[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.597783][ T26] audit: type=1800 audit(1554638680.355:25): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.625726][ T26] audit: type=1800 audit(1554638680.365:26): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.653090][ T26] audit: type=1800 audit(1554638680.365:27): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.179' (ECDSA) to the list of known hosts. 2019/04/07 12:04:52 fuzzer started 2019/04/07 12:04:55 dialing manager at 10.128.0.26:34543 2019/04/07 12:04:55 syscalls: 2408 2019/04/07 12:04:55 code coverage: enabled 2019/04/07 12:04:55 comparison tracing: enabled 2019/04/07 12:04:55 extra coverage: extra coverage is not supported by the kernel 2019/04/07 12:04:55 setuid sandbox: enabled 2019/04/07 12:04:55 namespace sandbox: enabled 2019/04/07 12:04:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/07 12:04:55 fault injection: enabled 2019/04/07 12:04:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/07 12:04:55 net packet injection: enabled 2019/04/07 12:04:55 net device setup: enabled 12:07:04 executing program 0: syzkaller login: [ 183.194581][ T7934] IPVS: ftp: loaded support on port[0] = 21 12:07:05 executing program 1: [ 183.301876][ T7934] chnl_net:caif_netlink_parms(): no params data found [ 183.405407][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.414998][ T7934] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.424346][ T7934] device bridge_slave_0 entered promiscuous mode [ 183.435147][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.444688][ T7934] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.454340][ T7934] device bridge_slave_1 entered promiscuous mode [ 183.480548][ T7934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.481807][ T7937] IPVS: ftp: loaded support on port[0] = 21 [ 183.495176][ T7934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.520805][ T7934] team0: Port device team_slave_0 added [ 183.533180][ T7934] team0: Port device team_slave_1 added 12:07:05 executing program 2: [ 183.631403][ T7934] device hsr_slave_0 entered promiscuous mode [ 183.679660][ T7934] device hsr_slave_1 entered promiscuous mode [ 183.730819][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.738171][ T7934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.746231][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.753526][ T7934] bridge0: port 1(bridge_slave_0) entered forwarding state 12:07:05 executing program 3: [ 183.781096][ T7939] IPVS: ftp: loaded support on port[0] = 21 [ 183.937683][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 184.011736][ T7943] IPVS: ftp: loaded support on port[0] = 21 [ 184.094355][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.102987][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.113810][ T7937] device bridge_slave_0 entered promiscuous mode [ 184.139964][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.147152][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.157998][ T7937] device bridge_slave_1 entered promiscuous mode 12:07:06 executing program 4: [ 184.206722][ T7934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.224515][ T7937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.241420][ T7939] chnl_net:caif_netlink_parms(): no params data found [ 184.269047][ T7937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.295268][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.310494][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.361491][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.385215][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 184.412716][ T7934] 8021q: adding VLAN 0 to HW filter on device team0 12:07:06 executing program 5: [ 184.498481][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.507216][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.519800][ T3754] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.526875][ T3754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.537298][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.548140][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.560737][ T3754] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.567811][ T3754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.577283][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.597939][ T7948] IPVS: ftp: loaded support on port[0] = 21 [ 184.623607][ T7937] team0: Port device team_slave_0 added [ 184.640354][ T7951] IPVS: ftp: loaded support on port[0] = 21 [ 184.660491][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.670004][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.679655][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.687976][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.697901][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.706428][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.714825][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.723445][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.732721][ T7937] team0: Port device team_slave_1 added [ 184.748109][ T7943] chnl_net:caif_netlink_parms(): no params data found [ 184.793335][ T7939] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.801523][ T7939] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.809587][ T7939] device bridge_slave_0 entered promiscuous mode [ 184.842938][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.851573][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.861596][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.870436][ T7939] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.877896][ T7939] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.885888][ T7939] device bridge_slave_1 entered promiscuous mode [ 184.939949][ T7937] device hsr_slave_0 entered promiscuous mode [ 184.999049][ T7937] device hsr_slave_1 entered promiscuous mode [ 185.055792][ T7939] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.069910][ T7939] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.079253][ T7943] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.086322][ T7943] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.094906][ T7943] device bridge_slave_0 entered promiscuous mode [ 185.103489][ T7943] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.110828][ T7943] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.119246][ T7943] device bridge_slave_1 entered promiscuous mode [ 185.160380][ T7939] team0: Port device team_slave_0 added [ 185.167724][ T7943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.183987][ T7939] team0: Port device team_slave_1 added [ 185.200488][ T7943] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.245732][ T7943] team0: Port device team_slave_0 added [ 185.253582][ T7943] team0: Port device team_slave_1 added [ 185.295777][ T7934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.350027][ T7939] device hsr_slave_0 entered promiscuous mode [ 185.388749][ T7939] device hsr_slave_1 entered promiscuous mode [ 185.501148][ T7943] device hsr_slave_0 entered promiscuous mode [ 185.578805][ T7943] device hsr_slave_1 entered promiscuous mode [ 185.629617][ T7948] chnl_net:caif_netlink_parms(): no params data found 12:07:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 185.761972][ T7951] chnl_net:caif_netlink_parms(): no params data found [ 185.820968][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.828718][ T7948] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.835814][ T7948] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.845593][ T7948] device bridge_slave_0 entered promiscuous mode [ 185.878330][ C1] hrtimer: interrupt took 27419 ns [ 185.886491][ T7948] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.899422][ T7948] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.909533][ T7948] device bridge_slave_1 entered promiscuous mode 12:07:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 185.930401][ T7939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.942061][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 12:07:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 185.998447][ T7948] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.007187][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.016321][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.057171][ T7948] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.087072][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.097393][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:07:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 186.106683][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.113823][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.123092][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.132067][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.146566][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state 12:07:07 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) connect$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) [ 186.153705][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.171363][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.184941][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.207189][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.218087][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.232213][ T7951] device bridge_slave_0 entered promiscuous mode [ 186.246237][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state 12:07:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) listen(0xffffffffffffffff, 0x9) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 186.254779][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.263872][ T7951] device bridge_slave_1 entered promiscuous mode [ 186.275497][ T7939] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.293995][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.307206][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.321015][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.347381][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 12:07:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) listen(0xffffffffffffffff, 0x9) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) [ 186.363065][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.374926][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.386826][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.434331][ T7937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 186.450204][ T7937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 186.463721][ T7948] team0: Port device team_slave_0 added [ 