[ 39.994853][ T26] audit: type=1800 audit(1554693918.916:26): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.022651][ T26] audit: type=1800 audit(1554693918.926:27): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 40.055413][ T26] audit: type=1800 audit(1554693918.926:28): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.762139][ T26] audit: type=1800 audit(1554693919.716:29): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. 2019/04/08 03:25:30 fuzzer started 2019/04/08 03:25:33 dialing manager at 10.128.0.26:34543 2019/04/08 03:25:33 syscalls: 2408 2019/04/08 03:25:33 code coverage: enabled 2019/04/08 03:25:33 comparison tracing: enabled 2019/04/08 03:25:33 extra coverage: extra coverage is not supported by the kernel 2019/04/08 03:25:33 setuid sandbox: enabled 2019/04/08 03:25:33 namespace sandbox: enabled 2019/04/08 03:25:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/08 03:25:33 fault injection: enabled 2019/04/08 03:25:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/08 03:25:33 net packet injection: enabled 2019/04/08 03:25:33 net device setup: enabled 03:27:46 executing program 0: syzkaller login: [ 187.846458][ T7836] IPVS: ftp: loaded support on port[0] = 21 03:27:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) close(r0) syz_genetlink_get_family_id$SEG6(0x0) [ 187.944697][ T7836] chnl_net:caif_netlink_parms(): no params data found [ 187.999688][ T7836] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.022346][ T7836] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.030717][ T7836] device bridge_slave_0 entered promiscuous mode [ 188.056809][ T7836] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.072152][ T7836] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.080226][ T7836] device bridge_slave_1 entered promiscuous mode [ 188.134477][ T7836] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.143110][ T7840] IPVS: ftp: loaded support on port[0] = 21 [ 188.153865][ T7836] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:27:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x10, &(0x7f0000000040)) [ 188.208077][ T7836] team0: Port device team_slave_0 added [ 188.219195][ T7836] team0: Port device team_slave_1 added [ 188.304788][ T7836] device hsr_slave_0 entered promiscuous mode [ 188.342354][ T7836] device hsr_slave_1 entered promiscuous mode [ 188.421979][ T7836] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.429381][ T7836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.437303][ T7836] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.444423][ T7836] bridge0: port 1(bridge_slave_0) entered forwarding state 03:27:47 executing program 3: listen(0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x40) sched_setaffinity(0x0, 0xffffffffffffff6b, &(0x7f0000000940)=0x5) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 188.466502][ T7842] IPVS: ftp: loaded support on port[0] = 21 [ 188.564200][ T7840] chnl_net:caif_netlink_parms(): no params data found [ 188.647793][ T7836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.691294][ T7845] IPVS: ftp: loaded support on port[0] = 21 [ 188.716992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:27:47 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x24b) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2b) fcntl$setstatus(r1, 0x4, 0x42803) [ 188.734877][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.756360][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.770149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 188.799474][ T7836] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.888570][ T7840] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.912563][ T7840] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.920567][ T7840] device bridge_slave_0 entered promiscuous mode [ 188.933615][ T7840] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.940694][ T7840] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.963907][ T7840] device bridge_slave_1 entered promiscuous mode 03:27:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) write$binfmt_elf64(r0, &(0x7f0000001380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000003e00000000000000000000000000400000000000000000000000000000000000000000003800"/465], 0x1d1) [ 188.995391][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.004011][ T3133] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.011078][ T3133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.022571][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.031061][ T3133] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.038214][ T3133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.057562][ T7849] IPVS: ftp: loaded support on port[0] = 21 [ 189.079576][ T7840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.109281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.122540][ T7840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.142371][ T7842] chnl_net:caif_netlink_parms(): no params data found [ 189.168005][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.177660][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.186611][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.195471][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.204760][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.213404][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.221573][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.243842][ T3133] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.278554][ T7840] team0: Port device team_slave_0 added [ 189.293548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.302476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.314080][ T7836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.325819][ T7840] team0: Port device team_slave_1 added [ 189.336128][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.343377][ T7842] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.351175][ T7842] device bridge_slave_0 entered promiscuous mode [ 189.390335][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.398612][ T7842] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.399213][ T7851] IPVS: ftp: loaded support on port[0] = 21 [ 189.412938][ T7842] device bridge_slave_1 entered promiscuous mode [ 189.439478][ T7842] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.449235][ T7842] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.503661][ T7840] device hsr_slave_0 entered promiscuous mode [ 189.552562][ T7840] device hsr_slave_1 entered promiscuous mode [ 189.656764][ T7849] chnl_net:caif_netlink_parms(): no params data found [ 189.674148][ T7842] team0: Port device team_slave_0 added [ 189.684455][ T7836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.716220][ T7842] team0: Port device team_slave_1 added [ 189.804194][ T7842] device hsr_slave_0 entered promiscuous mode [ 189.852636][ T7842] device hsr_slave_1 entered promiscuous mode 03:27:48 executing program 0: [ 189.948388][ T7845] chnl_net:caif_netlink_parms(): no params data found [ 190.007324][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.014462][ T7842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.021835][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.028933][ T7842] bridge0: port 1(bridge_slave_0) entered forwarding state 03:27:49 executing program 0: [ 190.061719][ T7849] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.074268][ T7849] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.087048][ T7849] device bridge_slave_0 entered promiscuous mode 03:27:49 executing program 0: [ 190.106670][ T7849] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.120142][ T7849] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.128741][ T7849] device bridge_slave_1 entered promiscuous mode [ 190.138166][ T3133] bridge0: port 1(bridge_slave_0) entered disabled state 03:27:49 executing program 0: 03:27:49 executing program 0: [ 190.155721][ T3133] bridge0: port 2(bridge_slave_1) entered disabled state 03:27:49 executing program 0: 03:27:49 executing program 0: [ 190.316824][ T7845] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.326998][ T7845] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.340588][ T7845] device bridge_slave_0 entered promiscuous mode [ 190.359237][ T7849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.379132][ T7845] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.387943][ T7845] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.396090][ T7845] device bridge_slave_1 entered promiscuous mode [ 190.418234][ T7851] chnl_net:caif_netlink_parms(): no params data found [ 190.430950][ T7845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.441405][ T7849] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.458611][ T7840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.468395][ T7845] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.506298][ T7849] team0: Port device team_slave_0 added [ 190.518154][ T7842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.545281][ T7840] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.554241][ T7849] team0: Port device team_slave_1 added [ 190.561618][ T7845] team0: Port device team_slave_0 added [ 190.581594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.590403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.610796][ T7842] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.619657][ T7845] team0: Port device team_slave_1 added [ 190.625871][ T7851] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.633348][ T7851] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.640883][ T7851] device bridge_slave_0 entered promiscuous mode [ 190.649195][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.658261][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.666845][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.673957][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.681696][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.690294][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.698871][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.705977][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.713491][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.721917][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.729704][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.737590][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.746266][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.775331][ T7851] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.783856][ T7851] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.791775][ T7851] device bridge_slave_1 entered promiscuous mode [ 190.864997][ T7845] device hsr_slave_0 entered promiscuous mode [ 190.942349][ T7845] device hsr_slave_1 entered promiscuous mode [ 191.034929][ T7849] device hsr_slave_0 entered promiscuous mode [ 191.072475][ T7849] device hsr_slave_1 entered promiscuous mode [ 191.132980][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.141538][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.150022][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.158751][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.167193][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.174258][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.181926][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.217138][ T7851] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.237039][ T7842] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.247881][ T7842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.259501][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.268405][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.277367][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.284574][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.292225][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.300617][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.309351][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.318020][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.326622][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.335243][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.343476][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.351846][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.360256][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.368429][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.377609][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.385883][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.395150][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.403006][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.412558][ T7851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.441314][ T7842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.456277][ T7840] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.468365][ T7840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.494378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.503261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.511426][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.519781][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.528267][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.539329][ T7851] team0: Port device team_slave_0 added [ 191.546569][ T7851] team0: Port device team_slave_1 added [ 191.634994][ T7851] device hsr_slave_0 entered promiscuous mode [ 191.692500][ T7851] device hsr_slave_1 entered promiscuous mode [ 191.816095][ T7840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.855968][ T7875] delete_channel: no stack [ 191.883875][ T7875] delete_channel: no stack [ 191.891554][ C0] hrtimer: interrupt took 42306 ns [ 191.934166][ T7845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.970662][ T7849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.008648][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.027875][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.038537][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.047883][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:27:51 executing program 1: 03:27:51 executing program 0: [ 192.067721][ T7845] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.078742][ T7849] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.091356][ T7851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.177625][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 192.185915][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.194965][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.203529][ T2875] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.210584][ T2875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.218315][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.226904][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.235478][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.243274][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.250742][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.259959][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.268878][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.277653][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.287454][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.295592][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.315065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.324230][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.334006][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.341074][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.349379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.357964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.366346][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.373432][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.381036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.389587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.397855][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.406392][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.415582][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.429458][ T7845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.441908][ T7845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.451774][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.464312][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.473128][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.481181][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.500351][ T7851] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.511775][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.520669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.529145][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.537044][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.544880][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.553590][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.561808][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.570375][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.579109][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.586202][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.602370][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.610171][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.618477][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.626881][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.635705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.644415][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.656200][ T7849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.667868][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.676640][ T2875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.685112][ T2875] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.692212][ T2875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.706472][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.727803][ T7845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.739959][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.764648][ T7849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.776269][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.786542][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.795569][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.804934][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.820533][ T7851] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 192.831727][ T7851] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.863621][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.871503][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.890352][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.900813][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.915738][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.927720][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:27:51 executing program 3: [ 192.987923][ T7851] 8021q: adding VLAN 0 to HW filter on device batadv0 03:27:52 executing program 4: 03:27:52 executing program 2: 03:27:52 executing program 0: 03:27:52 executing program 1: 03:27:52 executing program 3: 03:27:52 executing program 5: 03:27:52 executing program 5: 03:27:52 executing program 0: 03:27:52 executing program 1: 03:27:52 executing program 3: 03:27:52 executing program 2: 03:27:52 executing program 4: 03:27:52 executing program 2: 03:27:52 executing program 1: 03:27:52 executing program 5: 03:27:52 executing program 4: 03:27:52 executing program 0: 03:27:52 executing program 3: 03:27:52 executing program 1: 03:27:52 executing program 5: 03:27:52 executing program 2: 03:27:52 executing program 0: 03:27:52 executing program 4: 03:27:52 executing program 1: 03:27:52 executing program 5: 03:27:52 executing program 3: 03:27:52 executing program 4: 03:27:52 executing program 0: 03:27:52 executing program 2: 03:27:53 executing program 3: 03:27:53 executing program 5: 03:27:53 executing program 1: 03:27:53 executing program 0: 03:27:53 executing program 2: 03:27:53 executing program 4: 03:27:53 executing program 5: 03:27:53 executing program 3: 03:27:53 executing program 0: 03:27:53 executing program 2: 03:27:53 executing program 1: 03:27:53 executing program 4: 03:27:53 executing program 5: 03:27:53 executing