[ 35.594480][ T26] audit: type=1800 audit(1554697082.245:27): pid=7515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.616824][ T26] audit: type=1800 audit(1554697082.255:28): pid=7515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.151428][ T26] audit: type=1800 audit(1554697082.865:29): pid=7515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.177168][ T26] audit: type=1800 audit(1554697082.875:30): pid=7515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. 2019/04/08 04:18:22 fuzzer started 2019/04/08 04:18:25 dialing manager at 10.128.0.26:34543 2019/04/08 04:18:25 syscalls: 2408 2019/04/08 04:18:25 code coverage: enabled 2019/04/08 04:18:25 comparison tracing: enabled 2019/04/08 04:18:25 extra coverage: extra coverage is not supported by the kernel 2019/04/08 04:18:25 setuid sandbox: enabled 2019/04/08 04:18:25 namespace sandbox: enabled 2019/04/08 04:18:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/08 04:18:25 fault injection: enabled 2019/04/08 04:18:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/08 04:18:25 net packet injection: enabled 2019/04/08 04:18:25 net device setup: enabled 04:20:36 executing program 0: syzkaller login: [ 189.995593][ T7681] IPVS: ftp: loaded support on port[0] = 21 [ 190.102163][ T7681] chnl_net:caif_netlink_parms(): no params data found 04:20:36 executing program 1: [ 190.151209][ T7681] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.172669][ T7681] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.181089][ T7681] device bridge_slave_0 entered promiscuous mode [ 190.213447][ T7681] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.220622][ T7681] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.229103][ T7681] device bridge_slave_1 entered promiscuous mode [ 190.267188][ T7681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.294288][ T7681] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.319126][ T7681] team0: Port device team_slave_0 added [ 190.327339][ T7681] team0: Port device team_slave_1 added [ 190.340233][ T7684] IPVS: ftp: loaded support on port[0] = 21 04:20:37 executing program 2: [ 190.445215][ T7681] device hsr_slave_0 entered promiscuous mode [ 190.482856][ T7681] device hsr_slave_1 entered promiscuous mode [ 190.532704][ T7681] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.539964][ T7681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.548116][ T7681] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.555245][ T7681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.590431][ T7686] IPVS: ftp: loaded support on port[0] = 21 04:20:37 executing program 3: [ 190.741237][ T7681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.781435][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.805012][ T2996] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.824526][ T2996] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.833788][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 190.848068][ T7681] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.858253][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 190.876608][ T7690] IPVS: ftp: loaded support on port[0] = 21 [ 190.885726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.903247][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.910434][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.918904][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.927636][ T5] bridge0: port 2(bridge_slave_1) entered blocking state 04:20:37 executing program 4: [ 190.934768][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.969181][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.034548][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.086840][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.147370][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.173356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.205571][ T7686] chnl_net:caif_netlink_parms(): no params data found [ 191.220346][ T7681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.235445][ T7681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.243948][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.251015][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.260348][ T7684] device bridge_slave_0 entered promiscuous mode [ 191.270027][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.277891][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.286614][ T7684] device bridge_slave_1 entered promiscuous mode 04:20:38 executing program 5: [ 191.299945][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.309953][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.328277][ T7695] IPVS: ftp: loaded support on port[0] = 21 [ 191.381112][ T7681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.397250][ T7684] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.437633][ T7686] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.445403][ T7686] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.453555][ T7686] device bridge_slave_0 entered promiscuous