186.471052][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.479878][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.489437][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.503146][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.512612][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.521882][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.530156][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.538434][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.546705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.555140][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.564175][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.573394][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.581851][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.593612][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.602300][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.615628][ T7951] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.631074][ T7951] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.651012][ T7943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.667400][ T7948] team0: Port device team_slave_1 added [ 186.686403][ T7951] team0: Port device team_slave_0 added [ 186.704137][ T7951] team0: Port device team_slave_1 added [ 186.725327][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.746527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.756267][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.766178][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.778864][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.817059][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.829338][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.838417][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.847939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.860399][ T7943] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.920217][ T7951] device hsr_slave_0 entered promiscuous mode [ 186.988760][ T7951] device hsr_slave_1 entered promiscuous mode [ 187.081139][ T7948] device hsr_slave_0 entered promiscuous mode [ 187.138792][ T7948] device hsr_slave_1 entered promiscuous mode [ 187.185571][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.194450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.203431][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.213860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.222631][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.265787][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.277052][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.286307][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.293541][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.302681][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.311890][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.324859][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.331968][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.340351][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.360180][ T7939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:07:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) [ 187.410179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.430018][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.443785][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.456395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.479076][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.495785][ T7939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.523658][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.535928][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.545519][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.554177][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.562710][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.571373][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.612825][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:07:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x246) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0xfffd}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0x117) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 187.645138][ T7951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.661841][ T7948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.686846][ T7991] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 187.702996][ T7943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.717710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.727904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.744788][ T7951] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.767282][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.777502][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:07:09 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) connect$rxrpc(r0, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) [ 187.812180][ T7948] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.842928][ T7993] kvm: emulating exchange as write [ 187.850579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.886383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.908838][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.915912][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.946763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.958065][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.967075][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.974215][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.016825][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.025355][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.039862][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.053342][ T2990] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.060468][ T2990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.068768][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.077192][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.085901][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.094367][ T2990] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.101479][ T2990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.109883][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.118676][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.127146][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.135717][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.158778][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.166669][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.175023][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.184215][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.193380][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.202000][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.210675][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.221650][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.229488][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.237787][ T2990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.255032][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.263981][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.272945][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.281396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.295892][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.317085][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.325621][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.334417][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.343967][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.354687][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.369008][ T7951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.396899][ T7948] 8021q: adding VLAN 0 to HW filter on device batadv0 12:07:10 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x2453ca7) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file1\x00') setxattr$security_smack_entry(&(0x7f0000000080)='./file3\x00', 0x0, &(0x7f0000000140)=')\x00', 0x2, 0x1) 12:07:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) listen(0xffffffffffffffff, 0x9) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) 12:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="5500000018007f1412fe01b2a4a280930a02000000a8430691e1ffff14000f0035026800061d79001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0001400000060cec4faba7d4", 0x55}], 0x1}, 0x0) 12:07:10 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='#\x00', 0x0) r1 = socket$inet6(0xa, 0xb, 0x6) ioctl$FICLONE(r0, 0x40049409, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) r3 = getpid() r4 = syz_open_procfs(r3, 0x0) fcntl$setstatus(r4, 0x4, 0x4800) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = mq_open(0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000780)=ANY=[@ANYBLOB="2b725115df81b0a1011a97fcfcf5888e2b097f0ef1874221d3fe13d8f186a5ed4209698db4aa56164497b3a8467b7f7ad00e2692ab0b21d6f958e46272c46780c7e92e018f1081a86b5b970a2ae1dcebd1bf27739a337c93c396a601705ed417b470ea27ca617582ef0af3d86d6d80ef04310f93b044c6a7cbfd5a3c592c75a6d1072748e45c9a64bf978478b107e60344de0c1a88bebd6a4c19d79160592ce104315f009148840b892af937042850cec9bb80352db138e0b577fba69b2222d19d7af325d804cd8b992c8f2b7dc8bf15", @ANYPTR64, @ANYPTR, @ANYRESDEC], @ANYRES32=0x0]], 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000003c0)={@in={0x2, 0x4e23, @multicast1}, {&(0x7f0000000280)=""/229, 0xe5}, &(0x7f0000000380), 0x77}, 0xa0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r4, 0xe, 0x3}, 0x14) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$VHOST_GET_VRING_BASE(r7, 0xc008af12, &(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2) r8 = accept(r5, 0x0, &(0x7f0000000080)=0x1030b) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') read(r7, &(0x7f00000005c0)=""/144, 0x14c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000740)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, 0x0, 0x9) write(r6, &(0x7f0000000680), 0x313) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}, 0x800}], 0x1, 0x0) 12:07:10 executing program 3: sendto$isdn(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) 12:07:10 executing program 5: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = dup(r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, 0x0) msgctl$IPC_RMID(r0, 0x0) 12:07:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) [ 188.542743][ T8009] netlink: 'syz-executor.1': attribute type 15 has an invalid length. [ 188.569169][ T8009] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.1'. 