[ 37.533975][ T26] audit: type=1800 audit(1554576874.384:25): pid=7685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 37.554371][ T26] audit: type=1800 audit(1554576874.394:26): pid=7685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 37.575237][ T26] audit: type=1800 audit(1554576874.394:27): pid=7685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 37.575263][ T26] audit: type=1800 audit(1554576874.394:28): pid=7685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts. 2019/04/06 18:54:45 fuzzer started 2019/04/06 18:54:48 dialing manager at 10.128.0.26:34543 2019/04/06 18:54:49 syscalls: 2408 2019/04/06 18:54:49 code coverage: enabled 2019/04/06 18:54:49 comparison tracing: enabled 2019/04/06 18:54:49 extra coverage: extra coverage is not supported by the kernel 2019/04/06 18:54:49 setuid sandbox: enabled 2019/04/06 18:54:49 namespace sandbox: enabled 2019/04/06 18:54:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/06 18:54:49 fault injection: enabled 2019/04/06 18:54:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/06 18:54:49 net packet injection: enabled 2019/04/06 18:54:49 net device setup: enabled 18:56:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x3c, 0x209e1d, 0x2, 0x2}, 0x28) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x81ffff, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, r0}, 0x2c) syzkaller login: [ 166.820641][ T7849] IPVS: ftp: loaded support on port[0] = 21 18:56:43 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7}, 0x7) write$ppp(r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0x0) [ 166.929416][ T7849] chnl_net:caif_netlink_parms(): no params data found [ 167.003668][ T7849] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.012171][ T7849] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.021737][ T7849] device bridge_slave_0 entered promiscuous mode [ 167.039154][ T7849] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.046655][ T7849] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.054776][ T7849] device bridge_slave_1 entered promiscuous mode [ 167.088681][ T7849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.109141][ T7849] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 167.118449][ T7852] IPVS: ftp: loaded support on port[0] = 21 [ 167.141032][ T7849] team0: Port device team_slave_0 added [ 167.151257][ T7849] team0: Port device team_slave_1 added 18:56:44 executing program 2: socketpair$unix(0x1, 0x100000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000400)="3084d353ff070000a0b4a234709b1a65db") [ 167.288040][ T7849] device hsr_slave_0 entered promiscuous mode 18:56:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000780)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000200)={@remote, 0xe}, 0x20) [ 167.355791][ T7849] device hsr_slave_1 entered promiscuous mode [ 167.433475][ T7854] IPVS: ftp: loaded support on port[0] = 21 [ 167.471791][ T7849] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.479197][ T7849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.487243][ T7849] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.494349][ T7849] bridge0: port 1(bridge_slave_0) entered forwarding state 18:56:44 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1a3}, 0x8) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) close(r0) [ 167.654874][ T7858] IPVS: ftp: loaded support on port[0] = 21 [ 167.674796][ T7852] chnl_net:caif_netlink_parms(): no params data found [ 167.783108][ T7852] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.805987][ T7852] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.814026][ T7852] device bridge_slave_0 entered promiscuous mode [ 167.838893][ T7849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.903524][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.912011][ T7852] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.921015][ T7852] device bridge_slave_1 entered promiscuous mode [ 167.942431][ T7860] IPVS: ftp: loaded support on port[0] = 21 18:56:44 executing program 5: unshare(0x20020000) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') [ 167.960477][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.976350][ T2990] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.985924][ T2990] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.996620][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 168.022636][ T7849] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.040127][ T7854] chnl_net:caif_netlink_parms(): no params data found [ 168.092684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.104975][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.114180][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.121370][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.129570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.138303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.146975][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.154041][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.173296][ T7852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 168.198459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.207210][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.234401][ T7852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.249108][ T7864] IPVS: ftp: loaded support on port[0] = 21 [ 168.277682][ T7852] team0: Port device team_slave_0 added [ 168.284218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.293614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.302344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.311262][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.320596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.343790][ T7852] team0: Port device team_slave_1 added [ 168.359962][ T7854] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.367795][ T7854] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.375939][ T7854] device bridge_slave_0 entered promiscuous mode [ 168.392502][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.402374][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.413988][ T7849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.426314][ T7849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.439572][ T7854] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.447647][ T7854] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.455667][ T7854] device bridge_slave_1 entered promiscuous mode [ 168.478603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.488350][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.522437][ T7854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 168.607033][ T7852] device hsr_slave_0 entered promiscuous mode [ 168.655743][ T7852] device hsr_slave_1 entered promiscuous mode [ 168.712923][ T7854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.747422][ T7858] chnl_net:caif_netlink_parms(): no params data found [ 168.770266][ T7854] team0: Port device team_slave_0 added [ 168.796998][ T7854] team0: Port device team_slave_1 added [ 168.831776][ T7849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.868345][ T7858] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.877725][ T7858] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.886037][ T7858] device bridge_slave_0 entered promiscuous mode [ 168.923374][ T7858] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.932449][ T7858] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.941341][ T7858] device bridge_slave_1 entered promiscuous mode [ 169.028277][ T7854] device hsr_slave_0 entered promiscuous mode [ 169.066249][ T7854] device hsr_slave_1 entered promiscuous mode [ 169.146165][ T7860] chnl_net:caif_netlink_parms(): no params data found [ 169.195821][ T7858] bond0: Enslaving bond_slave_0 as an active interface with an up link 18:56:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_0\x00', &(0x7f0000000000)=@ethtool_pauseparam={0x13}}) [ 169.247295][ T7858] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.302455][ T7858] team0: Port device team_slave_0 added [ 169.334268][ T7858] team0: Port device team_slave_1 added 18:56:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xb, 0x8, 0x209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 169.381899][ T7864] chnl_net:caif_netlink_parms(): no params data found 18:56:46 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xb, 0x7}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 169.451619][ T7860] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.460029][ T7860] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.468212][ T7860] device bridge_slave_0 entered promiscuous mode [ 169.479230][ T7860] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.489779][ T7860] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.503316][ T7860] device bridge_slave_1 entered promiscuous mode [ 169.524187][ T7852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.551210][ T7864] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.558646][ T7864] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.566647][ T7864] device bridge_slave_0 entered promiscuous mode 18:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 169.606981][ T7858] device hsr_slave_0 entered promiscuous mode [ 169.634610][ C1] hrtimer: interrupt took 37611 ns [ 169.655876][ T7858] device hsr_slave_1 entered promiscuous mode [ 169.706065][ T7864] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.713175][ T7864] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.721740][ T7864] device bridge_slave_1 entered promiscuous mode [ 169.810282][ T7887] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 170.000560][ T7860] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.017296][ T7888] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 170.034706][ T7852] 8021q: adding VLAN 0 to HW filter on device team0 18:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 170.046878][ T7854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.056166][ T7864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.068565][ T7864] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.104793][ T7860] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.117512][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.127004][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.243021][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:56:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 170.407983][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.417589][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.437436][ T7862] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.444576][ T7862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.454398][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.466298][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.474714][ T7862] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.481855][ T7862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.489777][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.497890][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.506042][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.514766][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.524076][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.535942][ T7854] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.547238][ T7864] team0: Port device team_slave_0 added [ 170.558522][ T7860] team0: Port device team_slave_0 added [ 170.671524][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 170.838033][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.847079][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.856577][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.866348][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.875634][ T3483] bridge0: port 1(bridge_slave_0) entered blocking state 18:56:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 170.882721][ T3483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.892413][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.912483][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.921267][ T3483] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.928417][ T3483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.937245][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.946220][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.956110][ T7864] team0: Port device team_slave_1 added [ 170.963472][ T7860] team0: Port device team_slave_1 added [ 171.100271][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 171.259826][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.268041][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.285679][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.314136][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.323998][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.367691][ T7860] device hsr_slave_0 entered promiscuous mode [ 171.405744][ T7860] device hsr_slave_1 entered promiscuous mode [ 171.468029][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.476996][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.485829][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.494346][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.506532][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.515486][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.536855][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.608043][ T7864] device hsr_slave_0 entered promiscuous mode [ 171.668526][ T7864] device hsr_slave_1 entered promiscuous mode [ 171.706904][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.715879][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.763730][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.774316][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.783797][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.792619][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.805326][ T7854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.819745][ T7852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.832999][ T7858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.874290][ T7854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.940207][ T7858] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.949972][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.957942][ T7865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.978182][ T7864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.000757][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.010239][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.020541][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.027743][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.064263][ T7903] check_preemption_disabled: 2 callbacks suppressed [ 172.064312][ T7903] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/7903 [ 172.073998][ T7860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.080974][ T7903] caller is sk_mc_loop+0x1d/0x210 [ 172.092897][ T7903] CPU: 1 PID: 7903 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 172.101032][ T7860] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.101927][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.101934][ T7903] Call Trace: [ 172.101964][ T7903] dump_stack+0x172/0x1f0 [ 172.101992][ T7903] __this_cpu_preempt_check+0x246/0x270 [ 172.131814][ T7903] sk_mc_loop+0x1d/0x210 [ 172.136093][ T7903] ip_mc_output+0x2ef/0xf70 [ 172.139956][ T7860] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 172.140626][ T7903] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 172.140647][ T7903] ? ip_append_data.part.0+0x170/0x170 [ 172.140670][ T7903] ? retint_kernel+0x2d/0x2d [ 172.151281][ T7860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.156134][ T7903] ip_local_out+0xc4/0x1b0 [ 172.156154][ T7903] ip_send_skb+0x42/0xf0 [ 172.156171][ T7903] udp_send_skb.isra.0+0x6b2/0x1180 [ 172.156192][ T7903] udp_push_pending_frames+0x5c/0xf0 [ 172.156207][ T7903] udp_sendpage+0x30c/0x480 [ 172.156222][ T7903] ? udp_sendmsg+0x2820/0x2820 [ 172.156239][ T7903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.156258][ T7903] ? retint_kernel+0x2d/0x2d [ 172.156273][ T7903] ? udp_sendmsg+0x2820/0x2820 [ 172.156286][ T7903] inet_sendpage+0x16b/0x630 [ 172.156307][ T7903] kernel_sendpage+0x95/0xf0 [ 172.156318][ T7903] ? inet_sendmsg+0x5e0/0x5e0 [ 172.156333][ T7903] sock_sendpage+0x8b/0xc0 [ 172.156353][ T7903] pipe_to_sendpage+0x299/0x370 [ 172.156366][ T7903] ? kernel_sendpage+0xf0/0xf0 [ 172.156379][ T7903] ? direct_splice_actor+0x1a0/0x1a0 [ 172.156397][ T7903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 172.156412][ T7903] ? anon_pipe_buf_release+0x1c6/0x270 [ 172.156427][ T7903] __splice_from_pipe+0x395/0x7d0 [ 172.156441][ T7903] ? direct_splice_actor+0x1a0/0x1a0 [ 172.156459][ T7903] ? direct_splice_actor+0x1a0/0x1a0 [ 172.156473][ T7903] splice_from_pipe+0x108/0x170 [ 172.156500][ T7903] ? splice_shrink_spd+0xd0/0xd0 [ 172.156518][ T7903] ? retint_kernel+0x2d/0x2d [ 172.156532][ T7903] ? splice_from_pipe+0x170/0x170 [ 172.156548][ T7903] generic_splice_sendpage+0x3c/0x50 [ 172.156563][ T7903] ? splice_from_pipe+0x170/0x170 [ 172.156577][ T7903] do_splice+0x70a/0x13c0 [ 172.156595][ T7903] ? retint_kernel+0x2d/0x2d [ 172.156611][ T7903] ? opipe_prep.part.0+0x2d0/0x2d0 [ 172.156633][ T7903] __x64_sys_splice+0x2c6/0x330 [ 172.156657][ T7903] do_syscall_64+0x103/0x610 [ 172.183019][ T7860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.185717][ T7903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.185732][ T7903] RIP: 0033:0x4582b9 [ 172.185748][ T7903] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.185755][ T7903] RSP: 002b:00007f7f548a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 172.185768][ T7903] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 172.185774][ T7903] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 172.185782][ T7903] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 0000000000000000 [ 172.185790][ T7903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f548aa6d4 [ 172.185798][ T7903] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 172.427274][ T7864] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.435519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.443614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.456609][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.465925][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.473008][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.480963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.490572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.499485][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.507631][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.515850][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.524487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.533710][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.540846][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.548655][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.557578][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.566481][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.573596][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.581341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.590023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.598933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.607924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.616603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.625356][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.633829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.642371][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.650811][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.659315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.667707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.675620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.709803][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.721861][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.730266][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.739213][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.748967][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.757816][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.766884][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.775510][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.784013][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.792676][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.801726][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.810341][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.819222][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.827861][ T7862] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.834944][ T7862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.842775][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.852945][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.861600][ T7862] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.868741][ T7862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.877246][ T7862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.888892][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.905806][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.919229][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.946607][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:56:49 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7}, 0x7) write$ppp(r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0x0) 18:56:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460100f30700000000000000000300000002000000f80100000000000040000000000000008800000000000000f1d70000000038000200c8000180070057e57464060000000100000000000000080000000000000000800000000000000600000000000000ff070000000000001c9d5b0200"/201], 0xc9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000f40)="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", 0x32c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000001280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], [], []]}, 0x678) [ 172.966654][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.025994][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.089425][ T7924] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/7924 [ 173.095969][ T7858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.100840][ T7924] caller is sk_mc_loop+0x1d/0x210 [ 173.111182][ T7924] CPU: 1 PID: 7924 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 173.120221][ T7924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.120229][ T7924] Call Trace: [ 173.120261][ T7924] dump_stack+0x172/0x1f0 [ 173.120283][ T7924] __this_cpu_preempt_check+0x246/0x270 [ 173.120299][ T7924] sk_mc_loop+0x1d/0x210 [ 173.120316][ T7924] ip_mc_output+0x2ef/0xf70 [ 173.120332][ T7924] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 173.120349][ T7924] ? ip_append_data.part.0+0x170/0x170 [ 173.120365][ T7924] ? retint_kernel+0x2d/0x2d [ 173.120380][ T7924] ip_local_out+0xc4/0x1b0 [ 173.120398][ T7924] ip_send_skb+0x42/0xf0 [ 173.120414][ T7924] udp_send_skb.isra.0+0x6b2/0x1180 [ 173.120434][ T7924] udp_push_pending_frames+0x5c/0xf0 [ 173.120448][ T7924] udp_sendpage+0x30c/0x480 [ 173.120465][ T7924] ? udp_sendmsg+0x2820/0x2820 [ 173.120481][ T7924] ? retint_kernel+0x2d/0x2d [ 173.120510][ T7924] ? inet_sendmsg+0x5e0/0x5e0 [ 173.120524][ T7924] ? udp_sendmsg+0x2820/0x2820 [ 173.120538][ T7924] inet_sendpage+0x16b/0x630 [ 173.120559][ T7924] kernel_sendpage+0x95/0xf0 [ 173.120581][ T7924] ? inet_sendmsg+0x5e0/0x5e0 [ 173.223912][ T7924] sock_sendpage+0x8b/0xc0 [ 173.228464][ T7924] pipe_to_sendpage+0x299/0x370 [ 173.233353][ T7924] ? kernel_sendpage+0xf0/0xf0 [ 173.238131][ T7924] ? direct_splice_actor+0x1a0/0x1a0 [ 173.243601][ T7924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 173.249965][ T7924] ? anon_pipe_buf_release+0x1c6/0x270 [ 173.255473][ T7924] __splice_from_pipe+0x395/0x7d0 [ 173.260549][ T7924] ? direct_splice_actor+0x1a0/0x1a0 [ 173.265864][ T7924] ? direct_splice_actor+0x1a0/0x1a0 [ 173.271173][ T7924] splice_from_pipe+0x108/0x170 [ 173.276054][ T7924] ? splice_shrink_spd+0xd0/0xd0 [ 173.281029][ T7924] ? apparmor_file_permission+0x25/0x30 [ 173.286595][ T7924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 173.292855][ T7924] ? security_file_permission+0x94/0x380 [ 173.298506][ T7924] generic_splice_sendpage+0x3c/0x50 [ 173.303801][ T7924] ? splice_from_pipe+0x170/0x170 [ 173.308843][ T7924] do_splice+0x70a/0x13c0 [ 173.313195][ T7924] ? opipe_prep.part.0+0x2d0/0x2d0 [ 173.318309][ T7924] ? __fget_light+0x1a9/0x230 [ 173.323082][ T7924] __x64_sys_splice+0x2c6/0x330 [ 173.328080][ T7924] do_syscall_64+0x103/0x610 [ 173.332701][ T7924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.338589][ T7924] RIP: 0033:0x4582b9 [ 173.342479][ T7924] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.362090][ T7924] RSP: 002b:00007f7f548a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 173.370508][ T7924] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 173.378508][ T7924] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 173.386504][ T7924] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 0000000000000000 [ 173.394522][ T7924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f548aa6d4 [ 173.402542][ T7924] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 173.417272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.432884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.451034][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.464941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.476566][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.484837][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.493929][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.505912][ T7864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.574839][ T7864] 8021q: adding VLAN 0 to HW filter on device batadv0 18:56:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_OIF={0x8, 0x5, r1}]}, 0x30}}, 0x0) 18:56:50 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xfc85) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0x20011b6f}], 0x1) 18:56:51 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) 18:56:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1a3}, 0x8) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) close(r0) 18:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:51 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xfc85) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0x20011b6f}], 0x1) 18:56:51 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 18:56:51 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7}, 0x7) write$ppp(r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0x0) 18:56:51 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xfc85) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0x20011b6f}], 0x1) 18:56:51 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) [ 174.669249][ T7962] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/7962 [ 174.679135][ T7962] caller is sk_mc_loop+0x1d/0x210 [ 174.684310][ T7962] CPU: 1 PID: 7962 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 174.693694][ T7962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.703775][ T7962] Call Trace: [ 174.703814][ T7962] dump_stack+0x172/0x1f0 [ 174.703842][ T7962] __this_cpu_preempt_check+0x246/0x270 [ 174.703868][ T7962] sk_mc_loop+0x1d/0x210 [ 174.703887][ T7962] ip_mc_output+0x2ef/0xf70 [ 174.703908][ T7962] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 174.703929][ T7962] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 174.703944][ T7962] ? ip_mc_output+0x6/0xf70 [ 174.703958][ T7962] ip_local_out+0xc4/0x1b0 [ 174.703974][ T7962] ip_send_skb+0x42/0xf0 [ 174.732911][ T7962] udp_send_skb.isra.0+0x6b2/0x1180 [ 174.761473][ T7962] udp_push_pending_frames+0x5c/0xf0 [ 174.766789][ T7962] udp_sendpage+0x30c/0x480 [ 174.771320][ T7962] ? udp_sendmsg+0x2820/0x2820 [ 174.776105][ T7962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.781621][ T7962] ? retint_kernel+0x2d/0x2d [ 174.786239][ T7962] ? udp_sendmsg+0x2820/0x2820 [ 174.791031][ T7962] inet_sendpage+0x16b/0x630 [ 174.795653][ T7962] kernel_sendpage+0x95/0xf0 [ 174.800274][ T7962] ? inet_sendmsg+0x5e0/0x5e0 [ 174.804975][ T7962] sock_sendpage+0x8b/0xc0 [ 174.809414][ T7962] pipe_to_sendpage+0x299/0x370 [ 174.814292][ T7962] ? kernel_sendpage+0xf0/0xf0 [ 174.814320][ T7962] ? direct_splice_actor+0x1a0/0x1a0 [ 174.824379][ T7962] ? write_comp_data+0x9/0x70 [ 174.829089][ T7962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.835361][ T7962] ? anon_pipe_buf_release+0x1c6/0x270 [ 174.840857][ T7962] __splice_from_pipe+0x395/0x7d0 [ 174.845913][ T7962] ? direct_splice_actor+0x1a0/0x1a0 [ 174.851236][ T7962] ? direct_splice_actor+0x1a0/0x1a0 [ 174.856555][ T7962] splice_from_pipe+0x108/0x170 [ 174.861434][ T7962] ? splice_shrink_spd+0xd0/0xd0 18:56:51 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xfc85) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0x20011b6f}], 0x1) 18:56:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) 18:56:51 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) 18:56:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1a3}, 0x8) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) close(r0) [ 174.866411][ T7962] ? apparmor_file_permission+0x25/0x30 [ 174.871994][ T7962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.878270][ T7962] ? security_file_permission+0x94/0x380 [ 174.883931][ T7962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.889417][ T7962] generic_splice_sendpage+0x3c/0x50 [ 174.894731][ T7962] ? splice_from_pipe+0x170/0x170 [ 174.901294][ T7962] do_splice+0x70a/0x13c0 [ 174.905647][ T7962] ? retint_kernel+0x2d/0x2d [ 174.905665][ T7962] ? opipe_prep.part.0+0x2d0/0x2d0 [ 174.905684][ T7962] __x64_sys_splice+0x2c6/0x330 [ 174.905707][ T7962] do_syscall_64+0x103/0x610 [ 174.905722][ T7962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.905733][ T7962] RIP: 0033:0x4582b9 [ 174.905749][ T7962] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.905755][ T7962] RSP: 002b:00007f7f548a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 18:56:51 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) [ 174.905768][ T7962] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 174.905775][ T7962] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 174.905783][ T7962] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 0000000000000000 [ 174.905792][ T7962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f548aa6d4 [ 174.905800][ T7962] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 18:56:51 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1a3}, 0x8) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) close(r0) [ 175.059073][ T7981] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. [ 175.129758][ T7981] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. 18:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:52 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFSYNC(r1, &(0x7f0000000200)={0x7}, 0x7) write$ppp(r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0x0) 18:56:52 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) 18:56:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d80)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)={0x24, r1, 0x121, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}]}, 0x2bf}}, 0x0) 18:56:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00D\xde\x9b\x02\x16\a') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x03\x00\x00\x00\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5\xfe\x13\x15\x14\xd7\xb8\xed\xf20\x1e\xc0\xc2\xedz?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7J\xbdX?\xc4\xf4BV\x1744`\xd1@\xb6T\xa6\x81\xb0\xfa\xc4RW\x01\x1f%\xd8\x01\xd0W\xc8\xb09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#\xf7a\xff\xff\xff\xff\xff\xff\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x00\x00\x0e\xa9\x04G*\xd4]\xc3\xcdp\xca+x\x93\xc0g.l\t\r\x1bE\xf3Y\xf0G4\xde\x970]\xa2\xf0\xc4\xb7\x19\xc5xe\xb5\xe2\v\xff\xe8i5I\x89\x9b\xcdZ\xb4\xcd\xa5|\xe2\xca\x88\xf8|\x99\xd09\xb4zc\x90g\xd8\xf1\x05\xefH\xb2\xf8ph\x04\xfb\x9e\x84\x84\x80\x17r\x1a\x88\x8fI\x9c\n\xba\x8c\x9a\x98\xee\xcc\n\x9c\xc2\xea\t\x18\xc8\xfbr\x9e*\xdeE\x80\x10\xd7\xee.\x9c\xed\x81aY:\x95\xd7&\x99\xa5\x80\x05\xec+}mu\x12\x98^\xeb\xfb\x00t?@\x81\x16\xb9\"}\x92k\x81CR\x94\xccIW5\xe6\x98\x9e\xb1\x91\xfe\xbe\xec\x17\x0f\"\xb9(5\x8aZ^\x10({A\x94.\x00\x00\x00', 0x0, 0x0) lseek(r1, 0xfffffffffffff239, 0x0) read(r1, &(0x7f0000000700)=""/4096, 0x1000) 18:56:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) 18:56:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 175.620212][ T8002] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. 18:56:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) [ 175.744039][ T8018] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8018 [ 175.754465][ T8018] caller is sk_mc_loop+0x1d/0x210 [ 175.759822][ T8018] CPU: 0 PID: 8018 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 175.770374][ T8018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.770384][ T8018] Call Trace: [ 175.770419][ T8018] dump_stack+0x172/0x1f0 [ 175.770448][ T8018] __this_cpu_preempt_check+0x246/0x270 [ 175.770470][ T8018] sk_mc_loop+0x1d/0x210 [ 175.770506][ T8018] ip_mc_output+0x2ef/0xf70 [ 175.770532][ T8018] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 175.770556][ T8018] ? ip_append_data.part.0+0x170/0x170 [ 175.770583][ T8018] ip_local_out+0xc4/0x1b0 [ 175.770606][ T8018] ip_send_skb+0x42/0xf0 [ 175.770626][ T8018] udp_send_skb.isra.0+0x6b2/0x1180 [ 175.770656][ T8018] udp_push_pending_frames+0x5c/0xf0 [ 175.770676][ T8018] udp_sendpage+0x30c/0x480 [ 175.770696][ T8018] ? udp_sendmsg+0x2820/0x2820 [ 175.770720][ T8018] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 175.770747][ T8018] ? retint_kernel+0x2d/0x2d [ 175.770765][ T8018] ? udp_sendmsg+0x2820/0x2820 [ 175.770784][ T8018] inet_sendpage+0x16b/0x630 [ 175.770810][ T8018] kernel_sendpage+0x95/0xf0 [ 175.770824][ T8018] ? inet_sendmsg+0x5e0/0x5e0 [ 175.770846][ T8018] sock_sendpage+0x8b/0xc0 [ 175.770866][ T8018] pipe_to_sendpage+0x299/0x370 [ 175.770893][ T8018] ? kernel_sendpage+0xf0/0xf0 [ 175.770911][ T8018] ? direct_splice_actor+0x1a0/0x1a0 [ 175.770934][ T8018] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 175.770956][ T8018] ? anon_pipe_buf_release+0x1c6/0x270 [ 175.803163][ T8018] __splice_from_pipe+0x395/0x7d0 [ 175.803182][ T8018] ? direct_splice_actor+0x1a0/0x1a0 [ 175.803204][ T8018] ? direct_splice_actor+0x1a0/0x1a0 [ 175.803218][ T8018] splice_from_pipe+0x108/0x170 [ 175.803237][ T8018] ? splice_shrink_spd+0xd0/0xd0 [ 175.803262][ T8018] ? apparmor_file_permission+0x25/0x30 [ 175.803290][ T8018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.847748][ T8018] ? security_file_permission+0x94/0x380 [ 175.847773][ T8018] generic_splice_sendpage+0x3c/0x50 [ 175.847788][ T8018] ? splice_from_pipe+0x170/0x170 [ 175.847812][ T8018] do_splice+0x70a/0x13c0 [ 175.857217][ T8018] ? opipe_prep.part.0+0x2d0/0x2d0 [ 175.857236][ T8018] ? __fget_light+0x1a9/0x230 [ 175.857251][ T8018] __x64_sys_splice+0x2c6/0x330 [ 175.857275][ T8018] do_syscall_64+0x103/0x610 [ 175.857295][ T8018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.857306][ T8018] RIP: 0033:0x4582b9 [ 175.857324][ T8018] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.857332][ T8018] RSP: 002b:00007f7f548a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 175.857346][ T8018] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 175.857355][ T8018] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 175.857363][ T8018] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 0000000000000000 [ 175.857383][ T8018] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f548aa6d4 [ 176.048808][ T8018] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 18:56:52 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 18:56:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) 18:56:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) [ 176.231779][ T8039] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. 18:56:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) [ 176.509777][ T8054] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. 18:56:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:53 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:53 executing program 4: clone(0x62100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x20000000) 18:56:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a06032c000cd300e8bd6efb120009000e003fa00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0x1300}, 0x0) 18:56:53 executing program 4: clone(0x62100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x20000000) 18:56:53 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) [ 176.790548][ T8075] IPv6: Can't replace route, no match found 18:56:53 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 18:56:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000001e0007041dfffd946f610500070000001f000000000002000800a3a20400ff7e", 0x24}], 0x1}, 0x0) 18:56:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x200000000008) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xef, 0x20000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1ffffffffff, 0x3) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000240), &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@req={0x28, &(0x7f0000000240)={'lo\x00', @ifru_map={0xff, 0x983e, 0x31, 0x9, 0x7, 0x1}}}) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'sit0\x00', r3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000500)='syz0\x00', 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) 18:56:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)={0x0, 0x40000000000006, 0x1}) 18:56:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x24, 0x0, 0x0) 18:56:54 executing program 4: clone(0x62100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x20000000) 18:56:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 18:56:54 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) 18:56:54 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f00000003c0)=[@acquire={0x4008630a}], 0x0, 0x0, 0x0}) 18:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/168, 0xa8}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x64}}) 18:56:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget(0x2, 0x1000, 0x300, &(0x7f0000ffe000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmctl$IPC_RMID(r1, 0x0) [ 178.133749][ T8154] binder: BC_ATTEMPT_ACQUIRE not supported [ 178.141868][ T8154] binder: 8152:8154 ioctl c0306201 20000040 returned -22 18:56:55 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x70) 18:56:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) fcntl$getflags(r0, 0x403) 18:56:55 executing program 4: clone(0x62100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x20000000) 18:56:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="b6001000000020000000ed69d2bc70f4458b62900338fc0fae1a0000042e008dbdc660f2e4561f7d9a48", 0x2a) 18:56:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc003, @multicast2}]}}}]}, 0x38}}, 0x0) 18:56:55 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 18:56:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) fcntl$getflags(r0, 0x403) 18:56:55 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="b6001000000020000000ed69d2bc70f4458b62900338fc0fae1a0000042e008dbdc660f2e4561f7d9a48", 0x2a) 18:56:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) fcntl$getflags(r0, 0x403) 18:56:56 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="b6001000000020000000ed69d2bc70f4458b62900338fc0fae1a0000042e008dbdc660f2e4561f7d9a48", 0x2a) 18:56:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="b6001000000020000000ed69d2bc70f4458b62900338fc0fae1a0000042e008dbdc660f2e4561f7d9a48", 0x2a) 18:56:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) fcntl$getflags(r0, 0x403) 18:56:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 18:56:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:56 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1003, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x9, 0x7ff]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000000c0)={r1, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @rand_addr=0x800}}}, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 18:56:56 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x101006, 0x0) write$rfkill(r0, &(0x7f0000000180)={0x0, 0x8, 0x2}, 0x8) 18:56:56 executing program 2: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffff9c, 0x0, 0x0, 0x0}, 0x30) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @broadcast}, 0x14, {0x2, 0x4e23, @remote}, 'veth0_to_bridge\x00'}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x80000001fff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000540)}, 0x10) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000400)=0x200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) request_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/video#\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)="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", 0x1000, 0xfffffffffffffffd) add_key(&(0x7f0000001f00)='syzkaller\x00', &(0x7f0000001ec0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000017c0)='ceph\x00', &(0x7f0000001800)={'syz', 0x3}, &(0x7f0000001840)="096d0d704b6257b0e804467a8401acc424e714754f03b9929425792afbb9dcbdeae88676e8c85a5908134d4def5d9c5ee92690bd360f98998fe77e323789e65576215c144aad0162ba4a9c2c72a9ea1697c6ea65e34c1033ef1d4ee7ac946072021d3c1e078975a56b87eb2665478343aeac10ea2dd532a9fe63bb80b6e271a2b43bec9c194f7e678b00845099c6945df5a3de4f7c2aa04c5e1282ebd431de", 0x9f, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r4, 0x0) 18:56:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000017f07)={@link_local, @link_local={0x1, 0x80, 0xc2, 0xd00000000000000, 0x4305}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @loopback}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x5, 0x0, 0x4, 0x880b, 0x8864}}}}}}, 0x0) [ 180.034347][ T8260] encrypted_key: insufficient parameters specified 18:56:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0xe, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) gettid() fcntl$setown(r2, 0x8, 0xffffffffffffffff) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) kexec_load(0x3d3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000280)="530425654a66980e3dbc2a7dcf6ebcc29353881d09af6adc3b2dacc5e59c4d72a20e0a1f593cd5fdfafd73536364da590392f663999ce4461053738927a303db253aedfbadda83d8d0dccd30d22efa53123e11213916e6f53e298af3a53aa7d21e609af9a67dff8636fac6577d61b5db18c0ad8811f6ac3616", 0x79, 0x3, 0x2}], 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @rand_addr="857e5951d64da10c6c030c6d8dfb9dc2"}, r1}}, 0xfffffe7e) r3 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)={0x3b, 0x0, 0x7}) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 18:56:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 18:56:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000004c80)=@mpls_getnetconf={0x1c, 0x42, 0x701, 0x0, 0x0, {0xf}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}}, 0x0) 18:56:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000001c0)={0x0, r2/1000+30000}, 0x10) recvfrom$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 18:56:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000004c80)=@mpls_getnetconf={0x1c, 0x42, 0x701, 0x0, 0x0, {0xf}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 180.802373][ T8260] encrypted_key: insufficient parameters specified 18:56:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 18:56:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000004c80)=@mpls_getnetconf={0x1c, 0x42, 0x701, 0x0, 0x0, {0xf}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}}, 0x0) 18:56:57 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x4, @tid=r1}, &(0x7f0000000080)) 18:56:58 executing program 2: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffff9c, 0x0, 0x0, 0x0}, 0x30) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @broadcast}, 0x14, {0x2, 0x4e23, @remote}, 'veth0_to_bridge\x00'}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x80000001fff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000540)}, 0x10) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000400)=0x200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) request_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/video#\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)="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", 0x1000, 0xfffffffffffffffd) add_key(&(0x7f0000001f00)='syzkaller\x00', &(0x7f0000001ec0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000017c0)='ceph\x00', &(0x7f0000001800)={'syz', 0x3}, &(0x7f0000001840)="096d0d704b6257b0e804467a8401acc424e714754f03b9929425792afbb9dcbdeae88676e8c85a5908134d4def5d9c5ee92690bd360f98998fe77e323789e65576215c144aad0162ba4a9c2c72a9ea1697c6ea65e34c1033ef1d4ee7ac946072021d3c1e078975a56b87eb2665478343aeac10ea2dd532a9fe63bb80b6e271a2b43bec9c194f7e678b00845099c6945df5a3de4f7c2aa04c5e1282ebd431de", 0x9f, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r4, 0x0) 18:56:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 18:56:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000004c80)=@mpls_getnetconf={0x1c, 0x42, 0x701, 0x0, 0x0, {0xf}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}}, 0x0) 18:56:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 18:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 18:56:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 18:56:58 executing program 1: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffff9c, 0x0, 0x0, 0x0}, 0x30) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @broadcast}, 0x14, {0x2, 0x4e23, @remote}, 'veth0_to_bridge\x00'}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x80000001fff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000540)}, 0x10) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000400)=0x200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) request_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)='/dev/video#\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)="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", 0x1000, 0xfffffffffffffffd) add_key(&(0x7f0000001f00)='syzkaller\x00', &(0x7f0000001ec0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000017c0)='ceph\x00', &(0x7f0000001800)={'syz', 0x3}, &(0x7f0000001840)="096d0d704b6257b0e804467a8401acc424e714754f03b9929425792afbb9dcbdeae88676e8c85a5908134d4def5d9c5ee92690bd360f98998fe77e323789e65576215c144aad0162ba4a9c2c72a9ea1697c6ea65e34c1033ef1d4ee7ac946072021d3c1e078975a56b87eb2665478343aeac10ea2dd532a9fe63bb80b6e271a2b43bec9c194f7e678b00845099c6945df5a3de4f7c2aa04c5e1282ebd431de", 0x9f, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r4, 0x0) [ 181.452247][ T8333] encrypted_key: insufficient parameters specified [ 181.649936][ T8340] encrypted_key: insufficient parameters specified 18:56:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 18:56:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 18:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609)