program 3: 03:27:53 executing program 2: 03:27:53 executing program 0: 03:27:53 executing program 4: 03:27:53 executing program 1: 03:27:53 executing program 2: 03:27:53 executing program 5: 03:27:53 executing program 3: 03:27:53 executing program 0: 03:27:53 executing program 4: 03:27:53 executing program 5: 03:27:53 executing program 1: 03:27:53 executing program 3: 03:27:53 executing program 4: 03:27:53 executing program 3: 03:27:53 executing program 0: 03:27:53 executing program 5: 03:27:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7fffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mmap(&(0x7f0000050000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x402800000000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xf2, "4944fd89ad0424f8e61da5aee340cd2fa95b3cbc06fc2e32bac95daac2b00e40933d015b89c274a77501ec72e71d00f2fabc0a8c1f31f1e1df0d6815f8895d985c15ac05be03d159b8f2bb1ded0bc05bd6baf987f6d3b46ff83ffe0ac74b6bb42baf235a882c5eeb27ad918f322e57d9bf490db89db85521385b2dfaa21968eb00af668f5f299004db5e375b55c9f02c712cb39623e4204744cc58ebbaa4ec8a167b2f725f53488d623e424732efe39b8433908ef783b18ecd405c49af014f70373698c79ac6c49d38c620acb3c309df759b4c5f390189ac4e690aeb85e8f051c119a4c7a87841f89f7c13a46cda3a34879c"}, &(0x7f0000000100)=0xfa) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x2, 0x30}, &(0x7f0000000180)=0xc) 03:27:53 executing program 1: 03:27:53 executing program 0: 03:27:53 executing program 4: 03:27:53 executing program 3: 03:27:54 executing program 3: 03:27:54 executing program 0: 03:27:54 executing program 0: 03:27:54 executing program 5: 03:27:54 executing program 4: 03:27:54 executing program 1: 03:27:54 executing program 3: 03:27:54 executing program 2: 03:27:54 executing program 3: 03:27:54 executing program 5: 03:27:54 executing program 2: 03:27:54 executing program 0: 03:27:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000001c0)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000140)="030300000300600000000100fff55b4202938207295f2c27398d5375ffff000001040000000000000000f5a581ee876ad7bf9857f2f8a7ec83bbcfe606f6925cbf34658ea111797b1a8fc84a7f000000f851282c40cee9ae9134d50eb47b4200000010000000faffffff0202", 0x6c, 0x0, 0x0, 0x0) 03:27:54 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000300)={0x2, 0x0, &(0x7f00000002c0)}) 03:27:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0xfffffffffffffe52, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1b0, 0x0) 03:27:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000003300190100000000cf00000002000000ffd38d9b0c0001000800100004040a00b60b7ab6f049be4cc4b2d09331a5323895a66e63b04c1c05644740827319048eea4b86736cec1523f00f6ba89a0de3d9e47e6b2f31802a620a8da615846a14d8bcdd0b4f037465183c0123a43b632d8e96c7fc2a722395cf"], 0x1}}, 0x0) 03:27:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_int(r0, 0x6, 0x40000000000013, 0x0, &(0x7f0000000080)=0x340) 03:27:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 03:27:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0xfffffffffffffee9) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) accept4(r1, 0x0, &(0x7f0000000000), 0x80800) socket(0x0, 0x0, 0x0) dup(0xffffffffffffffff) accept$inet(0xffffffffffffffff, 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 03:27:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 03:27:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) 03:27:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) 03:27:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_int(r0, 0x6, 0x40000000000012, 0x0, &(0x7f0000000080)=0x340) [ 195.687306][ T8099] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:27:54 executing program 2: r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) lsetxattr$security_capability(0x0, 0x0, &(0x7f00000001c0), 0xc, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="030000000400d39b6642845b86f6bad903"], 0x11) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/uts\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x80, 0x0, 0x8001, 0x1, 0x6080000000000000, r0}) 03:27:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/175, 0x230}}], 0x1, 0x0, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000001bc) 03:27:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xa08200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(r2, &(0x7f00000001c0), 0xffffffea) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:27:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000280)=""/146, 0x92}], 0x1) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) dup3(r1, r2, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x4000000014) 03:27:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 03:27:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) close(r0) 03:27:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xdb, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0x101, 0x4) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 03:27:55 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18}, 0x18) 03:27:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000fdecf153da8c3c13d69c04c27eaa0e1de4b8e733c6f094d0812aa712feb07b5cb3a01fce40c62a9c82d9033a650bdc003891d0f29cfcdb7e0bccfe3ecb0200000055d47c596789cf926e8520b155f51a599f01dbc286d0f933e60f6a8cbdfffb6f0593d52df1b3e2"], 0x0) 03:27:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x24b) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2b) fcntl$setstatus(r1, 0x4, 0x42803) 03:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x4) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 03:27:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/195, 0xc3}], 0x1, 0x400000000000) 03:27:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:27:55 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x240001, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 196.966507][ T8184] check_preemption_disabled: 1 callbacks suppressed [ 196.966541][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 196.973638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 196.973759][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 196.995214][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 197.000254][ T8184] CPU: 0 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 197.009272][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.019329][ T8184] Call Trace: [ 197.022625][ T8184] dump_stack+0x172/0x1f0 [ 197.026966][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 197.032534][ T8184] sk_mc_loop+0x1d/0x210 [ 197.036785][ T8184] ip_mc_output+0x2ef/0xf70 [ 197.041380][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 197.046493][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 197.051391][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 197.056849][ T8184] ? dst_release+0x62/0xb0 [ 197.061271][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 197.066128][ T8184] ip_local_out+0xc4/0x1b0 [ 197.070558][ T8184] ip_send_skb+0x42/0xf0 [ 197.074809][ T8184] ip_push_pending_frames+0x64/0x80 [ 197.080021][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 197.084614][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 197.089569][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.095041][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 197.099997][ T8184] ? ___might_sleep+0x163/0x280 [ 197.104856][ T8184] ? __might_sleep+0x95/0x190 [ 197.109572][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 03:27:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x0, 0x0, 0x3, 0x3}, 0x20) 03:27:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x200000, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}) 03:27:56 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) 03:27:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000540)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r2, 0x0, r4, 0x0, 0x810005, 0x0) tkill(r0, 0x1000000000014) [ 197.115215][ T8184] ? aa_sk_perm+0x288/0x880 [ 197.119750][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.125047][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 197.130609][ T8184] inet_sendmsg+0x147/0x5e0 [ 197.135114][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.140571][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 197.145253][ T8184] ? ipip_gro_receive+0x100/0x100 [ 197.150285][ T8184] sock_sendmsg+0xdd/0x130 [ 197.154696][ T8184] kernel_sendmsg+0x44/0x50 [ 197.159187][ T8184] sock_no_sendpage+0x116/0x150 [ 197.164026][ T8184] ? sock_kfree_s+0x70/0x70 [ 197.168573][ T8184] inet_sendpage+0x44a/0x630 [ 197.173151][ T8184] kernel_sendpage+0x95/0xf0 [ 197.177721][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 197.182383][ T8184] sock_sendpage+0x8b/0xc0 [ 197.186780][ T8184] ? pipe_lock+0x6e/0x80 [ 197.191008][ T8184] pipe_to_sendpage+0x299/0x370 [ 197.195847][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 197.200597][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.205882][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.212123][ T8184] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 197.218174][ T8184] __splice_from_pipe+0x395/0x7d0 [ 197.223181][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.228453][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.233735][ T8184] splice_from_pipe+0x108/0x170 [ 197.238577][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 197.243505][ T8184] ? apparmor_file_permission+0x25/0x30 [ 197.249037][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.255274][ T8184] ? security_file_permission+0x94/0x380 [ 197.261067][ T8184] generic_splice_sendpage+0x3c/0x50 [ 197.266419][ T8184] ? splice_from_pipe+0x170/0x170 [ 197.271424][ T8184] do_splice+0x70a/0x13c0 [ 197.275738][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 197.280837][ T8184] ? __fget_light+0x1a9/0x230 [ 197.285500][ T8184] __x64_sys_splice+0x2c6/0x330 [ 197.290341][ T8184] do_syscall_64+0x103/0x610 [ 197.294914][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.300794][ T8184] RIP: 0033:0x4582b9 [ 197.304684][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.324277][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 