12:07:10 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x24) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, 0x0, 0x0) 12:07:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) 12:07:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f0000000280)='syz', 0x0) 12:07:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xf00000000000000, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 12:07:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000580)={0x0, 0x7}, 0x4) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc)=0xffffffffffffff52, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000400)=0x4) shutdown(r2, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 188.978152][ T8052] sctp: failed to load transform for md5: -2 [ 189.365822][ T8010] dccp_close: ABORT with 1061 bytes unread [ 189.392752][ T8011] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(222164708858403) <= P.seqno(0) <= S.SWH(222164708858477)) and (P.ackno exists or LAWL(104528934240324) <= P.ackno(104528934240325) <= S.AWH(104528934240325), sending SYNC... 12:07:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1\xbdr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x0e\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) r3 = getpgid(0x0) tgkill(r2, r3, 0x3e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:07:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x1000000e000, 0x0) r1 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) 12:07:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000180)={'vxcan1\x00', 0x3b6a}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = getpgid(0x0) tgkill(0x0, r0, 0x3e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:07:11 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='#\x00', 0x0) r1 = socket$inet6(0xa, 0xb, 0x6) ioctl$FICLONE(r0, 0x40049409, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) r3 = getpid() r4 = syz_open_procfs(r3, 0x0) fcntl$setstatus(r4, 0x4, 0x4800) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = mq_open(0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000780)=ANY=[@ANYBLOB="2b725115df81b0a1011a97fcfcf5888e2b097f0ef1874221d3fe13d8f186a5ed4209698db4aa56164497b3a8467b7f7ad00e2692ab0b21d6f958e46272c46780c7e92e018f1081a86b5b970a2ae1dcebd1bf27739a337c93c396a601705ed417b470ea27ca617582ef0af3d86d6d80ef04310f93b044c6a7cbfd5a3c592c75a6d1072748e45c9a64bf978478b107e60344de0c1a88bebd6a4c19d79160592ce104315f009148840b892af937042850cec9bb80352db138e0b577fba69b2222d19d7af325d804cd8b992c8f2b7dc8bf15", @ANYPTR64, @ANYPTR, @ANYRESDEC], @ANYRES32=0x0]], 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000003c0)={@in={0x2, 0x4e23, @multicast1}, {&(0x7f0000000280)=""/229, 0xe5}, &(0x7f0000000380), 0x77}, 0xa0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r4, 0xe, 0x3}, 0x14) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$VHOST_GET_VRING_BASE(r7, 0xc008af12, &(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2) r8 = accept(r5, 0x0, &(0x7f0000000080)=0x1030b) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') read(r7, &(0x7f00000005c0)=""/144, 0x14c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000740)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, 0x0, 0x9) write(r6, &(0x7f0000000680), 0x313) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}, 0x800}], 0x1, 0x0) [ 189.596272][ T8077] libceph: resolve '.u [ 189.596272][ T8077] ' (ret=-3): failed [ 189.608529][ T8078] libceph: resolve '.u [ 189.608529][ T8078] ' (ret=-3): failed [ 189.608580][ T8078] libceph: parse_ips bad ip '.u [ 189.608580][ T8078] :d]:.,[' [ 189.635398][ T8077] libceph: parse_ips bad ip '.u [ 189.635398][ T8077] :d]:.,[' 12:07:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) [ 189.656124][ T8082] libceph: resolve '.u [ 189.656124][ T8082] ' (ret=-3): failed 12:07:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) r3 = getpgid(0x0) tgkill(r2, r3, 0x3e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:07:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 189.697244][ T8082] libceph: parse_ips bad ip '.u [ 189.697244][ T8082] :d]:.,[' 12:07:11 executing program 3: bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) 12:07:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000340)=ANY=[@ANYBLOB="4bfdffff29929f79f400680f4f7feec58167bda72e9b0194c2bf7452e890ddc0fffa2633a8a2cf9184ef8ff33ee145d3f45e138496d85a597bd1fecfb49ba93b97d8ecdd9a85fc3c96701a00a9dcd0747c47"], 0x0) close(r1) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0), &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r1, &(0x7f0000000bc0)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000000)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x7c}}], 0x30, 0x4}], 0x1, 0x0) 12:07:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 189.897276][ T8103] libceph: resolve '.u [ 189.897276][ T8103] ' (ret=-3): failed 12:07:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:11 executing program 3: bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) [ 189.970109][ T8103] libceph: parse_ips bad ip '.u [ 189.970109][ T8103] :d]:.,[' 12:07:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) r3 = getpgid(0x0) tgkill(r2, r3, 0x3e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:07:11 executing program 3: bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) [ 190.126328][ T8088] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(88774689573596) <= P.seqno(0) <= S.SWH(88774689573670)) and (P.ackno exists or LAWL(118052234145979) <= P.ackno(118052234145980) <= S.AWH(118052234145980), sending SYNC... 12:07:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 190.176590][ T8127] libceph: resolve '.u [ 190.176590][ T8127] ' (ret=-3): failed [ 190.215475][ T8073] dccp_close: ABORT with 1061 bytes unread 12:07:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 12:07:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) [ 190.237952][ T8127] libceph: parse_ips bad ip '.u [ 190.237952][ T8127] :d]:.,[' 12:07:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) 12:07:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) r3 = getpgid(0x0) tgkill(r2, r3, 0x3e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:07:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 190.538972][ T8147] libceph: resolve '.u [ 190.538972][ T8147] ' (ret=-3): failed [ 190.556198][ T8147] libceph: parse_ips bad ip '.u [ 190.556198][ T8147] :d]:.,[' 12:07:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 12:07:12 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 12:07:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) 12:07:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) r3 = getpgid(0x0) tgkill(r2, r3, 0x3e) 12:07:12 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 12:07:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) [ 190.854665][ T8172] libceph: resolve '.u [ 190.854665][ T8172] ' (ret=-3): failed [ 190.888670][ T8172] libceph: parse_ips bad ip '.u [ 190.888670][ T8172] :d]:.,[' [ 190.914224][ T8178] check_preemption_disabled: 3 callbacks suppressed [ 190.914365][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 190.931955][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 190.937506][ T8178] CPU: 0 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 190.946893][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.956977][ T8178] Call Trace: [ 190.960309][ T8178] dump_stack+0x172/0x1f0 [ 190.964698][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 190.970657][ T8178] sk_mc_loop+0x1d/0x210 [ 190.974937][ T8178] ip_mc_output+0x2ef/0xf70 [ 190.979474][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 190.984614][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 190.989731][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 190.995244][ T8178] ? dst_release+0x62/0xb0 [ 190.999777][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 191.005885][ T8178] ip_local_out+0xc4/0x1b0 [ 191.010344][ T8178] ip_send_skb+0x42/0xf0 [ 191.014619][ T8178] ip_push_pending_frames+0x64/0x80 [ 191.020020][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 191.024653][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.030378][ T8178] ? finish_task_switch+0x146/0x780 [ 191.035774][ T8178] ? ___might_sleep+0x163/0x280 [ 191.040659][ T8178] ? __might_sleep+0x95/0x190 [ 191.045374][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 191.051121][ T8178] ? aa_sk_perm+0x288/0x880 [ 191.055674][ T8178] ? _raw_spin_unlock_irq+0x5e/0x90 [ 191.060900][ T8178] ? finish_task_switch+0x146/0x780 [ 191.066127][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 191.071740][ T8178] inet_sendmsg+0x147/0x5e0 [ 191.076273][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.081973][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 191.086818][ T8178] ? ipip_gro_receive+0x100/0x100 [ 191.091935][ T8178] sock_sendmsg+0xdd/0x130 [ 191.096562][ T8178] kernel_sendmsg+0x44/0x50 [ 191.101092][ T8178] sock_no_sendpage+0x116/0x150 [ 191.106049][ T8178] ? sock_kfree_s+0x70/0x70 [ 191.110776][ T8178] inet_sendpage+0x44a/0x630 [ 191.115398][ T8178] kernel_sendpage+0x95/0xf0 [ 191.120007][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 191.124725][ T8178] sock_sendpage+0x8b/0xc0 [ 191.129388][ T8178] ? pipe_lock+0x6e/0x80 [ 191.133676][ T8178] pipe_to_sendpage+0x299/0x370 [ 191.138903][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 191.144343][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.149741][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.156006][ T8178] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 191.162104][ T8178] __splice_from_pipe+0x395/0x7d0 [ 191.167305][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.172625][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.177933][ T8178] splice_from_pipe+0x108/0x170 [ 191.182812][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 191.188075][ T8178] ? apparmor_file_permission+0x25/0x30 [ 191.193895][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.200388][ T8178] ? security_file_permission+0x94/0x380 [ 191.206058][ T8178] generic_splice_sendpage+0x3c/0x50 [ 191.211470][ T8178] ? splice_from_pipe+0x170/0x170 [ 191.216872][ T8178] do_splice+0x70a/0x13c0 [ 191.221440][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 191.226658][ T8178] ? __fget_light+0x1a9/0x230 [ 191.231396][ T8178] __x64_sys_splice+0x2c6/0x330 [ 191.236429][ T8178] do_syscall_64+0x103/0x610 [ 191.241308][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.247233][ T8178] RIP: 0033:0x4582b9 [ 191.251408][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.271732][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 191.280273][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 191.288342][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.296611][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 191.304965][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 191.313756][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 191.377760][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 