mode [ 191.463762][ T7684] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.520680][ T7686] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.528811][ T7686] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.539738][ T7686] device bridge_slave_1 entered promiscuous mode [ 191.579289][ T7684] team0: Port device team_slave_0 added [ 191.614074][ T7684] team0: Port device team_slave_1 added [ 191.626395][ T7686] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.628680][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 191.645613][ T7690] chnl_net:caif_netlink_parms(): no params data found 04:20:38 executing program 0: r0 = socket(0x2000000000000021, 0x2000000002, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x110, 0xa}], 0x10}}], 0x1, 0x0) [ 191.688988][ T7686] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123e123f3188b070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) [ 191.775475][ T7684] device hsr_slave_0 entered promiscuous mode [ 191.803792][ T7684] device hsr_slave_1 entered promiscuous mode 04:20:38 executing program 0: r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") write(r0, &(0x7f0000000180)="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", 0xfc) [ 191.871920][ T7686] team0: Port device team_slave_0 added [ 191.894943][ T7686] team0: Port device team_slave_1 added [ 191.979712][ T7690] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.987077][ T7690] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.995355][ T7690] device bridge_slave_0 entered promiscuous mode [ 192.065329][ T7686] device hsr_slave_0 entered promiscuous mode [ 192.102887][ T7686] device hsr_slave_1 entered promiscuous mode [ 192.143835][ T7711] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 192.156985][ T7690] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.164402][ T7690] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.172049][ T7690] device bridge_slave_1 entered promiscuous mode 04:20:38 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 192.188182][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.195339][ T7684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.202745][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.209847][ T7684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.220591][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.228235][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.289849][ T7690] bond0: Enslaving bond_slave_0 as an active interface with an up link 04:20:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write(r0, &(0x7f00000000c0)="00f3", 0x2) [ 192.331918][ T7695] chnl_net:caif_netlink_parms(): no params data found [ 192.368375][ T7690] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.429191][ T7690] team0: Port device team_slave_0 added [ 192.439530][ T7690] team0: Port device team_slave_1 added [ 192.455450][ T7698] chnl_net:caif_netlink_parms(): no params data found 04:20:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0xfffffff0}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 192.489130][ T7684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.605278][ T7690] device hsr_slave_0 entered promiscuous mode [ 192.632946][ T7690] device hsr_slave_1 entered promiscuous mode 04:20:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@remote, @remote, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 192.694904][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.702038][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.719259][ T7695] device bridge_slave_0 entered promiscuous mode [ 192.735153][ T7686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.764740][ T7684] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.772652][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.779727][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.788202][ T7695] device bridge_slave_1 entered promiscuous mode [ 192.803062][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.810159][ T7698] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.818484][ T7698] device bridge_slave_0 entered promiscuous mode [ 192.827221][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.836307][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.867339][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.875210][ T7698] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.884093][ T7698] device bridge_slave_1 entered promiscuous mode [ 192.903351][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.912030][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.920833][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.928257][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.936467][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.945242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.953720][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.960791][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.973871][ T7695] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.000791][ T7695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.020719][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.029479][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.038460][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.048131][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.056586][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.065277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.073873][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.082080][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.090388][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.111480][ T7684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.123153][ T7684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.142822][ T7698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.151511][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.160699][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.169570][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.177592][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.191553][ T7695] team0: Port device team_slave_0 added [ 193.201053][ T7695] team0: Port device team_slave_1 added [ 193.212680][ T7698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.224290][ T7686] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.294846][ T7695] device hsr_slave_0 entered promiscuous mode [ 193.343713][ T7695] device hsr_slave_1 entered promiscuous mode [ 193.389927][ T7684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.405020][ T7690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.418031][ T7698] team0: Port device team_slave_0 added [ 193.440491][ T7698] team0: Port device team_slave_1 added [ 193.458408][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.468356][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:20:40 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") close(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r2, &(0x7f0000003080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) sendmmsg$unix(r0, &(0x7f0000002f00)=[{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000002c0)='j', 0x1}], 0x1, 0x0, 0x0, 0x40000}], 0x1, 0x40000) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 193.488343][ T2996] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.495488][ T2996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.519761][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.528583][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.537216][ T2996] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.544395][ T2996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.552026][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.561166][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.570843][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.578630][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.588066][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.596059][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.604837][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.618930][ T7690] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.630817][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.639213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.648099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.715949][ T7698] device hsr_slave_0 entered promiscuous mode [ 193.743453][ T7698] device hsr_slave_1 entered promiscuous mode [ 193.797145][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.812205][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.821129][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.828245][ T7687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.839002][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.847719][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.858543][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.867315][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.875849][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.882965][ T7687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.890833][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.918001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.926688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.936162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.945216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.954590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.963341][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.971783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.980679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.990197][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.999953][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.020409][ T7690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.031904][ T7690] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.051624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.064106][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.074017][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.082347][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.090961][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.118373][ T7686] 8021q: adding VLAN 0 to HW filter on device batadv0 04:20:40 executing program 2: mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="71751854d22a96614f6f8524d9a85d2a", 0x10) 04:20:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) 04:20:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c460000000000f200000000000000000000000037ffe7f4ff0000000000"], 0x20) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/131, 0x83}], 0x1}, 0x0) 04:20:41 executing program 2: getpid() r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/134, 0x86}], 0x1) tkill(r0, 0x1000000000014) syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:20:41 executing program 3: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0/file0\x00', 0xe, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:20:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 04:20:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 195.032757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 195.038846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 195.052825][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.058712][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:20:41 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r0 = creat(&(0x7f0000001c00)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) [ 195.168018][ T7785] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:20:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 04:20:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:20:42 executing program 3: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) [ 195.501242][ C0] hrtimer: interrupt took 54519 ns 04:20:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000003c0)={0x0, 0x5000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001040)={0x0, 0x70, "66769b41e6071105df6e2240911e4cd7f47f960fb679d3239385b7dc3296c1104fd1a7daf0839af4d667c6baa4f6628767dd282def030452cc864d716d2d7b0c6047ed9650f9dfdcf3896eda2fc1aa91d1e6a58ea48b2b5c2fd77d56d3d83b5164aa022b79d76f878e6769ffbd655686"}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:20:42 executing program 0: r0 = socket(0x2000000000000021, 0x2000000002, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xd, 'w'}], 0x18}}], 0x1, 0x0) 04:20:42 executing program 5: r0 = socket(0x2000000000000021, 0x2000000002, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x0, 'w'}], 0x18}}], 0x1, 0x0) 04:20:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x7ff}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:42 executing program 3: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 04:20:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 04:20:43 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\x001\x85\xd12\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeal\x16\x8c\x04\x00\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)\x01\x00\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x82) [ 196.380460][ T7849] kvm: pic: single mode not supported [ 196.398931][ T7849] kvm: pic: level sensitive irq not supported 04:20:43 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) read(r0, &(0x7f0000000140)=""/59, 0x3b) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r1 = request_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='IPVS\x00', 0xffffffffffffffff) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast2, @multicast2}, &(0x7f00000002c0)=0xc) connect$packet(r2, &(0x7f0000000300)={0x11, 0x1f, r3, 0x1, 0xfffffffffffffbc3, 0x6, @random="815afb4f5637"}, 0x14) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fff, 0x2, 0x200, 0x4}, 0x10) r4 = add_key(&(0x7f0000000440)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="057d24ae64251ec099ba52fb5c54c9499e770008cb3eddeb179724fada42a85adbee88f31a5ce865ae3edc3bb50f", 0x2e, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0xf4, r4) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000540)={0x40, {0x1, 0x969, 0x9, 0x3, 0x100000000}}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280), 0x4) r5 = dup2(r0, r0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000740)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x10) 04:20:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 196.427751][ T7849] kvm: pic: level sensitive irq not supported [ 196.443877][ T7858] mmap: syz-executor.5 (7858) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 196.468128][ T7849] kvm: pic: single mode not supported 04:20:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:45 executing program 5: timerfd_create(0x0, 0x0) epoll_create1(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) stat(0x0, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) setregid(0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') 04:20:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) get_thread_area(&(0x7f0000000000)={0x1}) 