197.332680][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.340662][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 197.348618][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 197.356579][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 197.364538][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 197.382819][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.387695][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 197.388717][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.398038][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 197.408794][ T8184] CPU: 0 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 197.417885][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.427931][ T8184] Call Trace: [ 197.427955][ T8184] dump_stack+0x172/0x1f0 [ 197.427981][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 197.435663][ T8184] sk_mc_loop+0x1d/0x210 [ 197.435680][ T8184] ip_mc_output+0x2ef/0xf70 [ 197.435699][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 197.435722][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 197.459921][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 197.465389][ T8184] ? dst_release+0x62/0xb0 [ 197.465407][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 197.465430][ T8184] ip_local_out+0xc4/0x1b0 [ 197.465447][ T8184] ip_send_skb+0x42/0xf0 [ 197.465460][ T8184] ip_push_pending_frames+0x64/0x80 [ 197.465474][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 197.493219][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 197.498174][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.503680][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 197.503714][ T8184] ? ___might_sleep+0x163/0x280 [ 197.503732][ T8184] ? __might_sleep+0x95/0x190 [ 197.503750][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 197.503765][ T8184] ? aa_sk_perm+0x288/0x880 [ 197.503778][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.503805][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 197.523886][ T8184] inet_sendmsg+0x147/0x5e0 [ 197.523903][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.523915][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 197.523930][ T8184] ? ipip_gro_receive+0x100/0x100 [ 197.523949][ T8184] sock_sendmsg+0xdd/0x130 [ 197.523967][ T8184] kernel_sendmsg+0x44/0x50 [ 197.523987][ T8184] sock_no_sendpage+0x116/0x150 [ 197.533772][ T8184] ? sock_kfree_s+0x70/0x70 [ 197.533810][ T8184] inet_sendpage+0x44a/0x630 [ 197.533832][ T8184] kernel_sendpage+0x95/0xf0 [ 197.533843][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 197.533862][ T8184] sock_sendpage+0x8b/0xc0 [ 197.533877][ T8184] ? pipe_lock+0x6e/0x80 [ 197.533899][ T8184] pipe_to_sendpage+0x299/0x370 [ 197.549371][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 197.563457][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.563478][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:27:56 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth1_to_bond\x00'}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') sendfile(r0, r1, 0x0, 0x88001) [ 197.563496][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 197.563523][ T8184] __splice_from_pipe+0x395/0x7d0 [ 197.563541][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.563563][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.563577][ T8184] splice_from_pipe+0x108/0x170 [ 197.563600][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 197.573132][ T8184] ? apparmor_file_permission+0x25/0x30 [ 197.573150][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.573169][ T8184] ? security_file_permission+0x94/0x380 [ 197.573190][ T8184] generic_splice_sendpage+0x3c/0x50 [ 197.573206][ T8184] ? splice_from_pipe+0x170/0x170 [ 197.573221][ T8184] do_splice+0x70a/0x13c0 [ 197.573246][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 197.573263][ T8184] ? __fget_light+0x1a9/0x230 [ 197.573284][ T8184] __x64_sys_splice+0x2c6/0x330 [ 197.582371][ T8184] do_syscall_64+0x103/0x610 [ 197.582394][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.582406][ T8184] RIP: 0033:0x4582b9 [ 197.582422][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.582430][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 197.582446][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.582454][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 197.582463][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 197.582471][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 03:27:56 executing program 4: [ 197.582479][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 197.596404][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.596453][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 197.663105][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 197.675967][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 197.685384][ T8184] CPU: 0 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 03:27:56 executing program 4: [ 197.685400][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.701532][ T8184] Call Trace: [ 197.701557][ T8184] dump_stack+0x172/0x1f0 [ 197.701582][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 197.701599][ T8184] sk_mc_loop+0x1d/0x210 [ 197.701621][ T8184] ip_mc_output+0x2ef/0xf70 [ 197.715985][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 197.716001][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 197.716025][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 197.716039][ T8184] ? dst_release+0x62/0xb0 [ 197.716057][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 197.716082][ T8184] ip_local_out+0xc4/0x1b0 [ 197.789641][ T8184] ip_send_skb+0x42/0xf0 [ 197.804620][ T8184] ip_push_pending_frames+0x64/0x80 [ 197.804639][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 197.804656][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 197.804679][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.804704][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 197.804733][ T8184] ? ___might_sleep+0x163/0x280 [ 197.842560][ T8184] ? __might_sleep+0x95/0x190 [ 197.842581][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 03:27:56 executing program 2: [ 197.842596][ T8184] ? aa_sk_perm+0x288/0x880 [ 197.842620][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 197.842639][ T8184] inet_sendmsg+0x147/0x5e0 [ 197.842653][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 197.842665][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 197.842685][ T8184] ? ipip_gro_receive+0x100/0x100 [ 197.856534][ T8184] sock_sendmsg+0xdd/0x130 [ 197.856556][ T8184] kernel_sendmsg+0x44/0x50 [ 197.856575][ T8184] sock_no_sendpage+0x116/0x150 [ 197.856591][ T8184] ? sock_kfree_s+0x70/0x70 [ 197.856612][ T8184] ? debug_check_no_obj_freed+0x211/0x444 [ 197.856637][ T8184] ? mark_held_locks+0xa4/0xf0 [ 197.866929][ T8184] inet_sendpage+0x44a/0x630 [ 197.866953][ T8184] kernel_sendpage+0x95/0xf0 [ 197.866965][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 197.866984][ T8184] sock_sendpage+0x8b/0xc0 [ 197.867005][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.876258][ T8184] pipe_to_sendpage+0x299/0x370 [ 197.876275][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 197.876291][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.876309][ T8184] ? __put_page+0x92/0xd0 [ 197.876327][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 197.876345][ T8184] __splice_from_pipe+0x395/0x7d0 [ 197.876365][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.890201][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 197.890217][ T8184] splice_from_pipe+0x108/0x170 [ 197.890237][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 197.890261][ T8184] ? apparmor_file_permission+0x25/0x30 [ 197.890278][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.890301][ T8184] ? security_file_permission+0x94/0x380 [ 197.905260][ T8184] generic_splice_sendpage+0x3c/0x50 [ 197.905276][ T8184] ? splice_from_pipe+0x170/0x170 [ 197.905292][ T8184] do_splice+0x70a/0x13c0 [ 197.905319][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 197.905339][ T8184] ? __fget_light+0x1a9/0x230 [ 197.905359][ T8184] __x64_sys_splice+0x2c6/0x330 [ 197.905389][ T8184] do_syscall_64+0x103/0x610 [ 197.955154][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.964052][ T8184] RIP: 0033:0x4582b9 [ 197.964068][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.964076][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 197.964091][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 197.964100][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 197.964109][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 197.964117][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 197.964126][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 198.012087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 198.033035][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 198.034834][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 198.039825][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 198.045206][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 198.045247][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 198.050507][ T8184] CPU: 1 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 198.050516][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.050521][ T8184] Call Trace: [ 198.050541][ T8184] dump_stack+0x172/0x1f0 [ 198.050564][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 198.258245][ T8184] sk_mc_loop+0x1d/0x210 [ 198.262495][ T8184] ip_mc_output+0x2ef/0xf70 [ 198.267001][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 198.272112][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 198.276963][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 198.282416][ T8184] ? dst_release+0x62/0xb0 [ 198.286828][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 198.291679][ T8184] ip_local_out+0xc4/0x1b0 [ 198.296096][ T8184] ip_send_skb+0x42/0xf0 [ 198.300339][ T8184] ip_push_pending_frames+0x64/0x80 [ 198.305532][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 198.310122][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 198.315067][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 