.241752][ T8161] ? __splice_from_pipe+0x245/0x7d0 [ 190.246960][ T8161] __splice_from_pipe+0x395/0x7d0 [ 190.252345][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.257756][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.263045][ T8161] splice_from_pipe+0x108/0x170 [ 190.267910][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 190.272884][ T8161] ? security_file_permission+0x7e/0x380 [ 190.278522][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.284804][ T8161] ? security_file_permission+0x94/0x380 [ 190.290529][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 190.296036][ T8161] generic_splice_sendpage+0x3c/0x50 [ 190.301343][ T8161] ? splice_from_pipe+0x170/0x170 [ 190.306394][ T8161] do_splice+0x70a/0x13c0 [ 190.310746][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 190.315883][ T8161] ? __fget_light+0x1a9/0x230 [ 190.320563][ T8161] __x64_sys_splice+0x2c6/0x330 [ 190.325448][ T8161] do_syscall_64+0x103/0x610 [ 190.330138][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.336041][ T8161] RIP: 0033:0x4582b9 [ 190.339939][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.359567][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 190.367990][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 190.376050][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 190.384126][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 190.392256][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 190.400238][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 04:33:59 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x5f, 0x84e, 0xe1}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x6}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0x2, &(0x7f0000000500)=[{0x100000000, 0x1}, {0x9d, 0x3}]}) unshare(0x40000000) 04:33:59 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:33:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:33:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 190.696790][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 190.706375][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 190.711722][ T8161] CPU: 1 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 190.720776][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.730944][ T8161] Call Trace: [ 190.733627][ T8193] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/8193 [ 190.734256][ T8161] dump_stack+0x172/0x1f0 [ 190.734281][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 190.734298][ T8161] sk_mc_loop+0x1d/0x210 [ 190.734320][ T8161] ip_mc_output+0x2ef/0xf70 [ 190.734341][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 190.743876][ T8193] caller is ip6_finish_output+0x335/0xdc0 [ 190.748154][ T8161] ? __ip_make_skb+0xf15/0x1820 [ 190.748171][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 190.748184][ T8161] ? dst_release+0x62/0xb0 [ 190.748200][ T8161] ? __ip_make_skb+0xf93/0x1820 [ 190.748219][ T8161] ip_local_out+0xc4/0x1b0 [ 190.799222][ T8161] ip_send_skb+0x42/0xf0 [ 190.803482][ T8161] ip_push_pending_frames+0x64/0x80 [ 190.808687][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 190.813315][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 190.818789][ T8161] ? mark_held_locks+0xa4/0xf0 [ 190.823562][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 190.828859][ T8161] ? mark_held_locks+0xa4/0xf0 [ 190.833635][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.839106][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.844576][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.850046][ T8161] ? retint_kernel+0x2d/0x2d [ 190.854666][ T8161] inet_sendmsg+0x147/0x5e0 [ 190.859174][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 190.864629][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 190.869310][ T8161] ? ipip_gro_receive+0x100/0x100 [ 190.874347][ T8161] sock_sendmsg+0xdd/0x130 [ 190.878774][ T8161] kernel_sendmsg+0x44/0x50 [ 190.883310][ T8161] sock_no_sendpage+0x116/0x150 [ 190.888256][ T8161] ? sock_kfree_s+0x70/0x70 [ 190.892772][ T8161] ? debug_check_no_obj_freed+0x211/0x444 [ 190.898596][ T8161] ? mark_held_locks+0xa4/0xf0 [ 190.903401][ T8161] inet_sendpage+0x44a/0x630 [ 190.908026][ T8161] kernel_sendpage+0x95/0xf0 [ 190.912637][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 190.917347][ T8161] sock_sendpage+0x8b/0xc0 [ 190.921779][ T8161] pipe_to_sendpage+0x299/0x370 [ 190.926658][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 190.931432][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.936720][ T8161] ? pipe_to_sendpage+0x2c/0x370 [ 190.941680][ T8161] __splice_from_pipe+0x395/0x7d0 [ 190.946712][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.952022][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 190.957311][ T8161] splice_from_pipe+0x108/0x170 [ 190.962177][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 190.967134][ T8161] ? security_file_permission+0x7e/0x380 [ 190.972790][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.979058][ T8161] ? security_file_permission+0x94/0x380 [ 190.984699][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 190.990271][ T8161] generic_splice_sendpage+0x3c/0x50 [ 190.995560][ T8161] ? splice_from_pipe+0x170/0x170 [ 191.000897][ T8161] do_splice+0x70a/0x13c0 [ 191.005244][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 191.010363][ T8161] ? __fget_light+0x1a9/0x230 [ 191.015046][ T8161] __x64_sys_splice+0x2c6/0x330 [ 191.019912][ T8161] do_syscall_64+0x103/0x610 [ 191.024507][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.030402][ T8161] RIP: 0033:0x4582b9 [ 191.034299][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.053910][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 191.062331][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 191.070323][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.078295][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 191.086269][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 191.094240][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 191.102249][ T8193] CPU: 0 PID: 8193 Comm: syz-executor.4 Not tainted 5.1.0-rc3-next-20190405 #19 [ 191.111471][ T8193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.121547][ T8193] Call Trace: [ 191.124856][ T8193] dump_stack+0x172/0x1f0 [ 191.129203][ T8193] __this_cpu_preempt_check+0x246/0x270 [ 191.134801][ T8193] ip6_finish_output+0x335/0xdc0 [ 191.139772][ T8193] ip6_output+0x235/0x7f0 [ 191.144125][ T8193] ? ip6_finish_output+0xdc0/0xdc0 [ 191.149260][ T8193] ? ip6_fragment+0x3980/0x3980 [ 191.154142][ T8193] ip6_xmit+0xe41/0x20c0 [ 191.156445][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 191.158413][ T8193] ? ip6_finish_output2+0x2550/0x2550 [ 191.158432][ T8193] ? mark_held_locks+0xf0/0xf0 [ 191.158452][ T8193] ? ip6_setup_cork+0x1870/0x1870 [ 191.158488][ T8193] inet6_csk_xmit+0x2fb/0x5d0 [ 191.158507][ T8193] ? inet6_csk_update_pmtu+0x190/0x190 [ 191.158522][ T8193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.158546][ T8193] ? csum_ipv6_magic+0x20/0x80 [ 191.168392][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 191.173425][ T8193] __tcp_transmit_skb+0x1a32/0x3750 [ 191.173441][ T8193] ? tcp_connect+0x1184/0x4280 [ 191.173466][ T8193] ? __tcp_select_window+0x8b0/0x8b0 [ 191.173481][ T8193] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.173503][ T8193] ? trace_hardirqs_on+0x67/0x230 [ 191.235123][ T8193] ? tcp_rbtree_insert+0x188/0x200 [ 191.240248][ T8193] tcp_connect+0x2e18/0x4280 [ 191.244863][ T8193] ? tcp_push_one+0x110/0x110 [ 191.249579][ T8193] ? secure_tcpv6_ts_off+0x24f/0x360 [ 191.254894][ T8193] ? secure_dccpv6_sequence_number+0x280/0x280 [ 191.261054][ T8193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.267306][ T8193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.273554][ T8193] ? prandom_u32_state+0x13/0x180 [ 191.278587][ T8193] tcp_v6_connect+0x150b/0x20a0 [ 191.283450][ T8193] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 191.288941][ T8193] __inet_stream_connect+0x83f/0xea0 [ 191.294233][ T8193] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 191.299525][ T8193] ? __inet_stream_connect+0x83f/0xea0 [ 191.305097][ T8193] ? mark_held_locks+0xa4/0xf0 [ 191.309877][ T8193] ? inet_dgram_connect+0x2e0/0x2e0 [ 191.315081][ T8193] ? lock_sock_nested+0x9a/0x120 [ 191.320025][ T8193] ? trace_hardirqs_on+0x67/0x230 [ 191.325058][ T8193] ? lock_sock_nested+0x9a/0x120 [ 191.330001][ T8193] ? __local_bh_enable_ip+0x15a/0x270 [ 191.335389][ T8193] inet_stream_connect+0x58/0xa0 [ 191.340338][ T8193] __sys_connect+0x266/0x330 [ 191.344940][ T8193] ? __ia32_sys_accept+0xb0/0xb0 [ 191.349881][ T8193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.356127][ T8193] ? put_timespec64+0xda/0x140 [ 191.360906][ T8193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.366369][ T8193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.371835][ T8193] ? do_syscall_64+0x26/0x610 [ 191.376515][ T8193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.382582][ T8193] ? do_syscall_64+0x26/0x610 [ 191.387269][ T8193] __x64_sys_connect+0x73/0xb0 [ 191.392050][ T8193] do_syscall_64+0x103/0x610 [ 191.396677][ T8193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.402566][ T8193] RIP: 0033:0x4582b9 [ 191.406470][ T8193] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.426168][ T8193] RSP: 002b:00007fc9dc660c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 191.434593][ T8193] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 191.442589][ T8193] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000006 [ 191.450575][ T8193] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 191.458559][ T8193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9dc6616d4 [ 191.466540][ T8193] R13: 00000000004be64c R14: 00000000004cf1e0 R15: 00000000ffffffff [ 191.474560][ T8161] CPU: 1 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 191.483605][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.493689][ T8161] Call Trace: [ 191.496998][ T8161] dump_stack+0x172/0x1f0 [ 191.501337][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 191.506915][ T8161] sk_mc_loop+0x1d/0x210 [ 191.511162][ T8161] ip_mc_output+0x2ef/0xf70 [ 191.515672][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 191.520788][ T8161] ? retint_kernel+0x2d/0x2d [ 191.525383][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 191.530848][ T8161] ip_local_out+0xc4/0x1b0 [ 191.535271][ T8161] ip_send_skb+0x42/0xf0 [ 191.539531][ T8161] ip_push_pending_frames+0x64/0x80 [ 191.544734][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 191.549355][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 191.554824][ T8161] ? mark_held_locks+0xa4/0xf0 [ 191.559689][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.565154][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.570437][ T8161] ? retint_kernel+0x2d/0x2d [ 191.575041][ T8161] ? ___might_sleep+0x163/0x280 [ 191.579895][ T8161] ? __might_sleep+0x95/0x190 [ 191.584576][ T8161] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 191.590380][ T8161] ? aa_sk_perm+0x288/0x880 [ 191.594893][ T8161] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 191.600449][ T8161] inet_sendmsg+0x147/0x5e0 [ 191.604957][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 191.610422][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 191.615102][ T8161] ? ipip_gro_receive+0x100/0x100 [ 191.620130][ T8161] sock_sendmsg+0xdd/0x130 [ 191.624554][ T8161] kernel_sendmsg+0x44/0x50 [ 191.629081][ T8161] sock_no_sendpage+0x116/0x150 [ 191.633935][ T8161] ? sock_kfree_s+0x70/0x70 [ 191.638452][ T8161] ? inet_sendpage+0x58/0x630 [ 191.643135][ T8161] inet_sendpage+0x44a/0x630 [ 191.647748][ T8161] kernel_sendpage+0x95/0xf0 [ 191.652339][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 191.657020][ T8161] sock_sendpage+0x8b/0xc0 [ 191.661442][ T8161] pipe_to_sendpage+0x299/0x370 [ 191.666292][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 191.671054][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 191.676341][ T8161] ? __splice_from_pipe+0x58b/0x7d0 [ 191.681544][ T8161] __splice_from_pipe+0x395/0x7d0 [ 191.686575][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 191.691865][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 191.697153][ T8161] splice_from_pipe+0x108/0x170 [ 191.702022][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 191.706970][ T8161] ? security_file_permission+0x7e/0x380 [ 191.712613][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.718855][ T8161] ? security_file_permission+0x94/0x380 [ 191.724503][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 191.729965][ T8161] generic_splice_sendpage+0x3c/0x50 [ 191.735251][ T8161] ? splice_from_pipe+0x170/0x170 [ 191.740282][ T8161] do_splice+0x70a/0x13c0 [ 191.744621][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 191.749752][ T8161] ? __fget_light+0x1a9/0x230 [ 191.754438][ T8161] __x64_sys_splice+0x2c6/0x330 [ 191.759314][ T8161] do_syscall_64+0x103/0x610 [ 191.763909][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.771287][ T8161] RIP: 0033:0x4582b9 [ 191.775183][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:34:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:00 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 191.794985][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 191.803426][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 191.811498][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.819657][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 191.827638][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 191.835610][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 191.933416][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 191.943294][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 191.948778][ T8161] CPU: 0 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 191.957828][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.967889][ T8161] Call Trace: [ 191.971193][ T8161] dump_stack+0x172/0x1f0 [ 191.975540][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 191.981092][ T8161] sk_mc_loop+0x1d/0x210 [ 191.985344][ T8161] ip_mc_output+0x2ef/0xf70 [ 191.989856][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 191.994987][ T8161] ? __ip_make_skb+0xf15/0x1820 [ 191.999845][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 192.005310][ T8161] ? dst_release+0x62/0xb0 [ 192.009841][ T8161] ? __ip_make_skb+0xf93/0x1820 [ 192.014737][ T8161] ip_local_out+0xc4/0x1b0 [ 192.019184][ T8161] ip_send_skb+0x42/0xf0 [ 192.023434][ T8161] ip_push_pending_frames+0x64/0x80 [ 192.028642][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 192.033250][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 192.038721][ T8161] ? mark_held_locks+0xa4/0xf0 [ 192.043502][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.048801][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.054287][ T8161] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 192.059931][ T8161] ? aa_sk_perm+0x288/0x880 [ 192.064449][ T8161] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.070358][ T8161] inet_sendmsg+0x147/0x5e0 [ 192.074887][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 192.080341][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 192.085040][ T8161] ? ipip_gro_receive+0x100/0x100 [ 192.090070][ T8161] sock_sendmsg+0xdd/0x130 [ 192.094486][ T8161] kernel_sendmsg+0x44/0x50 [ 192.099183][ T8161] sock_no_sendpage+0x116/0x150 [ 192.104042][ T8161] ? sock_kfree_s+0x70/0x70 [ 192.108574][ T8161] ? inet_sendpage+0x435/0x630 [ 192.113357][ T8161] inet_sendpage+0x44a/0x630 [ 192.118045][ T8161] kernel_sendpage+0x95/0xf0 [ 192.122638][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 192.127320][ T8161] sock_sendpage+0x8b/0xc0 [ 192.131748][ T8161] pipe_to_sendpage+0x299/0x370 [ 192.136691][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 192.141456][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.146757][ T8161] ? __splice_from_pipe+0x245/0x7d0 [ 192.152668][ T8161] __splice_from_pipe+0x395/0x7d0 [ 192.157704][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.163012][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.168475][ T8161] splice_from_pipe+0x108/0x170 [ 192.173336][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 192.178294][ T8161] ? security_file_permission+0x7e/0x380 [ 192.183950][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.190214][ T8161] ? security_file_permission+0x94/0x380 [ 192.195875][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 192.201351][ T8161] generic_splice_sendpage+0x3c/0x50 [ 192.206647][ T8161] ? splice_from_pipe+0x170/0x170 [ 192.211682][ T8161] do_splice+0x70a/0x13c0 [ 192.216034][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 192.221150][ T8161] ? __fget_light+0x1a9/0x230 [ 192.225833][ T8161] __x64_sys_splice+0x2c6/0x330 [ 192.230695][ T8161] do_syscall_64+0x103/0x610 [ 192.235295][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.241188][ T8161] RIP: 0033:0x4582b9 [ 192.245174][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.264782][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 192.273215][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 192.281199][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 192.289177][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 192.297165][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 192.305136][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 192.370620][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 192.380607][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 192.385937][ T8161] CPU: 1 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 192.394989][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.405067][ T8161] Call Trace: [ 192.408396][ T8161] dump_stack+0x172/0x1f0 [ 192.412782][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 192.418357][ T8161] sk_mc_loop+0x1d/0x210 [ 192.422627][ T8161] ip_mc_output+0x2ef/0xf70 [ 192.427173][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 192.432313][ T8161] ? ip_append_data.part.0+0x170/0x170 [ 192.437879][ T8161] ? dst_release+0x62/0xb0 [ 192.442404][ T8161] ? __ip_make_skb+0xf93/0x1820 [ 192.447284][ T8161] ip_local_out+0xc4/0x1b0 [ 192.451735][ T8161] ip_send_skb+0x42/0xf0 [ 192.456012][ T8161] ip_push_pending_frames+0x64/0x80 [ 192.461272][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 192.465905][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 192.471383][ T8161] ? mark_held_locks+0xa4/0xf0 [ 192.476204][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.481695][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.487043][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.492548][ T8161] ? aa_sk_perm+0x22c/0x880 [ 192.492900][ T8216] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8216 [ 192.497074][ T8161] ? aa_sk_perm+0x22c/0x880 [ 192.497089][ T8161] ? aa_sk_perm+0x288/0x880 [ 192.497110][ T8161] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.497128][ T8161] inet_sendmsg+0x147/0x5e0 [ 192.497143][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 192.497154][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 192.497167][ T8161] ? ipip_gro_receive+0x100/0x100 [ 192.497186][ T8161] sock_sendmsg+0xdd/0x130 [ 192.497205][ T8161] kernel_sendmsg+0x44/0x50 [ 192.497223][ T8161] sock_no_sendpage+0x116/0x150 [ 192.497238][ T8161] ? sock_kfree_s+0x70/0x70 [ 192.497262][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 [ 192.506705][ T8216] caller is sk_mc_loop+0x1d/0x210 [ 192.511087][ T8161] ? retint_kernel+0x2d/0x2d [ 192.511110][ T8161] inet_sendpage+0x44a/0x630 [ 192.511135][ T8161] kernel_sendpage+0x95/0xf0 [ 192.511147][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 192.511165][ T8161] sock_sendpage+0x8b/0xc0 [ 192.511188][ T8161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.598380][ T8161] pipe_to_sendpage+0x299/0x370 [ 192.603260][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 192.608135][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.613447][ T8161] ? __put_page+0x92/0xd0 [ 192.617995][ T8161] ? anon_pipe_buf_release+0x1c6/0x270 [ 192.623486][ T8161] __splice_from_pipe+0x395/0x7d0 [ 192.628543][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.633860][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 192.639180][ T8161] splice_from_pipe+0x108/0x170 [ 192.644071][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 192.649050][ T8161] ? security_file_permission+0x7e/0x380 [ 192.654734][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.661937][ T8161] ? security_file_permission+0x94/0x380 [ 192.667614][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 192.673114][ T8161] generic_splice_sendpage+0x3c/0x50 [ 192.678688][ T8161] ? splice_from_pipe+0x170/0x170 [ 192.683776][ T8161] do_splice+0x70a/0x13c0 [ 192.688143][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 192.693283][ T8161] ? __fget_light+0x1a9/0x230 [ 192.697991][ T8161] __x64_sys_splice+0x2c6/0x330 [ 192.703008][ T8161] do_syscall_64+0x103/0x610 [ 192.707809][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.713733][ T8161] RIP: 0033:0x4582b9 [ 192.717662][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.737368][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 192.745804][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 192.754009][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 192.762189][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 192.770269][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 192.778348][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 192.786384][ T8216] CPU: 0 PID: 8216 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 192.795439][ T8216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.805516][ T8216] Call Trace: [ 192.808822][ T8216] dump_stack+0x172/0x1f0 [ 192.813176][ T8216] __this_cpu_preempt_check+0x246/0x270 [ 192.818798][ T8216] sk_mc_loop+0x1d/0x210 [ 192.823060][ T8216] ip_mc_output+0x2ef/0xf70 [ 192.827594][ T8216] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 192.832731][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.838244][ T8216] ? ip_append_data.part.0+0x170/0x170 [ 192.843417][ T8161] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8161 [ 192.843725][ T8216] ? retint_kernel+0x2d/0x2d [ 192.843760][ T8216] ip_local_out+0xc4/0x1b0 [ 192.853676][ T8161] caller is sk_mc_loop+0x1d/0x210 [ 192.857683][ T8216] ip_send_skb+0x42/0xf0 [ 192.857700][ T8216] ip_push_pending_frames+0x64/0x80 [ 192.857714][ T8216] raw_sendmsg+0x1e6d/0x2f20 [ 192.857737][ T8216] ? compat_raw_getsockopt+0x100/0x100 [ 192.857780][ T8216] ? mark_held_locks+0xa4/0xf0 [ 192.857796][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.857818][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.902766][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.908277][ T8216] ? retint_kernel+0x2d/0x2d [ 192.912907][ T8216] inet_sendmsg+0x147/0x5e0 [ 192.917538][ T8216] ? compat_raw_getsockopt+0x100/0x100 [ 192.923019][ T8216] ? inet_sendmsg+0x147/0x5e0 [ 192.927719][ T8216] ? ipip_gro_receive+0x100/0x100 [ 192.932786][ T8216] sock_sendmsg+0xdd/0x130 [ 192.937234][ T8216] kernel_sendmsg+0x44/0x50 [ 192.941770][ T8216] sock_no_sendpage+0x116/0x150 [ 192.946647][ T8216] ? sock_kfree_s+0x70/0x70 [ 192.951189][ T8216] ? inet_sendpage+0xc0/0x630 [ 192.955894][ T8216] inet_sendpage+0x44a/0x630 [ 192.960521][ T8216] kernel_sendpage+0x95/0xf0 [ 192.965130][ T8216] ? inet_sendmsg+0x5e0/0x5e0 [ 192.969849][ T8216] sock_sendpage+0x8b/0xc0 [ 192.974294][ T8216] pipe_to_sendpage+0x299/0x370 [ 192.979167][ T8216] ? kernel_sendpage+0xf0/0xf0 [ 192.983953][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 192.989266][ T8216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.995710][ T8216] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 193.001822][ T8216] __splice_from_pipe+0x395/0x7d0 [ 193.006873][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 193.012287][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 193.017597][ T8216] splice_from_pipe+0x108/0x170 [ 193.022576][ T8216] ? splice_shrink_spd+0xd0/0xd0 [ 193.027544][ T8216] ? apparmor_file_permission+0x25/0x30 [ 193.033118][ T8216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.039493][ T8216] ? security_file_permission+0x94/0x380 [ 193.045176][ T8216] generic_splice_sendpage+0x3c/0x50 [ 193.050586][ T8216] ? splice_from_pipe+0x170/0x170 [ 193.055725][ T8216] do_splice+0x70a/0x13c0 [ 193.060106][ T8216] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.065254][ T8216] ? __fget_light+0x1a9/0x230 [ 193.069960][ T8216] __x64_sys_splice+0x2c6/0x330 [ 193.074847][ T8216] do_syscall_64+0x103/0x610 [ 193.079464][ T8216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.085462][ T8216] RIP: 0033:0x4582b9 [ 193.089376][ T8216] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.109654][ T8216] RSP: 002b:00007f706df6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.118443][ T8216] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 193.126529][ T8216] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 0000000000000007 [ 193.134932][ T8216] RBP: 000000000073c180 R08: 0000000000110005 R09: 0000000000000000 [ 193.143285][ T8216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706df706d4 [ 193.151304][ T8216] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 193.159438][ T8161] CPU: 1 PID: 8161 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 193.169837][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.180005][ T8161] Call Trace: [ 193.183326][ T8161] dump_stack+0x172/0x1f0 [ 193.187690][ T8161] __this_cpu_preempt_check+0x246/0x270 [ 193.193283][ T8161] sk_mc_loop+0x1d/0x210 [ 193.197568][ T8161] ip_mc_output+0x2ef/0xf70 [ 193.202126][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.207621][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 193.208729][ T8216] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8216 [ 193.212771][ T8161] ? retint_kernel+0x2d/0x2d [ 193.212793][ T8161] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 193.212812][ T8161] ip_local_out+0xc4/0x1b0 [ 193.212831][ T8161] ip_send_skb+0x42/0xf0 [ 193.212847][ T8161] ip_push_pending_frames+0x64/0x80 [ 193.212869][ T8161] raw_sendmsg+0x1e6d/0x2f20 [ 193.222656][ T8216] caller is sk_mc_loop+0x1d/0x210 [ 193.227150][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 193.227165][ T8161] ? trace_hardirqs_on+0x67/0x230 [ 193.227180][ T8161] ? kasan_check_read+0x11/0x20 [ 193.227197][ T8161] ? _raw_spin_unlock_irq+0x5e/0x90 [ 193.227222][ T8161] ? mark_held_locks+0xa4/0xf0 [ 193.227239][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.227270][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 [ 193.301833][ T8161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.308747][ T8161] ? retint_kernel+0x2d/0x2d [ 193.313386][ T8161] inet_sendmsg+0x147/0x5e0 [ 193.317922][ T8161] ? compat_raw_getsockopt+0x100/0x100 [ 193.325142][ T8161] ? inet_sendmsg+0x147/0x5e0 [ 193.329879][ T8161] ? ipip_gro_receive+0x100/0x100 [ 193.335577][ T8161] sock_sendmsg+0xdd/0x130 [ 193.340634][ T8161] kernel_sendmsg+0x44/0x50 [ 193.349528][ T8161] sock_no_sendpage+0x116/0x150 [ 193.356092][ T8161] ? sock_kfree_s+0x70/0x70 [ 193.361665][ T8161] ? trace_hardirqs_on_caller+0x6a/0x220 [ 193.368044][ T8161] ? retint_kernel+0x2d/0x2d [ 193.374342][ T8161] inet_sendpage+0x44a/0x630 [ 193.378969][ T8161] kernel_sendpage+0x95/0xf0 [ 193.383592][ T8161] ? inet_sendmsg+0x5e0/0x5e0 [ 193.388335][ T8161] sock_sendpage+0x8b/0xc0 [ 193.392870][ T8161] pipe_to_sendpage+0x299/0x370 [ 193.397787][ T8161] ? kernel_sendpage+0xf0/0xf0 [ 193.402930][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 193.408246][ T8161] ? __put_page+0x92/0xd0 [ 193.412605][ T8161] ? anon_pipe_buf_release+0x1c6/0x270 [ 193.418224][ T8161] __splice_from_pipe+0x395/0x7d0 [ 193.423276][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 193.428613][ T8161] ? direct_splice_actor+0x1a0/0x1a0 [ 193.433958][ T8161] splice_from_pipe+0x108/0x170 [ 193.438860][ T8161] ? splice_shrink_spd+0xd0/0xd0 [ 193.443837][ T8161] ? security_file_permission+0x7e/0x380 [ 193.449670][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.455942][ T8161] ? security_file_permission+0x94/0x380 [ 193.461624][ T8161] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 193.467120][ T8161] generic_splice_sendpage+0x3c/0x50 [ 193.472436][ T8161] ? splice_from_pipe+0x170/0x170 [ 193.477581][ T8161] do_splice+0x70a/0x13c0 [ 193.482520][ T8161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.487838][ T8161] ? __fget_light+0x1a9/0x230 [ 193.492546][ T8161] __x64_sys_splice+0x2c6/0x330 [ 193.497466][ T8161] do_syscall_64+0x103/0x610 [ 193.502099][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.508012][ T8161] RIP: 0033:0x4582b9 [ 193.511963][ T8161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.531940][ T8161] RSP: 002b:00007f706dfd2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.540374][ T8161] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 193.548366][ T8161] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 193.557451][ T8161] RBP: 000000000073bfa0 R08: 0000000000110005 R09: 0000000000000000 [ 193.565444][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706dfd36d4 [ 193.574078][ T8161] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 193.582305][ T8216] CPU: 0 PID: 8216 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 193.591445][ T8216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.601616][ T8216] Call Trace: [ 193.605006][ T8216] dump_stack+0x172/0x1f0 [ 193.609374][ T8216] __this_cpu_preempt_check+0x246/0x270 [ 193.614977][ T8216] sk_mc_loop+0x1d/0x210 [ 193.619337][ T8216] ip_mc_output+0x2ef/0xf70 [ 193.624074][ T8216] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 193.629308][ T8216] ? ip_append_data.part.0+0x170/0x170 [ 193.636118][ T8216] ? retint_kernel+0x2d/0x2d [ 193.640768][ T8216] ip_local_out+0xc4/0x1b0 [ 193.645309][ T8216] ip_send_skb+0x42/0xf0 [ 193.649604][ T8216] ip_push_pending_frames+0x64/0x80 [ 193.654852][ T8216] raw_sendmsg+0x1e6d/0x2f20 [ 193.659950][ T8216] ? compat_raw_getsockopt+0x100/0x100 [ 193.665466][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.671398][ T8216] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.676901][ T8216] ? retint_kernel+0x2d/0x2d [ 193.681517][ T8216] ? trace_hardirqs_on_caller+0x6a/0x220 [ 193.687174][ T8216] ? __might_sleep+0x95/0x190 [ 193.691906][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.697399][ T8216] ? retint_kernel+0x2d/0x2d [ 193.702104][ T8216] inet_sendmsg+0x147/0x5e0 [ 193.706639][ T8216] ? compat_raw_getsockopt+0x100/0x100 [ 193.712122][ T8216] ? inet_sendmsg+0x147/0x5e0 [ 193.716850][ T8216] ? ipip_gro_receive+0x100/0x100 [ 193.721914][ T8216] sock_sendmsg+0xdd/0x130 [ 193.726358][ T8216] kernel_sendmsg+0x44/0x50 [ 193.730903][ T8216] sock_no_sendpage+0x116/0x150 [ 193.735798][ T8216] ? sock_kfree_s+0x70/0x70 [ 193.740330][ T8216] ? trace_hardirqs_on_caller+0x6a/0x220 [ 193.746017][ T8216] ? mark_held_locks+0xa4/0xf0 [ 193.750831][ T8216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.757892][ T8216] inet_sendpage+0x44a/0x630 [ 193.762519][ T8216] kernel_sendpage+0x95/0xf0 [ 193.768139][ T8216] ? inet_sendmsg+0x5e0/0x5e0 [ 193.772870][ T8216] sock_sendpage+0x8b/0xc0 [ 193.777364][ T8216] pipe_to_sendpage+0x299/0x370 [ 193.782348][ T8216] ? kernel_sendpage+0xf0/0xf0 [ 193.787966][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 193.793372][ T8216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.799644][ T8216] ? anon_pipe_buf_release+0x1c6/0x270 [ 193.805156][ T8216] __splice_from_pipe+0x395/0x7d0 [ 193.810210][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 193.818718][ T8216] ? direct_splice_actor+0x1a0/0x1a0 [ 193.824044][ T8216] splice_from_pipe+0x108/0x170 [ 193.829131][ T8216] ? splice_shrink_spd+0xd0/0xd0 [ 193.834192][ T8216] ? apparmor_file_permission+0x25/0x30 [ 193.839902][ T8216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.848014][ T8216] ? security_file_permission+0x94/0x380 [ 193.853681][ T8216] generic_splice_sendpage+0x3c/0x50 [ 193.859002][ T8216] ? splice_from_pipe+0x170/0x170 [ 193.864178][ T8216] do_splice+0x70a/0x13c0 [ 193.869001][ T8216] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.874145][ T8216] ? __fget_light+0x1a9/0x230 [ 193.878874][ T8216] __x64_sys_splice+0x2c6/0x330 [ 193.883781][ T8216] do_syscall_64+0x103/0x610 [ 193.888434][ T8216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.894680][ T8216] RIP: 0033:0x4582b9 [ 193.898602][ T8216] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.918927][ T8216] RSP: 002b:00007f706df6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.927474][ T8216] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 193.935567][ T8216] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 0000000000000007 [ 193.944097][ T8216] RBP: 000000000073c180 R08: 0000000000110005 R09: 0000000000000000 [ 193.952091][ T8216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f706df706d4 [ 193.960205][ T8216] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 04:34:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) 04:34:03 executing program 3: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, 0x0, 0xa0001, 0x0) keyctl$set_reqkey_keyring(0x5, 0x10000000040000) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:systemd_logind_sessions_t:s0\x00', 0x2f) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x8) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) 04:34:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:03 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x7}) 04:34:03 executing program 4: [ 194.360865][ T8229] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:34:04 executing program 2: 04:34:04 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:04 executing program 1: 04:34:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:04 executing program 4: 04:34:04 executing program 3: 04:34:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 04:34:04 executing program 1: 04:34:04 executing program 2: 04:34:04 executing program 4: 04:34:04 executing program 1: 04:34:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:04 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:05 executing program 2: 04:34:05 executing program 3: 04:34:05 executing program 4: 04:34:05 executing program 1: 04:34:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:05 executing program 2: 04:34:05 executing program 3: 04:34:05 executing program 1: 04:34:05 executing program 4: 04:34:05 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:05 executing program 4: 04:34:05 executing program 2: 04:34:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:05 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) 04:34:05 executing program 1: 04:34:05 executing program 3: 04:34:05 executing program 2: 04:34:05 executing program 4: 04:34:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:05 executing program 3: 04:34:05 executing program 1: 04:34:05 executing program 2: 04:34:05 executing program 1: 04:34:05 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) 04:34:05 executing program 2: 04:34:05 executing program 4: 04:34:05 executing program 3: 04:34:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:05 executing program 1: 04:34:05 executing program 4: 04:34:05 executing program 2: 04:34:05 executing program 3: 04:34:05 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) 04:34:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:05 executing program 1: 04:34:06 executing program 4: 04:34:06 executing program 2: 04:34:06 executing program 3: 04:34:06 executing program 1: 04:34:06 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:06 executing program 4: 04:34:06 executing program 2: 04:34:06 executing program 3: 04:34:06 executing program 1: 04:34:06 executing program 3: 04:34:06 executing program 4: 04:34:06 executing program 2: 04:34:06 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:06 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 1: 04:34:06 executing program 3: 04:34:06 executing program 2: 04:34:06 executing program 5: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 4: 04:34:06 executing program 1: 04:34:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 3: 04:34:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:06 executing program 2: 04:34:06 executing program 1: 04:34:06 executing program 4: 04:34:06 executing program 2: 04:34:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:06 executing program 3: 04:34:06 executing program 1: 04:34:06 executing program 4: 04:34:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:06 executing program 2: 04:34:07 executing program 1: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:07 executing program 3: 04:34:07 executing program 2: 04:34:07 executing program 4: 04:34:07 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:07 executing program 1: 04:34:07 executing program 3: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:07 executing program 2: 04:34:07 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:07 executing program 4: 04:34:07 executing program 3: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:07 executing program 2: 04:34:07 executing program 4: 04:34:07 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:07 executing program 3: 04:34:07 executing program 1: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:07 executing program 4: 04:34:07 executing program 3: 04:34:07 executing program 2: 04:34:07 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:07 executing program 1: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 04:34:07 executing program 3: 04:34:07 executing program 4: 04:34:07 executing program 2: 04:34:07 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:07 executing program 1: 04:34:07 executing program 2: 04:34:07 executing program 3: 04:34:07 executing program 4: 04:34:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:08 executing program 1: 04:34:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:08 executing program 3: 04:34:08 executing program 2: 04:34:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:08 executing program 4: 04:34:08 executing program 3: 04:34:08 executing program 1: r0 = semget(0x0, 0x0, 0x0) semctl$GETPID(r0, 0x4, 0x4, 0x0) 04:34:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:08 executing program 2: 04:34:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:08 executing program 3: 04:34:08 executing program 4: 04:34:08 executing program 1: 04:34:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:08 executing program 2: 04:34:08 executing program 4: 04:34:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:34:08 executing program 3: 04:34:08 executing program 1: 04:34:08 executing program 2: 04:34:08 executing program 4: 04:34:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) 04:34:08 executing program 3: 04:34:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x104}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70)