04:20:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) ioctl$KVM_GET_CPUID2(r3, 0x4004ae8b, &(0x7f0000000040)) 04:20:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000022c0)={0x5, 0x1, 0x200, 0x78, 0x0, 0xffffffffffffffff, 0x400, [], 0x0, 0xffffffffffffffff, 0x3c4, 0x8}, 0x3c) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x5}, 0x8) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) 04:20:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123e123f3188b070") socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(0xffffffffffffffff) 04:20:45 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="090025bd7000ffdbdf25020000000c00020008000200ff010000800004003c0007000800030000800000080003000400000008000400d600000008000400800000000800030000000100080001001f00000008000100000000001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00002c00090008000100ffffffff080001000500000008000200010000800800010000000000080001005a030000"], 0x1}, 0x1, 0x0, 0x0, 0x400d5}, 0x4000000) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 04:20:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x802}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x324) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000007c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x14u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xe6\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15~\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xf27\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x832\xf8\x80\xb5\xaa\a\xba\xc8\xe6of\xf4\x906\xcd\xc1@\xbf\x9fa|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02R\x00\x00\x00yl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj)\xb8w]\xfa\xa4\x9c\x95\x9b=k\x0e^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x1c\xb0\x10\x00\x00\x00\xd9\xe6\xefe\xf7\xb2\x85\xfc\xd8\x90\x1e\n\xab\x88\xfe\x85\xb8\x9aL\x929\x8d\xeb\x88\xd4\x86\xf77\x9b\xdf\x85\xcbDib\xf6\xb0\xec+\x95>\xe7\xd9\xdf*I4m_\x18\xe2\x88;\x14Cp/\x1d\xeam\xce5\xdb\xac\xb8`Ex\x8e\xd0l\xc1\xfbWq\"C\x88\xcf\xd6\x19\xc09\xff\xea\x9f\xaeO\x82*\xbco\xd6\b\xca\xc1Y\xfcz\xbe\x84\x8cc\xf8?\xc1\x00\x00\xdb8q\xb4([d\x1c\x9d`\xc1N\xce\x94l\x8f\xb8\xc6\xb1\xa7\xe8b\x81\xf9\xc99n\xf4\"\xe4\n\xd7\"\x1b\xd2\x19\a\xaeY\x7fKK\x13\xff\xd5\x0e[\x85\xfewy\x9e\xfa\n\xbdV4 \xcf\xed\t\"\xee\xcc\x9c\x0f\xdf\x04\xcbH\x9d\x94\xb5\rH~\xc6Z\x8f\xabA\x81\x11\xdf\xdf\f\xa9\xd5\xb6,B\xf8b\x89N\xaei\xa1)n\xb3\x0eW\xc5\xed\x942\b\b\x88\x19\x8e\x9a\xbe\xab\xb0=\x02\x1d;7|\x9bzG\xee\x8ds\xb0cPe\xbc\xb0\xb5y\xcc2\x90c\x95\x13\xa3`\"\xa6{\xd2\xf2)\x1eM\xec1\x02\x05\xa3\x94\xa5\x8a\xecY\xbcG\x95\xb7F\xd2\x9c6\xc3T\b\xe6\x847P\xf2Q\xa4\xe1\xd5\x7f\xf5\xf9\xf1\xcaNp\rB5\x14\xea\xae\xd4`\x834\xbf`\xca\xc1\xa7\x19\xfaD\b\x8b,\xa8\xba\x04t\\#\x94D\x86L\xf4\xe8\xd2\x19\x90\'\xe2\vx.BW6R1k^\xc1\x06\xcea\xc4v\x95\x06\x89\x9a\xbd\x02\xc1\xcc+mEd\xba\xbb#,\x04\xe1\xf5&\a\x1f\xedH\x89j\x91\xf7\xf5s\xb9;% \xb1/\x88\x10q\x96\xe0m\x9c\xb4]+m\xf3\x8d\x9c\x13h\xdb|\x99\x196\xf0\xbd\xacRjI[\xc2\x94\xe7#\x86\xff\x95\xc4\x1d\xd7\xe3\xf1\xe69\xd9\x80\xccE\xbc\xd1%I\xdfhJ\x9b\xe8\xb2\xc7z') 04:20:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:45 executing program 5: 04:20:45 executing program 2: 04:20:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:48 executing program 3: 04:20:48 executing program 5: 04:20:48 executing program 2: 04:20:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18a3f800000000583c837a0d9c00bbf5"], 0x10}, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0xc}], 0xc}}], 0xb, 0x0) 04:20:48 executing program 5: 04:20:48 executing program 2: [ 201.492047][ T7930] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7930 [ 201.501761][ T7930] caller is ip6_finish_output+0x335/0xdc0 [ 201.507872][ T7930] CPU: 0 PID: 7930 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 201.516930][ T7930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.527001][ T7930] Call Trace: [ 201.530315][ T7930] dump_stack+0x172/0x1f0 [ 201.530360][ T7930] __this_cpu_preempt_check+0x246/0x270 [ 201.540231][ T7930] ip6_finish_output+0x335/0xdc0 [ 201.540254][ T7930] ip6_output+0x235/0x7f0 [ 201.540277][ T7930] ? ip6_finish_output+0xdc0/0xdc0 [ 201.554657][ T7930] ? ip6_fragment+0x3980/0x3980 [ 201.559526][ T7930] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 201.565094][ T7930] ip6_local_out+0xc4/0x1b0 [ 201.569628][ T7930] ip6_send_skb+0xbb/0x350 [ 201.574061][ T7930] ip6_push_pending_frames+0xc8/0xf0 [ 201.579393][ T7930] rawv6_sendmsg+0x299c/0x35e0 [ 201.584177][ T7930] ? rawv6_getsockopt+0x150/0x150 04:20:48 executing program 2: [ 201.589225][ T7930] ? aa_profile_af_perm+0x320/0x320 [ 201.594448][ T7930] ? __lock_acquire+0x548/0x3fb0 [ 201.599503][ T7930] ? ___might_sleep+0x163/0x280 [ 201.604376][ T7930] ? __might_sleep+0x95/0x190 [ 201.609079][ T7930] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 201.614650][ T7930] inet_sendmsg+0x147/0x5e0 [ 201.619266][ T7930] ? rawv6_getsockopt+0x150/0x150 [ 201.624301][ T7930] ? inet_sendmsg+0x147/0x5e0 [ 201.628994][ T7930] ? ipip_gro_receive+0x100/0x100 [ 201.634036][ T7930] sock_sendmsg+0xdd/0x130 04:20:48 executing program 5: [ 201.638464][ T7930] ___sys_sendmsg+0x3e2/0x930 [ 201.643156][ T7930] ? copy_msghdr_from_user+0x430/0x430 [ 201.648648][ T7930] ? lock_downgrade+0x880/0x880 [ 201.653519][ T7930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.653541][ T7930] ? kasan_check_read+0x11/0x20 [ 201.653561][ T7930] ? __fget+0x381/0x550 [ 201.653580][ T7930] ? ksys_dup3+0x3e0/0x3e0 [ 201.653612][ T7930] ? __fget_light+0x1a9/0x230 [ 201.653627][ T7930] ? __fdget+0x1b/0x20 [ 201.653640][ T7930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 04:20:48 executing program 3: [ 201.653657][ T7930] ? sockfd_lookup_light+0xcb/0x180 [ 201.653673][ T7930] __sys_sendmmsg+0x1bf/0x4d0 [ 201.653692][ T7930] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 201.678023][ T7930] ? _copy_to_user+0xc9/0x120 [ 201.678045][ T7930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.678059][ T7930] ? put_timespec64+0xda/0x140 [ 201.678079][ T7930] ? nsecs_to_jiffies+0x30/0x30 [ 201.723776][ T7930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.729248][ T7930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.734724][ T7930] ? do_syscall_64+0x26/0x610 [ 201.734740][ T7930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.734753][ T7930] ? do_syscall_64+0x26/0x610 [ 201.734772][ T7930] __x64_sys_sendmmsg+0x9d/0x100 [ 201.734788][ T7930] do_syscall_64+0x103/0x610 [ 201.734804][ T7930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.734816][ T7930] RIP: 0033:0x4582b9 [ 201.734831][ T7930] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:20:48 executing program 3: [ 201.734839][ T7930] RSP: 002b:00007f29cb129c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 201.734852][ T7930] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 201.734860][ T7930] RDX: 000000000000000b RSI: 0000000020000000 RDI: 0000000000000003 [ 201.734867][ T7930] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 201.734875][ T7930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29cb12a6d4 [ 201.734884][ T7930] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff [ 201.857401][ T7930] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/7930 [ 201.875750][ T7930] caller is ip6_finish_output+0x335/0xdc0 [ 201.881495][ T7930] CPU: 0 PID: 7930 Comm: syz-executor.0 Not tainted 5.1.0-rc3-next-20190405 #19 [ 201.890516][ T7930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.890523][ T7930] Call Trace: [ 201.890554][ T7930] dump_stack+0x172/0x1f0 [ 201.890578][ T7930] __this_cpu_preempt_check+0x246/0x270 [ 201.890611][ T7930] ip6_finish_output+0x335/0xdc0 [ 201.890635][ T7930] ip6_output+0x235/0x7f0 [ 201.890656][ T7930] ? ip6_finish_output+0xdc0/0xdc0 [ 201.890678][ T7930] ? ip6_fragment+0x3980/0x3980 [ 201.890698][ T7930] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 201.890718][ T7930] ip6_local_out+0xc4/0x1b0 [ 201.890738][ T7930] ip6_send_skb+0xbb/0x350 [ 201.890759][ T7930] ip6_push_pending_frames+0xc8/0xf0 [ 201.890779][ T7930] rawv6_sendmsg+0x299c/0x35e0 [ 201.890803][ T7930] ? rawv6_getsockopt+0x150/0x150 [ 201.890819][ T7930] ? aa_profile_af_perm+0x320/0x320 [ 201.890843][ T7930] ? __lock_acquire+0x548/0x3fb0 [ 201.890870][ T7930] ? ___might_sleep+0x163/0x280 [ 201.890889][ T7930] ? __might_sleep+0x95/0x190 [ 201.890929][ T7930] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 201.890948][ T7930] inet_sendmsg+0x147/0x5e0 [ 201.890964][ T7930] ? rawv6_getsockopt+0x150/0x150 [ 201.890976][ T7930] ? inet_sendmsg+0x147/0x5e0 [ 201.890992][ T7930] ? ipip_gro_receive+0x100/0x100 [ 201.891012][ T7930] sock_sendmsg+0xdd/0x130 [ 201.891032][ T7930] ___sys_sendmsg+0x3e2/0x930 [ 201.891053][ T7930] ? copy_msghdr_from_user+0x430/0x430 [ 201.891073][ T7930] ? lock_downgrade+0x880/0x880 [ 201.891088][ T7930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.891107][ T7930] ? kasan_check_read+0x11/0x20 [ 201.891127][ T7930] ? __fget+0x381/0x550 [ 201.891148][ T7930] ? ksys_dup3+0x3e0/0x3e0 [ 201.891162][ T7930] ? find_held_lock+0x35/0x130 [ 201.891185][ T7930] ? __fget_light+0x1a9/0x230 [ 201.891202][ T7930] ? __fdget+0x1b/0x20 [ 201.891216][ T7930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.891231][ T7930] ? sockfd_lookup_light+0xcb/0x180 [ 201.891249][ T7930] __sys_sendmmsg+0x1bf/0x4d0 [ 201.891270][ T7930] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 201.891297][ T7930] ? _copy_to_user+0xc9/0x120 [ 201.891314][ T7930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.891329][ T7930] ? put_timespec64+0xda/0x140 [ 201.891343][ T7930] ? nsecs_to_jiffies+0x30/0x30 [ 201.891369][ T7930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.891384][ T7930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.891401][ T7930] ? do_syscall_64+0x26/0x610 [ 201.891419][ T7930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.891435][ T7930] ? do_syscall_64+0x26/0x610 [ 201.891454][ T7930] __x64_sys_sendmmsg+0x9d/0x100 [ 201.891472][ T7930] do_syscall_64+0x103/0x610 [ 