198.320527][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 198.325480][ T8184] ? ___might_sleep+0x163/0x280 [ 198.330326][ T8184] ? __might_sleep+0x95/0x190 [ 198.335005][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 198.340638][ T8184] ? aa_sk_perm+0x288/0x880 [ 198.345146][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 198.350691][ T8184] inet_sendmsg+0x147/0x5e0 [ 198.355201][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 198.360656][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 198.365333][ T8184] ? ipip_gro_receive+0x100/0x100 [ 198.370366][ T8184] sock_sendmsg+0xdd/0x130 [ 198.374785][ T8184] kernel_sendmsg+0x44/0x50 [ 198.379286][ T8184] sock_no_sendpage+0x116/0x150 [ 198.384131][ T8184] ? sock_kfree_s+0x70/0x70 [ 198.388636][ T8184] ? debug_check_no_obj_freed+0x211/0x444 [ 198.394361][ T8184] ? mark_held_locks+0xa4/0xf0 [ 198.399125][ T8184] inet_sendpage+0x44a/0x630 [ 198.403722][ T8184] kernel_sendpage+0x95/0xf0 [ 198.408316][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 198.412995][ T8184] sock_sendpage+0x8b/0xc0 [ 198.417411][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 198.422693][ T8184] pipe_to_sendpage+0x299/0x370 [ 198.427547][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 198.432307][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 198.437588][ T8184] ? __put_page+0x92/0xd0 [ 198.441925][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 198.447386][ T8184] __splice_from_pipe+0x395/0x7d0 [ 198.452412][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 198.457698][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 198.462977][ T8184] splice_from_pipe+0x108/0x170 [ 198.467828][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 198.472770][ T8184] ? apparmor_file_permission+0x25/0x30 [ 198.478317][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.484555][ T8184] ? security_file_permission+0x94/0x380 [ 198.490196][ T8184] generic_splice_sendpage+0x3c/0x50 [ 198.495477][ T8184] ? splice_from_pipe+0x170/0x170 [ 198.500499][ T8184] do_splice+0x70a/0x13c0 [ 198.504837][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 198.509949][ T8184] ? __fget_light+0x1a9/0x230 [ 198.514628][ T8184] __x64_sys_splice+0x2c6/0x330 [ 198.519555][ T8184] do_syscall_64+0x103/0x610 [ 198.524205][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.530178][ T8184] RIP: 0033:0x4582b9 [ 198.534078][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.553675][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 198.562078][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 198.570049][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 198.578022][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 198.585990][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 198.593962][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 198.615619][ T8215] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8215 [ 198.625164][ T8215] caller is ip6_finish_output+0x335/0xdc0 [ 198.630906][ T8215] CPU: 1 PID: 8215 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 198.630931][ T8215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.630937][ T8215] Call Trace: [ 198.630960][ T8215] dump_stack+0x172/0x1f0 [ 198.630987][ T8215] __this_cpu_preempt_check+0x246/0x270 [ 198.653624][ T8215] ip6_finish_output+0x335/0xdc0 [ 198.653648][ T8215] ip6_output+0x235/0x7f0 [ 198.653669][ T8215] ? ip6_finish_output+0xdc0/0xdc0 [ 198.653689][ T8215] ? ip6_fragment+0x3980/0x3980 [ 198.653707][ T8215] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 198.653727][ T8215] ip6_local_out+0xc4/0x1b0 [ 198.653747][ T8215] ip6_send_skb+0xbb/0x350 [ 198.653772][ T8215] ip6_push_pending_frames+0xc8/0xf0 [ 198.702513][ T8215] rawv6_sendmsg+0x299c/0x35e0 [ 198.702980][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 198.707292][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 198.707310][ T8215] ? aa_profile_af_perm+0x320/0x320 [ 198.707353][ T8215] ? ___might_sleep+0x163/0x280 [ 198.716693][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 198.721638][ T8215] ? __might_sleep+0x95/0x190 [ 198.741332][ T8215] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 198.746879][ T8215] inet_sendmsg+0x147/0x5e0 [ 198.751388][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 198.756420][ T8215] ? inet_sendmsg+0x147/0x5e0 [ 198.761093][ T8215] ? ipip_gro_receive+0x100/0x100 [ 198.766122][ T8215] sock_sendmsg+0xdd/0x130 [ 198.770544][ T8215] kernel_sendmsg+0x44/0x50 [ 198.775053][ T8215] sock_no_sendpage+0x116/0x150 [ 198.779906][ T8215] ? sock_kfree_s+0x70/0x70 [ 198.784408][ T8215] ? mark_held_locks+0xf0/0xf0 [ 198.789180][ T8215] ? lock_acquire+0x16f/0x3f0 [ 198.793854][ T8215] ? pipe_lock+0x6e/0x80 [ 198.798100][ T8215] kernel_sendpage+0x95/0xf0 [ 198.802694][ T8215] ? sock_kfree_s+0x70/0x70 [ 198.807207][ T8215] sock_sendpage+0x8b/0xc0 [ 198.811621][ T8215] ? pipe_lock+0x6e/0x80 [ 198.815868][ T8215] pipe_to_sendpage+0x299/0x370 [ 198.820717][ T8215] ? kernel_sendpage+0xf0/0xf0 [ 198.825487][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 198.830775][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.837021][ T8215] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 198.843100][ T8215] __splice_from_pipe+0x395/0x7d0 [ 198.848127][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 198.853424][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 198.858711][ T8215] splice_from_pipe+0x108/0x170 [ 198.863564][ T8215] ? splice_shrink_spd+0xd0/0xd0 [ 198.868510][ T8215] ? apparmor_file_permission+0x25/0x30 [ 198.874055][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.880299][ T8215] ? security_file_permission+0x94/0x380 [ 198.885939][ T8215] generic_splice_sendpage+0x3c/0x50 [ 198.891225][ T8215] ? splice_from_pipe+0x170/0x170 [ 198.896248][ T8215] do_splice+0x70a/0x13c0 [ 198.900591][ T8215] ? opipe_prep.part.0+0x2d0/0x2d0 [ 198.905708][ T8215] ? __fget_light+0x1a9/0x230 [ 198.910390][ T8215] __x64_sys_splice+0x2c6/0x330 [ 198.915252][ T8215] do_syscall_64+0x103/0x610 [ 198.919846][ T8215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.925736][ T8215] RIP: 0033:0x4582b9 [ 198.929633][ T8215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.949234][ T8215] RSP: 002b:00007f475baf7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 198.957644][ T8215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 198.965609][ T8215] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 198.973577][ T8215] RBP: 000000000073c040 R08: 0000000000810005 R09: 0000000000000000 [ 198.981541][ T8215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f475baf86d4 [ 198.989506][ T8215] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 198.997500][ T8184] CPU: 0 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 199.006542][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.016594][ T8184] Call Trace: [ 199.019889][ T8184] dump_stack+0x172/0x1f0 [ 199.024232][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 199.029794][ T8184] sk_mc_loop+0x1d/0x210 [ 199.034049][ T8184] ip_mc_output+0x2ef/0xf70 [ 199.038565][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 199.043687][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 199.048552][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 199.053952][ T8215] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8215 [ 199.054040][ T8184] ? dst_release+0x62/0xb0 [ 199.063369][ T8215] caller is ip6_fragment+0x100/0x3980 [ 199.067722][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 199.077938][ T8184] ip_local_out+0xc4/0x1b0 [ 199.082386][ T8184] ip_send_skb+0x42/0xf0 [ 199.086626][ T8184] ip_push_pending_frames+0x64/0x80 [ 199.091825][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 199.096418][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 199.101362][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 199.106829][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 199.111780][ T8184] ? ___might_sleep+0x163/0x280 [ 199.116642][ T8184] ? __might_sleep+0x95/0x190 [ 199.121322][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 199.126953][ T8184] ? aa_sk_perm+0x288/0x880 [ 199.131478][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 199.137026][ T8184] inet_sendmsg+0x147/0x5e0 [ 199.141538][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 199.146991][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 199.151666][ T8184] ? ipip_gro_receive+0x100/0x100 [ 199.156697][ T8184] sock_sendmsg+0xdd/0x130 [ 199.161119][ T8184] kernel_sendmsg+0x44/0x50 [ 199.165624][ T8184] sock_no_sendpage+0x116/0x150 [ 199.170476][ T8184] ? sock_kfree_s+0x70/0x70 [ 199.174989][ T8184] ? debug_check_no_obj_freed+0x211/0x444 [ 199.180714][ T8184] ? mark_held_locks+0xa4/0xf0 [ 199.185481][ T8184] inet_sendpage+0x44a/0x630 [ 199.190082][ T8184] kernel_sendpage+0x95/0xf0 [ 199.194670][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 199.199347][ T8184] sock_sendpage+0x8b/0xc0 [ 199.203763][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 199.209049][ T8184] pipe_to_sendpage+0x299/0x370 [ 199.213900][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 199.218663][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 199.223945][ T8184] ? __put_page+0x92/0xd0 [ 199.228277][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 199.233738][ T8184] __splice_from_pipe+0x395/0x7d0 [ 199.238759][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 199.244051][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 199.249336][ T8184] splice_from_pipe+0x108/0x170 [ 199.254185][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 199.259144][ T8184] ? apparmor_file_permission+0x25/0x30 [ 199.264688][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.270948][ T8184] ? security_file_permission+0x94/0x380 [ 199.276583][ T8184] generic_splice_sendpage+0x3c/0x50 [ 199.281863][ T8184] ? splice_from_pipe+0x170/0x170 [ 199.286887][ T8184] do_splice+0x70a/0x13c0 [ 199.291227][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 199.296338][ T8184] ? __fget_light+0x1a9/0x230 [ 199.301016][ T8184] __x64_sys_splice+0x2c6/0x330 [ 199.305879][ T8184] do_syscall_64+0x103/0x610 [ 199.310474][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.316359][ T8184] RIP: 0033:0x4582b9 [ 199.320252][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.339853][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 199.348262][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 199.356233][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 199.364201][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 199.372344][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 199.380309][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 199.388305][ T8215] CPU: 1 PID: 8215 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 199.397346][ T8215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.407396][ T8215] Call Trace: [ 199.407419][ T8215] dump_stack+0x172/0x1f0 [ 199.407450][ T8215] __this_cpu_preempt_check+0x246/0x270 [ 199.415061][ T8215] ip6_fragment+0x100/0x3980 [ 199.425174][ T8215] ? ip6_mtu+0x2e6/0x460 [ 199.429436][ T8215] ? find_held_lock+0x35/0x130 [ 199.434211][ T8215] ? ip6_forward_finish+0x580/0x580 [ 199.439425][ T8215] ? ip6_forward+0x3880/0x3880 [ 199.444202][ T8215] ip6_finish_output+0x8a3/0xdc0 [ 199.449142][ T8215] ip6_output+0x235/0x7f0 [ 199.453488][ T8215] ? ip6_finish_output+0xdc0/0xdc0 [ 199.458625][ T8215] ? ip6_fragment+0x3980/0x3980 [ 199.463500][ T8215] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 199.469053][ T8215] ip6_local_out+0xc4/0x1b0 [ 199.473557][ T8215] ip6_send_skb+0xbb/0x350 [ 199.477980][ T8215] ip6_push_pending_frames+0xc8/0xf0 [ 199.483261][ T8215] rawv6_sendmsg+0x299c/0x35e0 [ 199.488036][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 199.493078][ T8215] ? aa_profile_af_perm+0x320/0x320 [ 199.498303][ T8215] ? ___might_sleep+0x163/0x280 [ 199.503151][ T8215] ? __might_sleep+0x95/0x190 [ 199.507837][ T8215] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 199.513399][ T8215] inet_sendmsg+0x147/0x5e0 [ 199.517899][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 199.522918][ T8215] ? inet_sendmsg+0x147/0x5e0 [ 199.527589][ T8215] ? ipip_gro_receive+0x100/0x100 [ 199.532614][ T8215] sock_sendmsg+0xdd/0x130 [ 199.537036][ T8215] kernel_sendmsg+0x44/0x50 [ 199.541542][ T8215] sock_no_sendpage+0x116/0x150 [ 199.546391][ T8215] ? sock_kfree_s+0x70/0x70 [ 199.550891][ T8215] ? mark_held_locks+0xf0/0xf0 [ 199.555662][ T8215] ? lock_acquire+0x16f/0x3f0 [ 199.560333][ T8215] ? pipe_lock+0x6e/0x80 [ 199.564579][ T8215] kernel_sendpage+0x95/0xf0 [ 199.569160][ T8215] ? sock_kfree_s+0x70/0x70 [ 199.573664][ T8215] sock_sendpage+0x8b/0xc0 [ 199.578076][ T8215] ? pipe_lock+0x6e/0x80 [ 199.582321][ T8215] pipe_to_sendpage+0x299/0x370 [ 199.587254][ T8215] ? kernel_sendpage+0xf0/0xf0 [ 199.592024][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 199.597307][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.603543][ T8215] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 199.609609][ T8215] __splice_from_pipe+0x395/0x7d0 [ 199.614630][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 199.619917][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 199.625197][ T8215] splice_from_pipe+0x108/0x170 [ 199.630052][ T8215] ? splice_shrink_spd+0xd0/0xd0 [ 199.634993][ T8215] ? apparmor_file_permission+0x25/0x30 [ 199.640538][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.646778][ T8215] ? security_file_permission+0x94/0x380 [ 199.652413][ T8215] generic_splice_sendpage+0x3c/0x50 [ 199.657694][ T8215] ? splice_from_pipe+0x170/0x170 [ 199.662714][ T8215] do_splice+0x70a/0x13c0 [ 199.667058][ T8215] ? opipe_prep.part.0+0x2d0/0x2d0 [ 199.672170][ T8215] ? __fget_light+0x1a9/0x230 [ 199.676876][ T8215] __x64_sys_splice+0x2c6/0x330 [ 199.681734][ T8215] do_syscall_64+0x103/0x610 [ 199.686334][ T8215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.692230][ T8215] RIP: 0033:0x4582b9 [ 199.696130][ T8215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.716423][ T8215] RSP: 002b:00007f475baf7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 199.724880][ T8215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 199.734923][ T8215] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 199.742892][ T8215] RBP: 000000000073c040 R08: 0000000000810005 R09: 0000000000000000 [ 199.750861][ T8215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f475baf86d4 [ 199.758828][ T8215] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 199.767779][ T8215] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8215 [ 199.777135][ T8215] caller is ip6_fragment+0x244/0x3980 [ 199.782552][ T8215] CPU: 1 PID: 8215 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 199.791569][ T8215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.801622][ T8215] Call Trace: [ 199.804919][ T8215] dump_stack+0x172/0x1f0 [ 199.809872][ T8215] __this_cpu_preempt_check+0x246/0x270 [ 199.815424][ T8215] ip6_fragment+0x244/0x3980 [ 199.820012][ T8215] ? ip6_mtu+0x2e6/0x460 [ 199.824262][ T8215] ? find_held_lock+0x35/0x130 [ 199.829031][ T8215] ? ip6_forward_finish+0x580/0x580 [ 199.834237][ T8215] ? ip6_forward+0x3880/0x3880 [ 199.839010][ T8215] ip6_finish_output+0x8a3/0xdc0 [ 199.844132][ T8215] ip6_output+0x235/0x7f0 [ 199.848466][ T8215] ? ip6_finish_output+0xdc0/0xdc0 [ 199.853583][ T8215] ? ip6_fragment+0x3980/0x3980 [ 199.858434][ T8215] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 199.863989][ T8215] ip6_local_out+0xc4/0x1b0 [ 199.868495][ T8215] ip6_send_skb+0xbb/0x350 [ 199.872914][ T8215] ip6_push_pending_frames+0xc8/0xf0 [ 199.878206][ T8215] rawv6_sendmsg+0x299c/0x35e0 [ 199.882979][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 199.888005][ T8215] ? aa_profile_af_perm+0x320/0x320 [ 199.893234][ T8215] ? ___might_sleep+0x163/0x280 [ 199.898081][ T8215] ? __might_sleep+0x95/0x190 [ 199.902768][ T8215] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 199.908336][ T8215] inet_sendmsg+0x147/0x5e0 [ 199.912838][ T8215] ? rawv6_getsockopt+0x150/0x150 [ 199.917860][ T8215] ? inet_sendmsg+0x147/0x5e0 [ 199.922532][ T8215] ? ipip_gro_receive+0x100/0x100 [ 199.927557][ T8215] sock_sendmsg+0xdd/0x130 [ 199.931975][ T8215] kernel_sendmsg+0x44/0x50 [ 199.936483][ T8215] sock_no_sendpage+0x116/0x150 [ 199.941328][ T8215] ? sock_kfree_s+0x70/0x70 [ 199.945826][ T8215] ? mark_held_locks+0xf0/0xf0 [ 199.950601][ T8215] ? lock_acquire+0x16f/0x3f0 [ 199.955277][ T8215] ? pipe_lock+0x6e/0x80 [ 199.959521][ T8215] kernel_sendpage+0x95/0xf0 [ 199.964110][ T8215] ? sock_kfree_s+0x70/0x70 [ 199.968614][ T8215] sock_sendpage+0x8b/0xc0 [ 199.973030][ T8215] ? pipe_lock+0x6e/0x80 [ 199.977272][ T8215] pipe_to_sendpage+0x299/0x370 [ 199.982123][ T8215] ? kernel_sendpage+0xf0/0xf0 [ 199.986884][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 199.992169][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.998413][ T8215] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 200.004496][ T8215] __splice_from_pipe+0x395/0x7d0 [ 200.009528][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 200.014819][ T8215] ? direct_splice_actor+0x1a0/0x1a0 [ 200.020100][ T8215] splice_from_pipe+0x108/0x170 [ 200.024949][ T8215] ? splice_shrink_spd+0xd0/0xd0 [ 200.029904][ T8215] ? apparmor_file_permission+0x25/0x30 [ 200.035454][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.041692][ T8215] ? security_file_permission+0x94/0x380 [ 200.047336][ T8215] generic_splice_sendpage+0x3c/0x50 [ 200.052617][ T8215] ? splice_from_pipe+0x170/0x170 [ 200.057643][ T8215] do_splice+0x70a/0x13c0 [ 200.061980][ T8215] ? opipe_prep.part.0+0x2d0/0x2d0 [ 200.067134][ T8215] ? __fget_light+0x1a9/0x230 [ 200.071812][ T8215] __x64_sys_splice+0x2c6/0x330 [ 200.076669][ T8215] do_syscall_64+0x103/0x610 [ 200.081263][ T8215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.087148][ T8215] RIP: 0033:0x4582b9 [ 200.091044][ T8215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.110642][ T8215] RSP: 002b:00007f475baf7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 200.119053][ T8215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 200.127025][ T8215] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 200.134994][ T8215] RBP: 000000000073c040 R08: 0000000000810005 R09: 0000000000000000 [ 200.142966][ T8215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f475baf86d4 [ 200.150930][ T8215] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 200.170474][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 200.179856][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 200.184977][ T8184] CPU: 1 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 200.194010][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.204076][ T8184] Call Trace: [ 200.207371][ T8184] dump_stack+0x172/0x1f0 [ 200.211797][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 200.217346][ T8184] sk_mc_loop+0x1d/0x210 [ 200.221590][ T8184] ip_mc_output+0x2ef/0xf70 [ 200.226099][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 200.231213][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 200.236064][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 200.241520][ T8184] ? dst_release+0x62/0xb0 [ 200.245936][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 200.250786][ T8184] ip_local_out+0xc4/0x1b0 [ 200.255213][ T8184] ip_send_skb+0x42/0xf0 [ 200.259469][ T8184] ip_push_pending_frames+0x64/0x80 [ 200.264672][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 200.269262][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 200.274216][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 200.279682][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 200.284777][ T8184] ? ___might_sleep+0x163/0x280 [ 200.289800][ T8184] ? __might_sleep+0x95/0x190 [ 200.294484][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 200.300111][ T8184] ? aa_sk_perm+0x288/0x880 [ 200.304622][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 200.310170][ T8184] inet_sendmsg+0x147/0x5e0 [ 200.314683][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 200.320156][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 200.324841][ T8184] ? ipip_gro_receive+0x100/0x100 [ 200.329886][ T8184] sock_sendmsg+0xdd/0x130 [ 200.334426][ T8184] kernel_sendmsg+0x44/0x50 [ 200.338928][ T8184] sock_no_sendpage+0x116/0x150 [ 200.343776][ T8184] ? sock_kfree_s+0x70/0x70 [ 200.348280][ T8184] ? debug_check_no_obj_freed+0x211/0x444 [ 200.354009][ T8184] ? mark_held_locks+0xa4/0xf0 [ 200.358780][ T8184] inet_sendpage+0x44a/0x630 [ 200.363372][ T8184] kernel_sendpage+0x95/0xf0 [ 200.367969][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 200.372670][ T8184] sock_sendpage+0x8b/0xc0 [ 200.377086][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 200.382371][ T8184] pipe_to_sendpage+0x299/0x370 [ 200.387227][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 200.392027][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.397319][ T8184] ? __put_page+0x92/0xd0 [ 200.401647][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 200.407107][ T8184] __splice_from_pipe+0x395/0x7d0 [ 200.412128][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.417418][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.422700][ T8184] splice_from_pipe+0x108/0x170 [ 200.427559][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 200.432521][ T8184] ? apparmor_file_permission+0x25/0x30 [ 200.438068][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.444311][ T8184] ? security_file_permission+0x94/0x380 [ 200.449948][ T8184] generic_splice_sendpage+0x3c/0x50 [ 200.455228][ T8184] ? splice_from_pipe+0x170/0x170 [ 200.460251][ T8184] do_splice+0x70a/0x13c0 [ 200.464592][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 200.469706][ T8184] ? __fget_light+0x1a9/0x230 [ 200.474386][ T8184] __x64_sys_splice+0x2c6/0x330 [ 200.479243][ T8184] do_syscall_64+0x103/0x610 [ 200.483835][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.489806][ T8184] RIP: 0033:0x4582b9 [ 200.493703][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.513300][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 200.521704][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 200.529674][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 200.537637][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 200.545616][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 200.553581][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 200.584360][ T8184] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8184 [ 200.593762][ T8184] caller is sk_mc_loop+0x1d/0x210 [ 200.598797][ T8184] CPU: 1 PID: 8184 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 200.607816][ T8184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.617868][ T8184] Call Trace: [ 200.621175][ T8184] dump_stack+0x172/0x1f0 [ 200.625527][ T8184] __this_cpu_preempt_check+0x246/0x270 [ 200.631082][ T8184] sk_mc_loop+0x1d/0x210 [ 200.635331][ T8184] ip_mc_output+0x2ef/0xf70 [ 200.639844][ T8184] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 200.645042][ T8184] ? __ip_make_skb+0xf15/0x1820 [ 200.649894][ T8184] ? ip_append_data.part.0+0x170/0x170 [ 200.655348][ T8184] ? dst_release+0x62/0xb0 [ 200.659762][ T8184] ? __ip_make_skb+0xf93/0x1820 [ 200.664625][ T8184] ip_local_out+0xc4/0x1b0 [ 200.669044][ T8184] ip_send_skb+0x42/0xf0 [ 200.673546][ T8184] ip_push_pending_frames+0x64/0x80 [ 200.678836][ T8184] raw_sendmsg+0x1e6d/0x2f20 [ 200.683424][ T8184] ? __lock_acquire+0x4d4/0x3fb0 [ 200.688369][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 200.693838][ T8184] ? __lock_acquire+0x548/0x3fb0 [ 200.698788][ T8184] ? ___might_sleep+0x163/0x280 [ 200.703640][ T8184] ? __might_sleep+0x95/0x190 [ 200.708323][ T8184] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 200.713955][ T8184] ? aa_sk_perm+0x288/0x880 [ 200.718484][ T8184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 200.724040][ T8184] inet_sendmsg+0x147/0x5e0 [ 200.728540][ T8184] ? compat_raw_getsockopt+0x100/0x100 [ 200.733990][ T8184] ? inet_sendmsg+0x147/0x5e0 [ 200.738665][ T8184] ? ipip_gro_receive+0x100/0x100 [ 200.743693][ T8184] sock_sendmsg+0xdd/0x130 [ 200.748109][ T8184] kernel_sendmsg+0x44/0x50 [ 200.752613][ T8184] sock_no_sendpage+0x116/0x150 [ 200.757460][ T8184] ? sock_kfree_s+0x70/0x70 [ 200.761962][ T8184] ? debug_check_no_obj_freed+0x211/0x444 [ 200.767695][ T8184] ? mark_held_locks+0xa4/0xf0 [ 200.772464][ T8184] inet_sendpage+0x44a/0x630 [ 200.777059][ T8184] kernel_sendpage+0x95/0xf0 [ 200.781645][ T8184] ? inet_sendmsg+0x5e0/0x5e0 [ 200.786324][ T8184] sock_sendpage+0x8b/0xc0 [ 200.790735][ T8184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 200.796029][ T8184] pipe_to_sendpage+0x299/0x370 [ 200.800879][ T8184] ? kernel_sendpage+0xf0/0xf0 [ 200.805650][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.811427][ T8184] ? __put_page+0x92/0xd0 [ 200.815764][ T8184] ? anon_pipe_buf_release+0x1c6/0x270 [ 200.821229][ T8184] __splice_from_pipe+0x395/0x7d0 [ 200.826252][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.831540][ T8184] ? direct_splice_actor+0x1a0/0x1a0 [ 200.836824][ T8184] splice_from_pipe+0x108/0x170 [ 200.841698][ T8184] ? splice_shrink_spd+0xd0/0xd0 [ 200.846639][ T8184] ? apparmor_file_permission+0x25/0x30 [ 200.852193][ T8184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.858438][ T8184] ? security_file_permission+0x94/0x380 [ 200.864071][ T8184] generic_splice_sendpage+0x3c/0x50 [ 200.869360][ T8184] ? splice_from_pipe+0x170/0x170 [ 200.874385][ T8184] do_splice+0x70a/0x13c0 [ 200.878725][ T8184] ? opipe_prep.part.0+0x2d0/0x2d0 [ 200.883840][ T8184] ? __fget_light+0x1a9/0x230 [ 200.888520][ T8184] __x64_sys_splice+0x2c6/0x330 [ 200.893381][ T8184] do_syscall_64+0x103/0x610 [ 200.897972][ T8184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.903874][ T8184] RIP: 0033:0x4582b9 [ 200.907768][ T8184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.927364][ T8184] RSP: 002b:00007f5a04860c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 200.935996][ T8184] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 200.944557][ T8184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 200.952520][ T8184] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 200.960489][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a048616d4 [ 200.968453][ T8184] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 03:27:59 executing program 3: clone(0x11ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) rt_sigtimedwait(&(0x7f0000000500), 0x0, 0x0, 0x8) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r0, 0x1000000000015) 03:27:59 executing program 4: 03:27:59 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x2}, 0x10) 03:27:59 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174010204010002000270fff8", 0x16}], 0x0, 0x0) 03:27:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000003300190100000000cf00000002000000ffd38d9b0c0001000800100004040a00b60b7ab6f049be4cc4b2d09331a5323895a66e63b04c1c05644740827319048eea4b86736cec1523f00f6ba89a0de3d9e47e6b2f31802a620a8da615846a14d8bcdd0b4f037465183c0123a43b632d8e96c7fc2a722395cf"], 0x1}}, 0x0) [ 201.007673][ T8215] syz-executor.1 (8215) used greatest stack depth: 22472 bytes left 03:28:00 executing program 4: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 03:28:00 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4008af04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 201.099140][ T8235] FAT-fs (loop2): bogus logical sector size 513 [ 201.160465][ T8235] FAT-fs (loop2): Can't find a valid FAT filesystem 03:28:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) read(r1, &(0x7f0000000500)=""/4096, 0xfd48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{0x80}, 'port0\x00', 0xfffffffffffffffe}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)={{0x0, 0x1}, {0x80}, 0x0, 0x7}) 03:28:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) write$sndseq(r0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20100, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x5, 0x8, 0x7c, 'queue1\x00', 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000200)={0x80, 0x7}) 03:28:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e0, 0x0) 03:28:00 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) 03:28:00 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x60, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 03:28:00 executing program 2: request_key(&(0x7f0000000400)='id_legacy\x00', &(0x7f0000000440)={'syz'}, 0x0, 0xfffffffffffffffd) 03:28:00 executing program 0: r0 = epoll_create1(0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x0, 0x0) readahead(r0, 0x5, 0x3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) fchdir(r0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000001c0)={0x1e800000, 0x9, 0x2, 0x0, 0xfffffffffffffffc}) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYPTR64], 0x8) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000240)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0xced423) 03:28:00 executing program 4: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 03:28:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) 03:28:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f") ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:28:00 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) 03:28:01 executing program 4: syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)=0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ppoll(&(0x7f0000000040)=[{}], 0x20000000000000c5, 0x0, 0x0, 0x0) 03:28:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000180)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x100000001) r2 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) r3 = getpid() fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:var_lib_t:s0\x00', 0x1f, 0x3) sched_setattr(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000bc0)={{0x0, 0x0, 0x0, 0x3, 0x1}, 0x8, 0x80000001}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x224, 0x40, 0x0, 0xf20, 0x0, 0x38, 0x0, 0x101}, [{0x5, 0x2, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x3ff}], "9659a037d4ccceae6656adb3933b1d62bbd2d0f16757a327eaaddafe250c128218f80456b6b2a50a2583fd123697a5638b5e773ced6b5c14a8b2b2a296b26b6cb9c2a26129babde8f4900668800e4f497ef1863a4033e4670bb2bab78218e9", [[]]}, 