191.396984][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 191.402571][ T8178] CPU: 0 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 191.411730][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.421902][ T8178] Call Trace: [ 191.425315][ T8178] dump_stack+0x172/0x1f0 [ 191.429964][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 191.435858][ T8178] sk_mc_loop+0x1d/0x210 [ 191.435897][ T8178] ip_mc_output+0x2ef/0xf70 [ 191.435918][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 191.435931][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 191.435947][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 191.435958][ T8178] ? dst_release+0x62/0xb0 [ 191.435972][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 191.435989][ T8178] ip_local_out+0xc4/0x1b0 [ 191.451852][ T8178] ip_send_skb+0x42/0xf0 [ 191.451873][ T8178] ip_push_pending_frames+0x64/0x80 [ 191.451891][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 191.451922][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.451964][ T8178] ? finish_task_switch+0x146/0x780 [ 191.504391][ T8178] ? ___might_sleep+0x163/0x280 [ 191.509354][ T8178] ? __might_sleep+0x95/0x190 [ 191.514053][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 191.519796][ T8178] ? aa_sk_perm+0x288/0x880 [ 191.524316][ T8178] ? retint_kernel+0x2d/0x2d [ 191.529149][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 191.534947][ T8178] inet_sendmsg+0x147/0x5e0 [ 191.539468][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.544937][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 191.549640][ T8178] ? ipip_gro_receive+0x100/0x100 [ 191.554802][ T8178] sock_sendmsg+0xdd/0x130 [ 191.559248][ T8178] kernel_sendmsg+0x44/0x50 [ 191.563859][ T8178] sock_no_sendpage+0x116/0x150 [ 191.568748][ T8178] ? sock_kfree_s+0x70/0x70 [ 191.573270][ T8178] ? mark_held_locks+0xa4/0xf0 [ 191.578056][ T8178] ? mark_held_locks+0xa4/0xf0 [ 191.582937][ T8178] inet_sendpage+0x44a/0x630 [ 191.587646][ T8178] kernel_sendpage+0x95/0xf0 [ 191.592559][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 191.597352][ T8178] sock_sendpage+0x8b/0xc0 [ 191.601798][ T8178] pipe_to_sendpage+0x299/0x370 [ 191.606934][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 191.611816][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.617132][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.622481][ T8178] __splice_from_pipe+0x395/0x7d0 [ 191.627855][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.633357][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 191.639774][ T8178] splice_from_pipe+0x108/0x170 [ 191.647960][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 191.652927][ T8178] ? apparmor_file_permission+0x25/0x30 [ 191.658818][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.665200][ T8178] ? security_file_permission+0x94/0x380 [ 191.670949][ T8178] generic_splice_sendpage+0x3c/0x50 [ 191.676255][ T8178] ? splice_from_pipe+0x170/0x170 [ 191.681300][ T8178] do_splice+0x70a/0x13c0 [ 191.685662][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 191.690795][ T8178] ? __fget_light+0x1a9/0x230 [ 191.695733][ T8178] __x64_sys_splice+0x2c6/0x330 [ 191.700614][ T8178] do_syscall_64+0x103/0x610 [ 191.705258][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.711253][ T8178] RIP: 0033:0x4582b9 [ 191.715196][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.734825][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 191.743327][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 191.751518][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.759515][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 191.767703][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 12:07:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) 12:07:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) getpgid(0x0) [ 191.775801][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 191.830562][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 191.840411][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 191.845648][ T8178] CPU: 1 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 191.854701][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.864873][ T8178] Call Trace: [ 191.868227][ T8178] dump_stack+0x172/0x1f0 [ 191.872600][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 191.878445][ T8178] sk_mc_loop+0x1d/0x210 [ 191.882924][ T8178] ip_mc_output+0x2ef/0xf70 [ 191.887453][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 191.892593][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 191.897470][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 191.903064][ T8178] ? dst_release+0x62/0xb0 [ 191.907592][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 191.912470][ T8178] ip_local_out+0xc4/0x1b0 [ 191.916928][ T8178] ip_send_skb+0x42/0xf0 [ 191.921540][ T8178] ip_push_pending_frames+0x64/0x80 [ 191.926869][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 191.931622][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.937378][ T8178] ? finish_task_switch+0x146/0x780 [ 191.942876][ T8178] ? ___might_sleep+0x163/0x280 [ 191.947772][ T8178] ? __might_sleep+0x95/0x190 [ 191.952495][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 191.958260][ T8178] ? aa_sk_perm+0x288/0x880 [ 191.962822][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 191.968754][ T8178] inet_sendmsg+0x147/0x5e0 [ 191.973805][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 191.979578][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 191.984277][ T8178] ? ipip_gro_receive+0x100/0x100 [ 191.989414][ T8178] sock_sendmsg+0xdd/0x130 [ 191.994030][ T8178] kernel_sendmsg+0x44/0x50 [ 191.998699][ T8178] sock_no_sendpage+0x116/0x150 [ 192.003656][ T8178] ? sock_kfree_s+0x70/0x70 [ 192.008269][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 192.015536][ T8178] ? mark_held_locks+0xa4/0xf0 [ 192.020450][ T8178] inet_sendpage+0x44a/0x630 [ 192.025141][ T8178] kernel_sendpage+0x95/0xf0 [ 192.029863][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 192.034572][ T8178] sock_sendpage+0x8b/0xc0 [ 192.039219][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.044533][ T8178] pipe_to_sendpage+0x299/0x370 [ 192.049674][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 192.055142][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.061134][ T8178] ? __put_page+0x92/0xd0 [ 192.065872][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 192.071361][ T8178] __splice_from_pipe+0x395/0x7d0 [ 192.076495][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.081941][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.087345][ T8178] splice_from_pipe+0x108/0x170 [ 192.092318][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 192.097664][ T8178] ? apparmor_file_permission+0x25/0x30 [ 192.103388][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.109657][ T8178] ? security_file_permission+0x94/0x380 [ 192.115560][ T8178] generic_splice_sendpage+0x3c/0x50 [ 192.120958][ T8178] ? splice_from_pipe+0x170/0x170 [ 192.126044][ T8178] do_splice+0x70a/0x13c0 [ 192.130406][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 192.135625][ T8178] ? __fget_light+0x1a9/0x230 [ 192.140334][ T8178] __x64_sys_splice+0x2c6/0x330 [ 192.145306][ T8178] do_syscall_64+0x103/0x610 [ 192.149926][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.156272][ T8178] RIP: 0033:0x4582b9 [ 192.160363][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:07:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 12:07:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) [ 192.180520][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 192.188972][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 192.197188][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 192.205289][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 192.213358][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 192.221422][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 12:07:14 executing program 3: pipe(0x0) clone(0x800000409ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="fa79c2201f276a9d9980c50e12f8ed68e8be9c7993304290edffee9ec78dfd3a14b07eb38b8029de85380807000000d998f13ca277f5368aee"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) stat(0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 192.272831][ T8192] libceph: resolve '.u [ 192.272831][ T8192] ' (ret=-3): failed [ 192.296764][ T8192] libceph: parse_ips bad ip '.u [ 192.296764][ T8192] :d]:.,[' [ 192.414706][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 192.424972][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 192.430390][ T8178] CPU: 1 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 192.439811][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.450439][ T8178] Call Trace: [ 192.453830][ T8178] dump_stack+0x172/0x1f0 [ 192.458464][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 192.464027][ T8178] sk_mc_loop+0x1d/0x210 [ 192.468317][ T8178] ip_mc_output+0x2ef/0xf70 [ 192.472840][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 192.478138][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 192.483112][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 192.488805][ T8178] ? dst_release+0x62/0xb0 [ 192.493247][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 192.498098][ T8178] ip_local_out+0xc4/0x1b0 [ 192.502554][ T8178] ip_send_skb+0x42/0xf0 [ 192.506828][ T8178] ip_push_pending_frames+0x64/0x80 [ 192.512127][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 192.516932][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 192.522989][ T8178] ? finish_task_switch+0x146/0x780 [ 192.528252][ T8178] ? ___might_sleep+0x163/0x280 [ 192.533250][ T8178] ? __might_sleep+0x95/0x190 [ 192.538242][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 192.543890][ T8178] ? aa_sk_perm+0x288/0x880 [ 192.548544][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.554231][ T8178] inet_sendmsg+0x147/0x5e0 [ 192.559124][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 192.564844][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 192.569530][ T8178] ? ipip_gro_receive+0x100/0x100 [ 192.574809][ T8178] sock_sendmsg+0xdd/0x130 [ 192.579444][ T8178] kernel_sendmsg+0x44/0x50 [ 192.584068][ T8178] sock_no_sendpage+0x116/0x150 [ 192.588963][ T8178] ? sock_kfree_s+0x70/0x70 [ 192.593628][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 192.599374][ T8178] ? mark_held_locks+0xa4/0xf0 [ 192.604260][ T8178] inet_sendpage+0x44a/0x630 [ 192.609193][ T8178] kernel_sendpage+0x95/0xf0 [ 192.613889][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 192.619029][ T8178] sock_sendpage+0x8b/0xc0 [ 192.623470][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.629225][ T8178] pipe_to_sendpage+0x299/0x370 [ 192.634233][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 192.639101][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.644488][ T8178] ? __put_page+0x92/0xd0 [ 192.648834][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 192.654482][ T8178] __splice_from_pipe+0x395/0x7d0 [ 192.659716][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.665327][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 192.670709][ T8178] splice_from_pipe+0x108/0x170 [ 192.675760][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 192.680824][ T8178] ? apparmor_file_permission+0x25/0x30 [ 192.686400][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.692747][ T8178] ? security_file_permission+0x94/0x380 [ 192.698486][ T8178] generic_splice_sendpage+0x3c/0x50 [ 192.704150][ T8178] ? splice_from_pipe+0x170/0x170 [ 192.709246][ T8178] do_splice+0x70a/0x13c0 [ 192.713674][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 192.719240][ T8178] ? __fget_light+0x1a9/0x230 [ 192.724024][ T8178] __x64_sys_splice+0x2c6/0x330 [ 192.729058][ T8178] do_syscall_64+0x103/0x610 [ 192.733851][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.740361][ T8178] RIP: 0033:0x4582b9 [ 192.744268][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.764459][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 192.773125][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 192.781307][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 192.789304][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 192.797900][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 192.806316][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 192.817758][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 192.827906][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 192.833401][ T8178] CPU: 0 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 192.842614][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.852914][ T8178] Call Trace: [ 192.856248][ T8178] dump_stack+0x172/0x1f0 [ 192.861121][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 192.867057][ T8178] sk_mc_loop+0x1d/0x210 [ 192.871512][ T8178] ip_mc_output+0x2ef/0xf70 [ 192.876189][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 192.881623][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 192.886587][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 192.892345][ T8178] ? dst_release+0x62/0xb0 [ 192.896875][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 192.901971][ T8178] ip_local_out+0xc4/0x1b0 [ 192.907793][ T8178] ip_send_skb+0x42/0xf0 [ 192.912352][ T8178] ip_push_pending_frames+0x64/0x80 [ 192.917580][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 192.922377][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 192.927878][ T8178] ? finish_task_switch+0x146/0x780 [ 192.933118][ T8178] ? ___might_sleep+0x163/0x280 [ 192.937994][ T8178] ? __might_sleep+0x95/0x190 [ 192.942786][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 192.948436][ T8178] ? aa_sk_perm+0x288/0x880 [ 192.953000][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.958594][ T8178] inet_sendmsg+0x147/0x5e0 [ 192.963298][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 192.968776][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 192.973647][ T8178] ? ipip_gro_receive+0x100/0x100 [ 192.978701][ T8178] sock_sendmsg+0xdd/0x130 [ 192.983241][ T8178] kernel_sendmsg+0x44/0x50 [ 192.987854][ T8178] sock_no_sendpage+0x116/0x150 [ 192.993240][ T8178] ? sock_kfree_s+0x70/0x70 [ 192.997856][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 193.003613][ T8178] ? mark_held_locks+0xa4/0xf0 [ 193.008495][ T8178] inet_sendpage+0x44a/0x630 [ 193.013214][ T8178] kernel_sendpage+0x95/0xf0 [ 193.017827][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 193.022919][ T8178] sock_sendpage+0x8b/0xc0 [ 193.027357][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.033232][ T8178] pipe_to_sendpage+0x299/0x370 [ 193.038235][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 193.043298][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.048875][ T8178] ? __put_page+0x92/0xd0 [ 193.053683][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 193.059350][ T8178] __splice_from_pipe+0x395/0x7d0 [ 193.064809][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.070372][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.075770][ T8178] splice_from_pipe+0x108/0x170 [ 193.080909][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 193.085883][ T8178] ? apparmor_file_permission+0x25/0x30 [ 193.091552][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.097920][ T8178] ? security_file_permission+0x94/0x380 [ 193.103649][ T8178] generic_splice_sendpage+0x3c/0x50 [ 193.109043][ T8178] ? splice_from_pipe+0x170/0x170 [ 193.114569][ T8178] do_splice+0x70a/0x13c0 [ 193.118936][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.124189][ T8178] ? __fget_light+0x1a9/0x230 [ 193.128983][ T8178] __x64_sys_splice+0x2c6/0x330 [ 193.134018][ T8178] do_syscall_64+0x103/0x610 [ 193.138669][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.144753][ T8178] RIP: 0033:0x4582b9 [ 193.148673][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.168572][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.177121][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 193.185481][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 193.193733][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 193.201807][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 193.209967][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 193.230935][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 193.240624][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 193.245678][ T8178] CPU: 1 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 193.254808][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.264868][ T8178] Call Trace: [ 193.268286][ T8178] dump_stack+0x172/0x1f0 [ 193.272714][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 193.278366][ T8178] sk_mc_loop+0x1d/0x210 [ 193.282939][ T8178] ip_mc_output+0x2ef/0xf70 [ 193.287549][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 193.292781][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 193.297793][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 193.303438][ T8178] ? dst_release+0x62/0xb0 [ 193.307940][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 193.312898][ T8178] ip_local_out+0xc4/0x1b0 [ 193.317781][ T8178] ip_send_skb+0x42/0xf0 [ 193.322124][ T8178] ip_push_pending_frames+0x64/0x80 [ 193.327456][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 193.332401][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 193.337985][ T8178] ? finish_task_switch+0x146/0x780 [ 193.343250][ T8178] ? ___might_sleep+0x163/0x280 [ 193.348211][ T8178] ? __might_sleep+0x95/0x190 [ 193.352996][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 193.358642][ T8178] ? aa_sk_perm+0x288/0x880 [ 193.363499][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 193.369072][ T8178] inet_sendmsg+0x147/0x5e0 [ 193.373617][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 193.379316][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 193.384466][ T8178] ? ipip_gro_receive+0x100/0x100 [ 193.389516][ T8178] sock_sendmsg+0xdd/0x130 [ 193.394148][ T8178] kernel_sendmsg+0x44/0x50 [ 193.398815][ T8178] sock_no_sendpage+0x116/0x150 [ 193.403701][ T8178] ? sock_kfree_s+0x70/0x70 [ 193.408517][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 193.414358][ T8178] ? mark_held_locks+0xa4/0xf0 [ 193.419141][ T8178] inet_sendpage+0x44a/0x630 [ 193.423919][ T8178] kernel_sendpage+0x95/0xf0 [ 193.428795][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 193.433495][ T8178] sock_sendpage+0x8b/0xc0 [ 193.437929][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.443232][ T8178] pipe_to_sendpage+0x299/0x370 [ 193.448351][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 193.453133][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.458710][ T8178] ? __put_page+0x92/0xd0 [ 193.463119][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 193.468817][ T8178] __splice_from_pipe+0x395/0x7d0 [ 193.474133][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.479467][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.484859][ T8178] splice_from_pipe+0x108/0x170 [ 193.489722][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 193.494686][ T8178] ? apparmor_file_permission+0x25/0x30 [ 193.500369][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.506885][ T8178] ? security_file_permission+0x94/0x380 [ 193.512612][ T8178] generic_splice_sendpage+0x3c/0x50 [ 193.518024][ T8178] ? splice_from_pipe+0x170/0x170 [ 193.523058][ T8178] do_splice+0x70a/0x13c0 [ 193.527541][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.532975][ T8178] ? __fget_light+0x1a9/0x230 [ 193.537679][ T8178] __x64_sys_splice+0x2c6/0x330 [ 193.542625][ T8178] do_syscall_64+0x103/0x610 [ 193.547226][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.553399][ T8178] RIP: 0033:0x4582b9 [ 193.557299][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.577142][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.586061][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 193.594284][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 193.602491][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 193.610816][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 193.619048][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 12:07:15 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 12:07:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) 12:07:15 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f3188b070") socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='lo\x00', 0x10) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000100)}], 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x50) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffea0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000080080003, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 12:07:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 193.632220][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 193.642446][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 193.647591][ T8178] CPU: 1 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 193.656797][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.656804][ T8178] Call Trace: [ 193.656832][ T8178] dump_stack+0x172/0x1f0 [ 193.656854][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 193.656872][ T8178] sk_mc_loop+0x1d/0x210 [ 193.656888][ T8178] ip_mc_output+0x2ef/0xf70 [ 193.656906][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 193.656920][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 193.656937][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 193.656950][ T8178] ? dst_release+0x62/0xb0 [ 193.656964][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 193.656985][ T8178] ip_local_out+0xc4/0x1b0 [ 193.719659][ T8178] ip_send_skb+0x42/0xf0 [ 193.724021][ T8178] ip_push_pending_frames+0x64/0x80 [ 193.729261][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 193.733980][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 193.739654][ T8178] ? finish_task_switch+0x146/0x780 [ 193.744999][ T8178] ? ___might_sleep+0x163/0x280 [ 193.750245][ T8178] ? __might_sleep+0x95/0x190 [ 193.754948][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 193.760605][ T8178] ? aa_sk_perm+0x288/0x880 [ 193.765190][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 193.770942][ T8178] inet_sendmsg+0x147/0x5e0 [ 193.775640][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 193.781119][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 193.785817][ T8178] ? ipip_gro_receive+0x100/0x100 [ 193.790866][ T8178] sock_sendmsg+0xdd/0x130 [ 193.795310][ T8178] kernel_sendmsg+0x44/0x50 [ 193.799843][ T8178] sock_no_sendpage+0x116/0x150 [ 193.804967][ T8178] ? sock_kfree_s+0x70/0x70 [ 193.809880][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 193.816004][ T8178] ? mark_held_locks+0xa4/0xf0 [ 193.821254][ T8178] inet_sendpage+0x44a/0x630 [ 193.826064][ T8178] kernel_sendpage+0x95/0xf0 [ 193.830799][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 193.835598][ T8178] sock_sendpage+0x8b/0xc0 [ 193.840042][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.845354][ T8178] pipe_to_sendpage+0x299/0x370 [ 193.850274][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 193.855246][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.860576][ T8178] ? __put_page+0x92/0xd0 [ 193.865145][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 193.870847][ T8178] __splice_from_pipe+0x395/0x7d0 [ 193.875932][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.881259][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 193.886830][ T8178] splice_from_pipe+0x108/0x170 [ 193.891892][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 193.896864][ T8178] ? apparmor_file_permission+0x25/0x30 [ 193.902783][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.909056][ T8178] ? security_file_permission+0x94/0x380 [ 193.914723][ T8178] generic_splice_sendpage+0x3c/0x50 [ 193.920051][ T8178] ? splice_from_pipe+0x170/0x170 [ 193.925128][ T8178] do_splice+0x70a/0x13c0 [ 193.929706][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 193.935114][ T8178] ? __fget_light+0x1a9/0x230 [ 193.946790][ T8178] __x64_sys_splice+0x2c6/0x330 [ 193.951781][ T8178] do_syscall_64+0x103/0x610 [ 193.956493][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.962583][ T8178] RIP: 0033:0x4582b9 [ 193.966616][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.986702][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 193.995422][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 194.003876][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 194.013614][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 194.021625][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 194.029715][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 194.053197][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 194.063455][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 194.068594][ T8178] CPU: 0 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 194.077638][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.087991][ T8178] Call Trace: [ 194.091542][ T8178] dump_stack+0x172/0x1f0 [ 194.095910][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 194.101662][ T8178] sk_mc_loop+0x1d/0x210 [ 194.106040][ T8178] ip_mc_output+0x2ef/0xf70 [ 194.110598][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 194.115902][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 194.121046][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 194.126717][ T8178] ? dst_release+0x62/0xb0 [ 194.131198][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 194.136314][ T8178] ip_local_out+0xc4/0x1b0 [ 194.141241][ T8178] ip_send_skb+0x42/0xf0 [ 194.146045][ T8178] ip_push_pending_frames+0x64/0x80 [ 194.151291][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 194.155948][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 194.161877][ T8178] ? finish_task_switch+0x146/0x780 [ 194.167395][ T8178] ? ___might_sleep+0x163/0x280 [ 194.172295][ T8178] ? __might_sleep+0x95/0x190 [ 194.177370][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 194.183251][ T8178] ? aa_sk_perm+0x288/0x880 [ 194.188193][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 194.194217][ T8178] inet_sendmsg+0x147/0x5e0 [ 194.199001][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 194.204969][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 194.209869][ T8178] ? ipip_gro_receive+0x100/0x100 [ 194.215062][ T8178] sock_sendmsg+0xdd/0x130 [ 194.219735][ T8178] kernel_sendmsg+0x44/0x50 [ 194.224414][ T8178] sock_no_sendpage+0x116/0x150 [ 194.229479][ T8178] ? sock_kfree_s+0x70/0x70 [ 194.234118][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 194.240479][ T8178] ? mark_held_locks+0xa4/0xf0 [ 194.245357][ T8178] inet_sendpage+0x44a/0x630 [ 194.250136][ T8178] kernel_sendpage+0x95/0xf0 [ 194.255267][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 194.260268][ T8178] sock_sendpage+0x8b/0xc0 [ 194.265028][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 194.271453][ T8178] pipe_to_sendpage+0x299/0x370 [ 194.276453][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 194.281263][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 194.286777][ T8178] ? __put_page+0x92/0xd0 [ 194.291428][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 194.297331][ T8178] __splice_from_pipe+0x395/0x7d0 [ 194.302771][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 194.308277][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 194.313982][ T8178] splice_from_pipe+0x108/0x170 [ 194.318974][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 194.324274][ T8178] ? apparmor_file_permission+0x25/0x30 [ 194.330386][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.336902][ T8178] ? security_file_permission+0x94/0x380 [ 194.342967][ T8178] generic_splice_sendpage+0x3c/0x50 [ 194.349053][ T8178] ? splice_from_pipe+0x170/0x170 [ 194.354595][ T8178] do_splice+0x70a/0x13c0 [ 194.360205][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 194.365636][ T8178] ? __fget_light+0x1a9/0x230 [ 194.370450][ T8178] __x64_sys_splice+0x2c6/0x330 [ 194.375632][ T8178] do_syscall_64+0x103/0x610 [ 194.380456][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.386898][ T8178] RIP: 0033:0x4582b9 [ 194.390970][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.412230][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 194.421310][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 194.431148][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 194.440157][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 194.449327][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 194.458662][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff [ 194.503708][ T8223] libceph: resolve '.u [ 194.503708][ T8223] ' (ret=-3): failed [ 194.511965][ T8178] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8178 [ 194.515869][ T8225] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8225 [ 194.523269][ T8178] caller is sk_mc_loop+0x1d/0x210 [ 194.533988][ T8225] caller is ip6_finish_output+0x335/0xdc0 [ 194.534012][ T8225] CPU: 0 PID: 8225 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 194.556147][ T8225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.567661][ T8225] Call Trace: [ 194.571360][ T8225] dump_stack+0x172/0x1f0 [ 194.576987][ T8225] __this_cpu_preempt_check+0x246/0x270 [ 194.583784][ T8225] ip6_finish_output+0x335/0xdc0 [ 194.588778][ T8225] ip6_output+0x235/0x7f0 [ 194.593819][ T8225] ? ip6_finish_output+0xdc0/0xdc0 [ 194.599453][ T8225] ? ip6_fragment+0x3980/0x3980 [ 194.604600][ T8225] ip6_xmit+0xe41/0x20c0 [ 194.609075][ T8225] ? ip6_finish_output2+0x2550/0x2550 [ 194.615017][ T8225] ? mark_held_locks+0xf0/0xf0 [ 194.620093][ T8225] ? perf_trace_lock+0x510/0x510 [ 194.625154][ T8225] ? ip6_setup_cork+0x1870/0x1870 [ 194.630979][ T8225] inet6_csk_xmit+0x2fb/0x5d0 [ 194.635707][ T8225] ? inet6_csk_update_pmtu+0x190/0x190 [ 194.641877][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.648331][ T8225] ? csum_ipv6_magic+0x20/0x80 [ 194.653273][ T8225] __tcp_transmit_skb+0x1a32/0x3750 [ 194.658614][ T8225] ? __tcp_select_window+0x8b0/0x8b0 [ 194.663951][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.670327][ T8225] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 194.676095][ T8225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 194.682474][ T8225] tcp_connect+0x1e47/0x4280 [ 194.687141][ T8225] ? tcp_push_one+0x110/0x110 [ 194.691897][ T8225] ? secure_tcpv6_ts_off+0x24f/0x360 [ 194.697505][ T8225] ? secure_dccpv6_sequence_number+0x280/0x280 [ 194.703710][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.710342][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.716870][ T8225] ? prandom_u32_state+0x13/0x180 [ 194.722098][ T8225] tcp_v6_connect+0x150b/0x20a0 [ 194.726995][ T8225] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 194.732595][ T8225] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 194.738509][ T8225] ? __switch_to_asm+0x34/0x70 [ 194.743585][ T8225] ? __switch_to_asm+0x40/0x70 [ 194.748566][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.755392][ T8225] ? debug_smp_processor_id+0x3c/0x280 [ 194.761085][ T8225] ? find_held_lock+0x35/0x130 [ 194.766267][ T8225] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 194.772126][ T8225] __inet_stream_connect+0x83f/0xea0 [ 194.777580][ T8225] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 194.783457][ T8225] ? __inet_stream_connect+0x83f/0xea0 [ 194.788972][ T8225] ? inet_dgram_connect+0x2e0/0x2e0 [ 194.794827][ T8225] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 194.800327][ T8225] ? rcu_read_lock_sched_held+0x110/0x130 [ 194.806264][ T8225] ? kmem_cache_alloc_trace+0x354/0x760 [ 194.811985][ T8225] ? __lock_acquire+0x548/0x3fb0 [ 194.816966][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.823451][ T8225] ? debug_smp_processor_id+0x3c/0x280 [ 194.829474][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.835922][ T8225] tcp_sendmsg_locked+0x231f/0x37f0 [ 194.841404][ T8225] ? mark_held_locks+0xf0/0xf0 [ 194.846443][ T8225] ? mark_held_locks+0xa4/0xf0 [ 194.851363][ T8225] ? tcp_sendpage+0x60/0x60 [ 194.856125][ T8225] ? lock_sock_nested+0x9a/0x120 [ 194.861436][ T8225] ? trace_hardirqs_on+0x67/0x230 [ 194.867090][ T8225] ? lock_sock_nested+0x9a/0x120 [ 194.872140][ T8225] ? __local_bh_enable_ip+0x15a/0x270 [ 194.878034][ T8225] tcp_sendmsg+0x30/0x50 [ 194.882594][ T8225] inet_sendmsg+0x147/0x5e0 [ 194.887514][ T8225] ? ipip_gro_receive+0x100/0x100 [ 194.892942][ T8225] sock_sendmsg+0xdd/0x130 [ 194.897509][ T8225] __sys_sendto+0x262/0x380 [ 194.903305][ T8225] ? __ia32_sys_getpeername+0xb0/0xb0 [ 194.909040][ T8225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.915522][ T8225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.921557][ T8225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.927599][ T8225] ? do_syscall_64+0x26/0x610 [ 194.933225][ T8225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.939803][ T8225] __x64_sys_sendto+0xe1/0x1a0 [ 194.944880][ T8225] do_syscall_64+0x103/0x610 [ 194.949809][ T8225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.955918][ T8225] RIP: 0033:0x4582b9 [ 194.959938][ T8225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.980005][ T8225] RSP: 002b:00007f1cb46c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 194.988804][ T8225] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 194.997085][ T8225] RDX: fffffffffffffea0 RSI: 0000000000000000 RDI: 0000000000000008 [ 195.005296][ T8225] RBP: 000000000073bf00 R08: 0000000020000040 R09: 000000000000001c [ 195.013531][ T8225] R10: 0000000020000001 R11: 0000000000000246 R12: 00007f1cb46c46d4 [ 195.021865][ T8225] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 195.030211][ T8178] CPU: 1 PID: 8178 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 195.040210][ T8178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.046393][ T8223] libceph: parse_ips bad ip '.u [ 195.046393][ T8223] :d]:.,[' [ 195.050902][ T8178] Call Trace: [ 195.050935][ T8178] dump_stack+0x172/0x1f0 [ 195.050961][ T8178] __this_cpu_preempt_check+0x246/0x270 [ 195.050980][ T8178] sk_mc_loop+0x1d/0x210 [ 195.050997][ T8178] ip_mc_output+0x2ef/0xf70 [ 195.051017][ T8178] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 195.051032][ T8178] ? __ip_make_skb+0xf15/0x1820 [ 195.051059][ T8178] ? ip_append_data.part.0+0x170/0x170 [ 195.051074][ T8178] ? dst_release+0x62/0xb0 [ 195.051091][ T8178] ? __ip_make_skb+0xf93/0x1820 [ 195.051109][ T8178] ip_local_out+0xc4/0x1b0 [ 195.051129][ T8178] ip_send_skb+0x42/0xf0 [ 195.051146][ T8178] ip_push_pending_frames+0x64/0x80 [ 195.051195][ T8178] raw_sendmsg+0x1e6d/0x2f20 [ 195.051225][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 195.051259][ T8178] ? finish_task_switch+0x146/0x780 [ 195.051290][ T8178] ? ___might_sleep+0x163/0x280 [ 195.051309][ T8178] ? __might_sleep+0x95/0x190 [ 195.051329][ T8178] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 195.051344][ T8178] ? aa_sk_perm+0x288/0x880 [ 195.051386][ T8178] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 195.166909][ T8178] inet_sendmsg+0x147/0x5e0 [ 195.174850][ T8178] ? compat_raw_getsockopt+0x100/0x100 [ 195.181157][ T8178] ? inet_sendmsg+0x147/0x5e0 [ 195.187771][ T8178] ? ipip_gro_receive+0x100/0x100 [ 195.194335][ T8178] sock_sendmsg+0xdd/0x130 [ 195.198887][ T8178] kernel_sendmsg+0x44/0x50 [ 195.203441][ T8178] sock_no_sendpage+0x116/0x150 [ 195.208700][ T8178] ? sock_kfree_s+0x70/0x70 [ 195.213429][ T8178] ? debug_check_no_obj_freed+0x211/0x444 [ 195.219933][ T8178] ? mark_held_locks+0xa4/0xf0 [ 195.225305][ T8178] inet_sendpage+0x44a/0x630 [ 195.230234][ T8178] kernel_sendpage+0x95/0xf0 [ 195.235286][ T8178] ? inet_sendmsg+0x5e0/0x5e0 [ 195.240264][ T8178] sock_sendpage+0x8b/0xc0 [ 195.244718][ T8178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 195.250133][ T8178] pipe_to_sendpage+0x299/0x370 [ 195.255435][ T8178] ? kernel_sendpage+0xf0/0xf0 [ 195.260453][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 195.266100][ T8178] ? __put_page+0x92/0xd0 [ 195.270786][ T8178] ? anon_pipe_buf_release+0x1c6/0x270 [ 195.276817][ T8178] __splice_from_pipe+0x395/0x7d0 [ 195.282587][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 195.288267][ T8178] ? direct_splice_actor+0x1a0/0x1a0 [ 195.293861][ T8178] splice_from_pipe+0x108/0x170 [ 195.298756][ T8178] ? splice_shrink_spd+0xd0/0xd0 [ 195.305092][ T8178] ? apparmor_file_permission+0x25/0x30 [ 195.311148][ T8178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.318040][ T8178] ? security_file_permission+0x94/0x380 [ 195.323948][ T8178] generic_splice_sendpage+0x3c/0x50 [ 195.329372][ T8178] ? splice_from_pipe+0x170/0x170 [ 195.334722][ T8178] do_splice+0x70a/0x13c0 [ 195.339384][ T8178] ? opipe_prep.part.0+0x2d0/0x2d0 [ 195.344698][ T8178] ? __fget_light+0x1a9/0x230 [ 195.349770][ T8178] __x64_sys_splice+0x2c6/0x330 [ 195.354760][ T8178] do_syscall_64+0x103/0x610 [ 195.360108][ T8178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.366244][ T8178] RIP: 0033:0x4582b9 [ 195.370492][ T8178] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.392621][ T8178] RSP: 002b:00007f2404173c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 195.402908][ T8178] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 195.411975][ T8178] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 195.421363][ T8178] RBP: 000000000073bfa0 R08: 0000000000010005 R09: 0000000000000000 [ 195.429379][ T8178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24041746d4 [ 195.437960][ T8178] R13: 00000000004c70e6 R14: 00000000004dc0e0 R15: 00000000ffffffff 12:07:17 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x200) bind$inet(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff061e460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754ddea420fae9972b571112d02") socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) r4 = gettid() syz_open_procfs$namespace(r4, &(0x7f0000000000)='ns/net\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) bind$inet(r1, &(0x7f00000004c0)={0x2, 0x4e23, @local}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) munlock(&(0x7f0000380000/0x4000)=nil, 0x4000) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r5, &(0x7f0000000280)=0xdf, 0x80000003) 12:07:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r0, &(0x7f0000000140)={0x6, 0x0, @dev}, 0x10) 12:07:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 12:07:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:17 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04630440"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x54, 0x0, &(0x7f0000000140)=[@release, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 12:07:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) [ 195.681703][ T8238] vivid-001: ================= START STATUS ================= [ 195.705003][ T8238] vivid-001: Enable Output Cropping: true [ 195.719773][ T8238] vivid-001: Enable Output Composing: true [ 195.735326][ T8238] vivid-001: Enable Output Scaler: true [ 195.747737][ T8238] vivid-001: Tx RGB Quantization Range: Automatic [ 195.763975][ T8238] vivid-001: Transmit Mode: HDMI [ 195.777812][ T8238] vivid-001: ================== END STATUS ================== [ 195.778112][ T8241] libceph: resolve '.u [ 195.778112][ T8241] ' (ret=-3): failed [ 195.798017][ T8245] vivid-001: ================= START STATUS ================= [ 195.840726][ T8245] vivid-001: Enable Output Cropping: true [ 195.847110][ T8245] vivid-001: Enable Output Composing: true [ 195.852550][ T8252] binder: tried to use weak ref as strong ref [ 195.861929][ T8252] binder: 8251:8252 Release 1 refcount change on invalid ref 0 ret -22 [ 195.872933][ T8252] binder: 8251:8252 got reply transaction with no transaction stack [ 195.873914][ T8245] vivid-001: Enable Output Scaler: true 12:07:17 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000400)={0x0, 0xffffffffffffff01, 0x6, 0x0, 0x6, 0x9, 0x1, 0x3f, 0x3f, 0x9, 0x7f, 0x4}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pread64(r2, &(0x7f00000005c0)=""/4096, 0x1000, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0xa000, 0x0) syz_open_dev$rtc(&(0x7f0000000440)='/dev/rtc#\x00', 0x55815c27, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000340)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000500)=0xc) r5 = getgid() syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$inet6(0xa, 0x800, 0x1) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r4, 0x0) setresgid(r5, 0x0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000380)={0x7fff, 0x3, 0x5, 0x0, 0x3, 0x100, 0x1, 0x100000001, 0x9, 0xd6, 0x5, 0x2}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x4, 0x7d8, [0x200015c0, 0x0, 0x0, 0x200016d0, 0x200018f0], 0x0, &(0x7f00000003c0), &(0x7f00000015c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x1d, 0x50, 0xe85f, 'ip6gre0\x00', '\x00', 'team0\x00', 'veth0_to_team\x00', @dev={[], 0x1f}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @dev={[], 0x26}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@link_local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x1b, 0x20, 0x0, 'veth0_to_bond\x00', 'veth0_to_bridge\x00', '\x00', 'irlan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @remote, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev={[], 0x1b}, 0xfffffffffffffffe}}}]}, @snat={'snat\x00', 0x10, {{@dev={[], 0x10}, 0xfffffffffffffffe}}}}, {{{0x0, 0x40, 0x0, 'tunl0\x00', 'veth1_to_team\x00', 'lapb0\x00', 'ip6gre0\x00', @random="a5c5e76236f2", [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xd8}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{{{0x11, 0x2, 0x805, 'vxcan1\x00', 'vcan0\x00', 'veth0_to_bond\x00', 'veth0_to_team\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @local, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x2e0, 0x448, 0x480, [@bpf0={'bpf\x00', 0x210, {{0x1c, [{0x10000, 0x739, 0x8000, 0xfffffffffffffffa}, {0x7a08, 0xe2, 0x8, 0x80000000}, {0x1000000000000000, 0xef18, 0x4, 0x100000001}, {0x2, 0x8, 0x1, 0x10000}, {0x40, 0x80000000, 0x2, 0x10001}, {0x3, 0x1, 0xcdf, 0x6ab}, {0x4, 0xffffffffffffffc1, 0x1549, 0x2}, {0x9, 0x4, 0x1, 0x3}, {0x8, 0x283b, 0x6, 0x8d}, {0x81, 0x6, 0x1ff}, {0x80, 0x3d, 0x9, 0x7fffffff}, {0xfdb, 0x2, 0x2, 0x9}, {0x80000001, 0x4, 0x9c, 0xffff}, {0xf34, 0x5, 0x7, 0x7f}, {0x2, 0x2, 0xffffffffffffa15a, 0x6}, {0x20000, 0x1, 0x80000, 0x3}, {0x0, 0x3, 0x7, 0x7}, {0x1ff, 0x0, 0xffffffff, 0x6}, {0x9, 0x7fff, 0xfffffffffffffffd, 0xf1}, {0x401, 0x9, 0xe1, 0x6}, {0x1, 0x2, 0xad, 0xffff}, {0x4, 0x7fffffff, 0x6, 0x20}, {0xffffffffffff8000, 0x9bd, 0x10001, 0x2}, {0x8, 0x100, 0x0, 0x10001}, {0x0, 0x76d6, 0x9, 0x8001}, {0x80000001, 0x400, 0xb03a684, 0x5}, {0x7800000, 0x7, 0x4, 0xfc}, {0x100000001, 0x8, 0x8a, 0xffffffffffff800f}, {0x7, 0x5, 0x4, 0xce}, {0x1, 0x1, 0x1c0000000000000, 0x1ff}, {0x5, 0x200, 0x8, 0x100}, {0x80000001, 0x9, 0x1ff}, {0x9, 0x79, 0xfd7, 0x7}, {0x8, 0x7f, 0x8, 0x2}, {0x1000, 0x18, 0xffffffffffffffc1, 0x3d2737ab}, {0x1, 0xc33d, 0xfff000, 0x800}, {0x2, 0x0, 0x7, 0x4}, {0x7a, 0x8000, 0x2, 0x6}, {0x40, 0x20, 0x20, 0x9}, {0x71de, 0x1, 0x1e74, 0x5}, {0x4bb, 0x0, 0x2, 0x1}, {0x4, 0xfffffffffffffffe, 0xfff, 0x5}, {0x400, 0x7fff, 0x4, 0x1}, {0x5, 0x4, 0x3ff, 0xffff}, {0x3000000, 0x8, 0x8}, {0xfffffffffffffff9, 0xffffffff, 0x80, 0x3}, {0x8000, 0x3, 0x8, 0x1f}, {0x0, 0x7fff, 0x7fffffff, 0x8}, {0x1ff, 0x5, 0x7f, 0x9}, {0x6, 0x8, 0xb380, 0x4}, {0x5, 0x8, 0x32f, 0x100000000}, {0x5, 0x800, 0x2, 0x9b4d}, {0x101, 0x7fff, 0x3ff, 0x8d5}, {0x5, 0x4, 0x81, 0xffffffffffffff7f}, {0x2, 0x3, 0x32, 0x1}, {0x7, 0x1, 0x1, 0x7ff}, {0x7, 0xffffffffffffffc0, 0x6, 0x8}, {0x9, 0x9, 0x1, 0x1}, {0x100000001, 0x200, 0x9, 0x5}, {0x1, 0x400, 0x1}, {0x3, 0x0, 0x2d, 0xa14}, {0x6, 0xb6, 0x5, 0x8}, {0x162, 0x200000, 0x5, 0x4}, {0x5, 0xfffffffffffffffd, 0x8, 0x1}], 0x80}}}, @mac={'mac\x00', 0x10, {{@dev={[], 0x27}}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x5, 'system_u:object_r:ssh_keysign_exec_t:s0\x00'}}}, @arpreply={'arpreply\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}]}, 0x850) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) pipe2(&(0x7f0000000280), 0x84800) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) setrlimit(0x7, &(0x7f0000000080)={0x7, 0x4}) socket$nl_route(0x10, 0x3, 0x0) 12:07:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 195.886634][ T8252] binder: 8251:8252 transaction failed 29201/-71, size 0-0 line 2900 [ 195.895238][ T8241] libceph: parse_ips bad ip '.u [ 195.895238][ T8241] :d]:.,[' [ 195.903475][ T8252] binder: BINDER_SET_CONTEXT_MGR already set [ 195.915230][ T8245] vivid-001: Tx RGB Quantization Range: Automatic [ 195.921011][ T8255] binder: tried to use weak ref as strong ref [ 195.929357][ T8252] binder: 8251:8252 ioctl 40046207 0 returned -16 [ 195.947961][ T8245] vivid-001: Transmit Mode: HDMI [ 195.954127][ T8245] vivid-001: ================== END STATUS ================== [ 195.962579][ T8255] binder: 8251:8255 Release 1 refcount change on invalid ref 0 ret -22 [ 195.987152][ T8255] binder: 8251:8255 got reply transaction with no transaction stack 12:07:17 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:17 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'gre0\x00\x00\x00\xf5\xff\x03\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x50) [ 195.996400][ T8255] binder: 8251:8255 transaction failed 29201/-71, size 0-0 line 2900 [ 196.035020][ T7945] binder: undelivered TRANSACTION_ERROR: 29201 [ 196.046401][ T7945] binder: undelivered TRANSACTION_ERROR: 29201 [ 196.097724][ T8267] encrypted_key: master key parameter is missing 12:07:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x31, &(0x7f00000001c0)='&\x9bsecurityvboxnet0mime_typeppp1mime_type{em1ppp1\x00'}, 0x30) 12:07:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:17 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 196.142717][ T8268] encrypted_key: master key parameter is missing [ 196.202794][ T8280] sock: sock_set_timeout: `syz-executor.3' (pid 8280) tries to set negative timeout [ 196.237608][ T8282] libceph: resolve '.u [ 196.237608][ T8282] ' (ret=-3): failed [ 196.285117][ T8282] libceph: parse_ips bad ip '.u [ 196.285117][ T8282] :d]:.,[' [ 196.286023][ T8289] sock: sock_set_timeout: `syz-executor.3' (pid 8289) tries to set negative timeout 12:07:18 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x98) [ 196.467253][ T8293] encrypted_key: master key parameter is missing 12:07:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000500)) getpgid(0x0) [ 196.699935][ T8307] libceph: resolve '.u [ 196.699935][ T8307] ' (ret=-3): failed [ 196.715649][ T8307] libceph: parse_ips bad ip '.u [ 196.715649][ T8307] :d]:.,[' 12:07:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x100000000000913, 0x6}, 0x24) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 12:07:18 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000100)) 12:07:18 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) getpgid(0x0) 12:07:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/129, 0x81}], 0x2, 0x0) [ 196.908902][ T8317] libceph: resolve '.u [ 196.908902][ T8317] ' (ret=-3): failed [ 196.915233][ T8319] encrypted_key: master key parameter is missing [ 196.942569][ T8317] libceph: parse_ips bad ip '.u [ 196.942569][ T8317] :d]:.,[' 12:07:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:18 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(0x0) r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x0, 0x0, 0x10000}, 0x20) 12:07:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 197.143881][ T8339] encrypted_key: master key parameter is missing 12:07:19 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:19 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:19 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x401}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8001}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 197.249658][ T8353] libceph: resolve '.u [ 197.249658][ T8353] ' (ret=-3): failed 12:07:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/129, 0x81}], 0x2, 0x0) [ 197.297776][ T8353] libceph: parse_ips bad ip '.u [ 197.297776][ T8353] :d]:.,[' [ 197.374650][ T8359] encrypted_key: master key parameter is missing 12:07:19 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:19 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:19 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:19 executing program 3: syz_emit_ethernet(0x20300ba2, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @dev, @dev}}}}, 0x0) [ 197.605601][ T8377] encrypted_key: master key parameter is missing [ 197.626051][ T8376] libceph: resolve '.u [ 197.626051][ T8376] ' (ret=-3): failed 12:07:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 197.698802][ T8376] libceph: parse_ips bad ip '.u [ 197.698802][ T8376] :d]:.,[' 12:07:19 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:19 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) [ 197.827258][ T8393] encrypted_key: master key parameter is missing 12:07:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:19 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 12:07:19 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 197.934064][ T8404] libceph: resolve '.u [ 197.934064][ T8404] ' (ret=-3): failed [ 197.978624][ T8404] libceph: parse_ips bad ip '.u [ 197.978624][ T8404] :d]:.,[' 12:07:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 12:07:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:19 executing program 1: setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0xfb5, 0x401}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 198.062918][ T8415] encrypted_key: master key parameter is missing 12:07:19 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:20 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) [ 198.235674][ T8428] encrypted_key: master key parameter is missing 12:07:20 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:20 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) r1 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000640), 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 198.437419][ T8441] encrypted_key: master key parameter is missing 12:07:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) 12:07:20 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:20 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") [ 198.692968][ T8467] encrypted_key: insufficient parameters specified 12:07:20 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) 12:07:20 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 198.812948][ T8475] libceph: resolve '.u [ 198.812948][ T8475] ' (ret=-3): failed [ 198.842602][ T8475] libceph: parse_ips bad ip '.u [ 198.842602][ T8475] :d]:.,[' 12:07:20 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) [ 198.915898][ T8487] encrypted_key: insufficient parameters specified 12:07:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) 12:07:20 executing program 4: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 199.124425][ T8503] encrypted_key: insufficient parameters specified 12:07:20 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:21 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) [ 199.385587][ T8516] encrypted_key: master key parameter is missing 12:07:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 12:07:21 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:21 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xa20b, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:21 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) [ 199.831045][ T8528] encrypted_key: master key parameter is missing 12:07:21 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:21 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) [ 199.981991][ T8540] encrypted_key: master key parameter is missing 12:07:21 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 200.089665][ T8550] libceph: resolve '.u [ 200.089665][ T8550] ' (ret=-3): failed 12:07:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 200.134468][ T8550] libceph: parse_ips bad ip '.u [ 200.134468][ T8550] :d]:.,[' [ 200.244600][ T8554] encrypted_key: master key parameter is missing 12:07:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 12:07:22 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) 12:07:22 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:22 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:07:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:22 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:07:22 executing program 1: ioctl(0xffffffffffffffff, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) [ 200.556480][ T8573] libceph: resolve '.u [ 200.556480][ T8573] ' (ret=-3): failed [ 200.574570][ T8569] encrypted_key: master key parameter is missing 12:07:22 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 200.599987][ T8573] libceph: parse_ips bad ip '.u [ 200.599987][ T8573] :d]:.,[' 12:07:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 12:07:22 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getpgid(0x0) 12:07:22 executing program 1: ioctl(0xffffffffffffffff, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") syz_emit_ethernet(0x300b22, &(0x7f0000000080)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @dev, @dev}}}}, 0x0) 12:07:22 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80ff, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x300}], 0x1, 0x0) ftruncate(r0, 0xdf7) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 200.842521][ T8589] encrypted_key: master key parameter is missing [ 200.897989][ T8595] libceph: resolve '.u [ 200.897989][ T8595] ' (ret=-3): failed