201.891491][ T7930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.891503][ T7930] RIP: 0033:0x4582b9 [ 201.891522][ T7930] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.891531][ T7930] RSP: 002b:00007f29cb129c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 201.891546][ T7930] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 201.891557][ T7930] RDX: 000000000000000b RSI: 0000000020000000 RDI: 0000000000000004 [ 201.891566][ T7930] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 201.891576][ T7930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29cb12a6d4 [ 201.891586][ T7930] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff 04:20:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c913000180f0ffffebffff6e263f", 0x29}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 04:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) write$nbd(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x20}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8001}) write$cgroup_int(r1, &(0x7f0000000000), 0x1fff) 04:20:51 executing program 0: 04:20:51 executing program 3: 04:20:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:51 executing program 3: 04:20:51 executing program 0: 04:20:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000600)=0x4, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@nfc, 0x9005, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x811e}, 0x300) 04:20:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 04:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) write$nbd(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x20}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8001}) write$cgroup_int(r1, &(0x7f0000000000), 0x1fff) 04:20:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 04:20:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x0, 0x4, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x4}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:54 executing program 0: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, 0x0) 04:20:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x11, 0x4, 0x3, 0x0, r0}, 0x1e) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r1, &(0x7f0000000480)}, 0x10) 04:20:54 executing program 2: 04:20:54 executing program 2: 04:20:54 executing program 2: 04:20:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7000000000000fb4d000000000000009500000000000000"], 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 207.684123][ T7998] kvm: pic: single mode not supported [ 207.693464][ T7998] kvm: pic: level sensitive irq not supported [ 207.729497][ T7998] kvm: pic: level sensitive irq not supported 04:20:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x7, r2, 0x0, 0x0) [ 207.739554][ T7998] kvm: pic: single mode not supported 04:20:54 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/254, 0xfe}], 0x1, 0x0) timer_create(0x0, &(0x7f00000018c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) dup2(r3, r0) tkill(r1, 0x15) 04:20:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xa, 0x100000000000913, 0x6, 0x2, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:20:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x0, 0x4, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x4}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:54 executing program 5: 04:20:54 executing program 0: 04:20:54 executing program 2: 04:20:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:20:54 executing program 2: 04:20:54 executing program 5: 04:20:55 executing program 0: [ 208.387396][ T8056] kvm: pic: single mode not supported [ 208.389775][ T8056] kvm: pic: level sensitive irq not supported [ 208.406251][ T8056] kvm: pic: level sensitive irq not supported [ 208.425157][ T8056] kvm: pic: single mode not supported 04:20:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="86d9d645a85b6ae0891533ead4690000008000000008b00035000100007400000000000000bf421cff60b935bd0000000000008082557d5053"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x7, r2, 0x0, 0x0) 04:20:57 executing program 5: 04:20:57 executing program 2: 04:20:57 executing program 0: 04:20:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000540)="0f01c8b8010000000f01c1b9800000c00f3235010000000f30c4c1c572e7140f20e035000400000f22e0672ef3420f225c43dd3b66baf80cb8d940718cef66bafc0cb012eeb9311001c00f320f20c035100000000f22c0", 0x57}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:20:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x0, 0x4, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x4}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:57 executing program 5: 04:20:57 executing program 0: 04:20:57 executing program 2: 04:20:57 executing program 0: 04:20:57 executing program 5: 04:20:57 executing program 2: [ 211.045025][ T8066] kvm: pic: single mode not supported [ 211.047740][ T8066] kvm: pic: level sensitive irq not supported [ 211.116590][ T8066] kvm: pic: level sensitive irq not supported [ 211.135954][ T8066] kvm: pic: single mode not supported