0x1d7) sendmmsg(r2, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 03:28:01 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {}, [{}], {}, [{0x8, 0x4}, {0x8, 0x5}, {0x8, 0x7}, {0x8, 0x2}, {0x8, 0x5}], {0x10, 0x6}, {0x20, 0x2}}, 0x54, 0x2) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) 03:28:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_int(r0, 0x6, 0x40000000000002, 0x0, &(0x7f0000000080)=0x340) 03:28:01 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) 03:28:01 executing program 4: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 202.449939][ T8323] overlayfs: filesystem on './file0' not supported as upperdir 03:28:01 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1, "b09b6d5c2a91e414699d955c"}}}}}, 0x0) 03:28:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x1, [@multicast1=0xe000000a]}, 0x14) 03:28:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x100000001, 0x8000000001}, 0xf) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 03:28:01 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) 03:28:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_tcp_int(r0, 0x6, 0x4000000000001b, 0x0, &(0x7f0000000080)=0x340) 03:28:01 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @rand_addr=0x8}, 0x10) 03:28:01 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ppoll(&(0x7f0000000080)=[{r0, 0x40}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:28:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) 03:28:01 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x20000000107, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) 03:28:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0x14, 0x5, 0x3, 0x0, [{}, {[@empty=0x1100]}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 203.037175][ T8368] RDS: rds_bind could not find a transport for ::ffff:0.0.0.8, load rds_tcp or rds_rdma? 03:28:02 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xffffffff80000005}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000deb000)={0xbfffffffc000000d}) 03:28:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f00000002c0)}) 03:28:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) 03:28:02 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000900)={0x5e0, 0x0, 0x0, "b530c99b465ba4e268eb33bfaf7b1638f4b82edddd55b0eb7dc57390460254731dab013f4cd3b4ffa6085f986e3af5461fc0c6ca9230166685061267d7e5e3c2dfb747616717695ec3063057b9148b105bd60b90981f66406c3c1c73086082e7f9057bd1b7cac499dac9fa6a936da8c83f9acef2bff38dfb3743c8cf3f14917c0bad11414846f21416e2047282dd6edd4f5437ba3c4316766cca463efdc5ca8e50377a680b8e78bfe2874adad6fbeeff896f913d560c2e0213dedd8115f1ada45efc424c5a4e95a046bbfe63ca3e0243117602389e99fd08e361f457fb2d0931820c52359a5afff0d20f6c1cc95f6d50aafd461c30d4b60b9ea71bb71d401afd7d8143f1f2c35624cd6394d899c954e1a1fdd6b51d97430ffef8ce8b01f8f0bcb6cd994f79d435c95a042f2a9dda81c0c7a0de66aa1b4b5d11189725431dcfa180ba0fb3c42437d750f67176ffead5a73394742c0bbbdf09d09de70f716e30372fdc8e4d6a79a36f3c07443acd45b2649132fb27d853a4724ea632794e87a0f68be25498584f5ab9ed7c1378045ceb09c794ca113ae6103d78857a84bab8c3c2025fd5499891209124976a41eb186062de609461c97ebe913894e526895a423f6f10922e266e1c4f38805f6f36592235f98778ae137347633c05e07f2b9f28681e2aa55d29cf3c5958db8cbea8f268b127494ee423836ac0e255b28d4d686380f4122dfeec48b80ed75095a37636c33496c291af8bd3c730446465952426dad623c487385bc62907b993ba0a885ab175bb0ddddfb0a44e0a86d0587e2401c751420c6ea8ca354144dcd7abc8f3a465cd73a7095a847888364a30f268893ee48bd7fc30ba87b09e47f4035c978b87a624f05dba6ba31b642035af978a3c21b9d010937148fa8c524a7aae3fa0b443cdc0b752ace6c86eb5e0bfffe4ea5de81ecbc00ef53129a444d344a9dd349945c81e980ef06e68fed28ccd410b73a26eff5a675a324c2b8e17995a32ff7993312382d93e025222b369549300509f83c7d62de20bc8c0f406885d454078625d9a7c78bd55e4e1a04045a8239f1989837380b9e9a1b15a729b434d472c2f89883c68ecef8650830a1b4acbedb5d1aa9523db2131d80eecfe20740dec43c82fd42669ec4d26fc25d259cf0d69aeeab537918b33820e42783aaf95201af2ed21dd9152724e88299e7c8040e0ebf78fc9080da1e34eb698fb1ddb9d5599de088b32de1f8588adb14d51cbc09d3fc28e5e8f7c445df289ac3340d8e4bf2465d93565bee28170eef91c6345e9646212d482be83e44d7bc705710aff4605d63175e3d4338f5260353b01ed08ad14712bb84ea2c97df8fa275c5ae70b6e0e94127cd8b955d2918c62810aa0cf00663f8dac4d013428af642ed65aa17d6c56d1a77954fc6fd19ec1ad1d03a6054400e3c0c5321a205c7fd7929f7d72c1d16a408ee104a1e4d55f197d037ad8312d7be12d53b8e3cb7bd7fd82b577f1266a834c4d250804b758d4a9a987225f4584b013cdc3f3cffc8f8817f28325f40eb228e8f56c93a7a043b27cd1f265fca46f7776cc7f3a8a411246847c8615e6358f1830819b0500cb4238a5df6623cfe50ce1bafe742cb20db5434a0fe60d147bd37a30f9cd17b840f2006acf695dd88ee36a907de3fe372c10248dde96c451a48ac63b0edac727235058f5842189e993359036c89aff22b9be674e90efc2b18b4fa218cec244d649ee6d55b493ff764c2ca4bd2b9db8fa7325e224fdab7c96f3197b157e2e6091cff5df0111159ec9575d2c55b591d73d1b3b92adb7de46a7ebd988a9c0f45e77e33ff48dc700087b454e9fac4b018373a13e3dba4cc92e08f0ca88aee0a7e7ea074d5515ffd5d72a5b7bfe839ceda8cfdbe53be071697c28e8a2caf18b2f208e4c754cdefcd324663ab7d6c7027ff006285a2c542d2b64013ff1b7a4a5550777f22d01cdd500913030017dce012c3028dbed7311b4cc644443f3f825822e48521bfa02694735b966e4893c281aaf05a84374750eac47a30c6daffd5c7d9fc18f899e5eadb67c1345928475becbd7e2d5c8069e0e8d803f6486e8cf6f3e54ccde413e471500de418d72298f65a72c52c11ba6e0"}) 03:28:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x20b) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 03:28:02 executing program 5: clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000540)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x810005, 0x0) tkill(r0, 0x1000000000014) 03:28:02 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x8005) [ 203.563896][ T8392] tls_set_device_offload_rx: netdev ip_vti0 with no TLS offload 03:28:02 executing program 0: r0 = semget$private(0x0, 0x6, 0x320) getrlimit(0xffffffffffffffff, &(0x7f0000000500)) semop(r0, &(0x7f0000000000)=[{0x2, 0xffffffff}, {0x1, 0x1, 0x1000}, {0x4, 0x5, 0x1000}, {0x4, 0x2, 0x1800}, {0x1, 0x92, 0x800}], 0x5) semop(r0, &(0x7f0000000040)=[{0x2, 0x1, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 03:28:02 executing program 4: [ 203.757294][ T8398] tls_set_device_offload_rx: netdev ip_vti0 with no TLS offload 03:28:02 executing program 3: 03:28:02 executing program 2: 03:28:02 executing program 4: [ 203.852469][ C1] net_ratelimit: 12 callbacks suppressed [ 203.852478][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 203.858226][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 203.870401][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 203.876237][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:28:02 executing program 0: 03:28:02 executing program 3: 03:28:02 executing program 2: 03:28:02 executing program 1: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="fb", 0x1}], 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x8005) 03:28:02 executing program 4: 03:28:03 executing program 5: 03:28:03 executing program 4: 03:28:03 executing program 3: 03:28:03 executing program 0: 03:28:03 executing program 2: 03:28:03 executing program 1: 03:28:04 executing program 1: 03:28:04 executing program 4: 03:28:04 executing program 2: 03:28:04 executing program 3: 03:28:04 executing program 0: 03:28:04 executing program 5: 03:28:04 executing program 1: 03:28:04 executing program 4: 03:28:04 executing program 2: 03:28:04 executing program 0: 03:28:04 executing program 3: 03:28:04 executing program 5: 03:28:04 executing program 4: 03:28:04 executing program 1: 03:28:04 executing program 2: 03:28:04 executing program 3: 03:28:04 executing program 5: 03:28:04 executing program 4: 03:28:04 executing program 0: 03:28:04 executing program 2: 03:28:04 executing program 1: 03:28:04 executing program 5: 03:28:04 executing program 3: 03:28:04 executing program 4: 03:28:04 executing program 0: 03:28:04 executing program 4: 03:28:04 executing program 1: 03:28:04 executing program 2: 03:28:04 executing program 5: 03:28:04 executing program 3: 03:28:04 executing program 0: 03:28:04 executing program 2: 03:28:04 executing program 5: 03:28:04 executing program 1: 03:28:04 executing program 4: 03:28:04 executing program 3: 03:28:04 executing program 5: 03:28:04 executing program 2: 03:28:05 executing program 1: 03:28:05 executing program 4: 03:28:05 executing program 0: 03:28:05 executing program 3: 03:28:05 executing program 5: 03:28:05 executing program 2: 03:28:05 executing program 0: 03:28:05 executing program 4: 03:28:05 executing program 1: 03:28:05 executing program 4: 03:28:05 executing program 3: 03:28:05 executing program 5: 03:28:05 executing program 1: 03:28:05 executing program 0: 03:28:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000080)) 03:28:05 executing program 3: 03:28:05 executing program 0: 03:28:05 executing program 4: 03:28:05 executing program 1: 03:28:05 executing program 2: 03:28:05 executing program 5: 03:28:05 executing program 3: 03:28:05 executing program 0: 03:28:05 executing program 4: 03:28:05 executing program 5: 03:28:05 executing program 3: 03:28:05 executing program 2: 03:28:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000240)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x20000, 0x40000000, 0xf0000000000000, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 03:28:05 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000600)="7685427801bf9010063037780953c84a646631712cda943146fb57011593df60d04108570e69d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b592bb013894487a19e5d1afed83929be5e93185db493494ad2ba500000096567028a29b82d3d427d66240cb2450cbb1535295a5348bece9a0df6dfc66c5b5c0b866", 0xc9, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x258, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 03:28:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000240)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x20000, 0x40000000, 0xf0000000000000, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) 03:28:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:28:05 executing program 4: 03:28:05 executing program 2: syz_genetlink_get_family_id$tipc(0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='o'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe)