[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.624087][ T26] audit: type=1800 audit(1569726684.368:25): pid=8401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 51.664157][ T26] audit: type=1800 audit(1569726684.378:26): pid=8401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 51.707056][ T26] audit: type=1800 audit(1569726684.378:27): pid=8401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.11' (ECDSA) to the list of known hosts. 2019/09/29 03:11:36 fuzzer started 2019/09/29 03:11:37 dialing manager at 10.128.0.26:45535 2019/09/29 03:11:37 syscalls: 2496 2019/09/29 03:11:37 code coverage: enabled 2019/09/29 03:11:37 comparison tracing: enabled 2019/09/29 03:11:37 extra coverage: extra coverage is not supported by the kernel 2019/09/29 03:11:37 setuid sandbox: enabled 2019/09/29 03:11:37 namespace sandbox: enabled 2019/09/29 03:11:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/29 03:11:37 fault injection: enabled 2019/09/29 03:11:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/29 03:11:37 net packet injection: enabled 2019/09/29 03:11:37 net device setup: enabled 03:13:21 executing program 0: 03:13:21 executing program 1: syzkaller login: [ 168.894495][ T8571] IPVS: ftp: loaded support on port[0] = 21 [ 169.053620][ T8571] chnl_net:caif_netlink_parms(): no params data found [ 169.097524][ T8571] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.105180][ T8571] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.113137][ T8571] device bridge_slave_0 entered promiscuous mode [ 169.122111][ T8571] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.129389][ T8571] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.137452][ T8571] device bridge_slave_1 entered promiscuous mode [ 169.157768][ T8571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.168496][ T8571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.180412][ T8574] IPVS: ftp: loaded support on port[0] = 21 [ 169.198963][ T8571] team0: Port device team_slave_0 added 03:13:21 executing program 2: [ 169.222586][ T8571] team0: Port device team_slave_1 added [ 169.327909][ T8571] device hsr_slave_0 entered promiscuous mode 03:13:22 executing program 3: [ 169.425564][ T8571] device hsr_slave_1 entered promiscuous mode [ 169.484187][ T8571] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.491380][ T8571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.499114][ T8571] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.506206][ T8571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.548439][ T8576] IPVS: ftp: loaded support on port[0] = 21 [ 169.596381][ T8579] IPVS: ftp: loaded support on port[0] = 21 03:13:22 executing program 4: [ 169.709716][ T8571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.816288][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.836744][ T2829] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.855801][ T2829] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.864699][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 169.878123][ T8571] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.912776][ T8576] chnl_net:caif_netlink_parms(): no params data found [ 169.924035][ T8574] chnl_net:caif_netlink_parms(): no params data found [ 169.988275][ T8583] IPVS: ftp: loaded support on port[0] = 21 [ 170.027350][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 03:13:22 executing program 5: [ 170.036218][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.043273][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.052874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.061616][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.068734][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.077496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.086652][ T8579] chnl_net:caif_netlink_parms(): no params data found [ 170.126374][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.137265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.198221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.209847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.223049][ T8576] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.232570][ T8576] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.240278][ T8576] device bridge_slave_0 entered promiscuous mode [ 170.247544][ T8574] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.255055][ T8574] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.262566][ T8574] device bridge_slave_0 entered promiscuous mode [ 170.270495][ T8579] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.277773][ T8579] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.285779][ T8579] device bridge_slave_0 entered promiscuous mode [ 170.303125][ T8589] IPVS: ftp: loaded support on port[0] = 21 [ 170.315324][ T8571] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.326684][ T8571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.338577][ T8576] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.345762][ T8576] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.353258][ T8576] device bridge_slave_1 entered promiscuous mode [ 170.366078][ T8574] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.373123][ T8574] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.383547][ T8574] device bridge_slave_1 entered promiscuous mode [ 170.390893][ T8579] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.398038][ T8579] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.405693][ T8579] device bridge_slave_1 entered promiscuous mode [ 170.421297][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.430421][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.450428][ T8576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.483015][ T8579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.500483][ T8576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.521479][ T8579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.536589][ T8574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.548037][ T8574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.580634][ T8576] team0: Port device team_slave_0 added [ 170.592832][ T8579] team0: Port device team_slave_0 added [ 170.613193][ T8571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.647960][ T8576] team0: Port device team_slave_1 added [ 170.664393][ T8579] team0: Port device team_slave_1 added [ 170.671052][ T8574] team0: Port device team_slave_0 added [ 170.700517][ T8574] team0: Port device team_slave_1 added [ 170.717125][ T8583] chnl_net:caif_netlink_parms(): no params data found [ 170.777123][ T8576] device hsr_slave_0 entered promiscuous mode [ 170.814537][ T8576] device hsr_slave_1 entered promiscuous mode [ 170.854358][ T8576] debugfs: Directory 'hsr0' with parent '/' already present! [ 170.896918][ T8579] device hsr_slave_0 entered promiscuous mode [ 170.918305][ T8579] device hsr_slave_1 entered promiscuous mode [ 170.975010][ T8579] debugfs: Directory 'hsr0' with parent '/' already present! 03:13:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syncfs(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000280)="4d41e4259c53fb4ccb9f7b47922d428194a65aa0f53707cf14771af9de342d8d79c3803169f5d66b553cae5ca086b1afaacf375820b7d014c784df54deab6c86322c80bc44ca039e02bdf96ce66cf933be836ac8a41211fe218a2d5887051a") syz_extract_tcp_res(&(0x7f0000000000), 0x10001, 0x8) pipe(&(0x7f00000001c0)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x62, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) select(0x0, 0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000100)={0x8, 0xffff, 0x5, 0x0, 0xffffffff80000001, 0x7}, &(0x7f0000000200)={r4}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, 0x0) socket(0x0, 0x40d, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 171.076901][ T8574] device hsr_slave_0 entered promiscuous mode [ 171.087970][ T8574] device hsr_slave_1 entered promiscuous mode [ 171.098842][ T8599] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 171.143996][ T8574] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.159192][ T8576] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.166291][ T8576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.173582][ T8576] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.180688][ T8576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.203336][ T8583] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.218937][ T8583] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.229117][ T8583] device bridge_slave_0 entered promiscuous mode [ 171.279475][ T8589] chnl_net:caif_netlink_parms(): no params data found [ 171.301629][ T8574] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.308748][ T8574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.316154][ T8574] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.323219][ T8574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.332935][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.342220][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.350872][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.358510][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.370659][ T8583] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.377823][ T8583] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.386599][ T8583] device bridge_slave_1 entered promiscuous mode [ 171.448111][ T8583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.470628][ T8583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.497030][ T8589] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.508390][ T8589] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.516273][ T8589] device bridge_slave_0 entered promiscuous mode [ 171.530236][ T8579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.547039][ T8589] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.554321][ T8589] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.562061][ T8589] device bridge_slave_1 entered promiscuous mode [ 171.581408][ T8589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.596940][ T8583] team0: Port device team_slave_0 added [ 171.611415][ T8583] team0: Port device team_slave_1 added [ 171.675714][ T8583] device hsr_slave_0 entered promiscuous mode [ 171.734138][ T8583] device hsr_slave_1 entered promiscuous mode [ 171.784183][ T8583] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.792965][ T8589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.809831][ T8579] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.830574][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.838306][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.849113][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.857684][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.866382][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.873544][ T8586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.882310][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.936922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.951055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.970374][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.977589][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 03:13:24 executing program 0: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x12102, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x148) [ 171.992965][ T8589] team0: Port device team_slave_0 added [ 172.020733][ T8574] 8021q: adding VLAN 0 to HW filter on device bond0 03:13:24 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff691) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 172.046124][ T8589] team0: Port device team_slave_1 added [ 172.065712][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.084593][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:13:24 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff611) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 172.093330][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.105934][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.122815][ T8579] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 172.133475][ T8579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.151279][ T8576] 8021q: adding VLAN 0 to HW filter on device bond0 03:13:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) close(r0) [ 172.201377][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.211212][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.220081][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.243710][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.253971][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.262447][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.271913][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:13:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) [ 172.336988][ T8589] device hsr_slave_0 entered promiscuous mode [ 172.367304][ T8620] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 172.394536][ T8589] device hsr_slave_1 entered promiscuous mode [ 172.411457][ T7] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 172.418793][ T7] in_atomic(): 0, irqs_disabled(): 0, pid: 7, name: kworker/u4:0 [ 172.430785][ T7] 3 locks held by kworker/u4:0/7: [ 172.436095][ T7] #0: ffff888216751ba8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 172.444035][ T8589] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.451186][ T7] #1: ffff8880a98a7dc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 172.467185][ T7] #2: ffff8880646a2c90 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 172.477197][ T7] CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.3.0+ #0 [ 172.484227][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.494292][ T7] Workqueue: kstrp strp_work [ 172.498871][ T7] Call Trace: [ 172.502199][ T7] dump_stack+0x172/0x1f0 [ 172.506533][ T7] __cant_sleep.cold+0xa4/0xbc [ 172.511288][ T7] kcm_parse_func_strparser+0x54/0x200 [ 172.516724][ T7] ? memset+0x32/0x40 [ 172.520686][ T7] __strp_recv+0x5dc/0x1b80 [ 172.525179][ T7] ? __kasan_check_read+0x11/0x20 [ 172.530215][ T7] strp_recv+0xcf/0x110 [ 172.534353][ T7] tcp_read_sock+0x285/0xa00 [ 172.538932][ T7] ? strp_process+0xf0/0xf0 [ 172.543416][ T7] ? compat_tcp_getsockopt+0x80/0x80 [ 172.548681][ T7] ? mark_held_locks+0xa4/0xf0 [ 172.553449][ T7] ? __local_bh_enable_ip+0x15a/0x270 [ 172.558799][ T7] ? lock_sock_nested+0xe2/0x120 [ 172.563721][ T7] ? compat_tcp_getsockopt+0x80/0x80 [ 172.568985][ T7] strp_read_sock+0x14d/0x200 [ 172.573645][ T7] ? strp_stop+0x40/0x40 [ 172.577918][ T7] ? lock_sock_nested+0xe2/0x120 [ 172.582922][ T7] strp_work+0xe3/0x130 [ 172.587494][ T7] process_one_work+0x9af/0x1740 [ 172.592416][ T7] ? pwq_dec_nr_in_flight+0x320/0x320 [ 172.597773][ T7] ? lock_acquire+0x190/0x410 [ 172.602445][ T7] worker_thread+0x98/0xe40 [ 172.606935][ T7] kthread+0x361/0x430 [ 172.610991][ T7] ? process_one_work+0x1740/0x1740 [ 172.616186][ T7] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 172.622405][ T7] ret_from_fork+0x24/0x30 [ 172.627352][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:13:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) [ 172.650718][ T8574] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.668662][ T8576] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.690328][ T8579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.711032][ T8583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.765032][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.780056][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.789293][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.798468][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.818904][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.828110][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.837059][ T2829] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.844153][ T2829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.851738][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.860639][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.869094][ T2829] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.876150][ T2829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.883598][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.892170][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.900409][ T2829] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.907495][ T2829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.915108][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.923493][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.931865][ T2829] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.938912][ T2829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.946574][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.990662][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.001523][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.010476][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.020986][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.029654][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.038318][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.046684][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.056014][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.066137][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.075173][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.083519][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.091858][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.100231][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.109297][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.117884][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.126374][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.134803][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.143267][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.151051][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.160895][ T8576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.174559][ T8574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.189712][ T8574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.216712][ T8583] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.223722][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.242273][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.268232][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.281926][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.298889][ T8589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.331557][ T8574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.339178][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.355940][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.364739][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.371769][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.379531][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.388153][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.396588][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.403604][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.411150][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.419596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.440239][ T8576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.451530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.461913][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.477140][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.487740][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.496915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.506012][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.514673][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.523691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.533404][ T8589] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.557890][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.566690][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.578126][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.585212][ T8586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.595555][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.604132][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.612371][ T8586] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.619441][ T8586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.627576][ T8586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.643364][ T8583] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 173.654503][ T8583] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.682498][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.692376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.700833][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 03:13:26 executing program 1: [ 173.710619][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.723085][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.744138][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.752535][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.761705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.785642][ T8583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.803715][ T8589] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 173.834018][ T8589] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.868502][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:13:26 executing program 2: 03:13:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) [ 173.878607][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.911608][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.934915][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.943389][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.955904][ T8649] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 173.970463][ T8649] in_atomic(): 0, irqs_disabled(): 0, pid: 8649, name: kworker/u4:5 [ 173.978983][ T8649] 3 locks held by kworker/u4:5/8649: [ 173.986070][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.994101][ T8649] #0: ffff888216751ba8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 174.003850][ T8649] #1: ffff8880624dfdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 174.015617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.024148][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.029336][ T8649] #2: ffff8880646a2c90 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 174.032566][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.049065][ T8649] CPU: 1 PID: 8649 Comm: kworker/u4:5 Tainted: G W 5.3.0+ #0 [ 174.057868][ T8649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.063538][ T8589] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.067996][ T8649] Workqueue: kstrp strp_work [ 174.068004][ T8649] Call Trace: [ 174.068022][ T8649] dump_stack+0x172/0x1f0 [ 174.068043][ T8649] __cant_sleep.cold+0xa4/0xbc [ 174.068061][ T8649] kcm_parse_func_strparser+0x54/0x200 [ 174.068076][ T8649] ? memset+0x32/0x40 [ 174.082739][ T8649] __strp_recv+0x5dc/0x1b80 [ 174.082753][ T8649] ? __kasan_check_read+0x11/0x20 [ 174.082777][ T8649] strp_recv+0xcf/0x110 [ 174.115192][ T8649] tcp_read_sock+0x285/0xa00 [ 174.119789][ T8649] ? strp_process+0xf0/0xf0 [ 174.124308][ T8649] ? compat_tcp_getsockopt+0x80/0x80 [ 174.129606][ T8649] ? mark_held_locks+0xa4/0xf0 [ 174.134389][ T8649] ? __local_bh_enable_ip+0x15a/0x270 [ 174.139878][ T8649] ? lock_sock_nested+0xe2/0x120 [ 174.144924][ T8649] ? compat_tcp_getsockopt+0x80/0x80 [ 174.150218][ T8649] strp_read_sock+0x14d/0x200 [ 174.154904][ T8649] ? strp_stop+0x40/0x40 [ 174.159167][ T8649] ? lock_sock_nested+0xe2/0x120 [ 174.164118][ T8649] strp_work+0xe3/0x130 [ 174.168287][ T8649] process_one_work+0x9af/0x1740 [ 174.173249][ T8649] ? pwq_dec_nr_in_flight+0x320/0x320 [ 174.178628][ T8649] ? lock_acquire+0x190/0x410 [ 174.183355][ T8649] worker_thread+0x98/0xe40 [ 174.188026][ T8649] ? trace_hardirqs_on+0x67/0x240 [ 174.193075][ T8649] kthread+0x361/0x430 [ 174.197154][ T8649] ? process_one_work+0x1740/0x1740 [ 174.202367][ T8649] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 174.208708][ T8649] ret_from_fork+0x24/0x30 03:13:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x00\x01\xd8\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000040)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z', 0xfff7ffffffffffdb}) 03:13:27 executing program 3: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0x82dc, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0xfffffffffffffffe, 0x0, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x802, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r2, r3, 0x0, 0x80000001) 03:13:27 executing program 1: 03:13:27 executing program 2: 03:13:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:27 executing program 5: 03:13:27 executing program 1: [ 174.453016][ T8674] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.460738][ T8674] bridge0: port 1(bridge_slave_0) entered disabled state 03:13:27 executing program 1: 03:13:27 executing program 2: 03:13:27 executing program 5: 03:13:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:27 executing program 5: 03:13:27 executing program 4: 03:13:27 executing program 2: 03:13:27 executing program 1: 03:13:27 executing program 5: 03:13:27 executing program 3: 03:13:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:27 executing program 1: 03:13:27 executing program 3: 03:13:27 executing program 5: 03:13:27 executing program 2: 03:13:27 executing program 4: 03:13:28 executing program 3: 03:13:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:28 executing program 5: 03:13:28 executing program 2: 03:13:28 executing program 1: 03:13:28 executing program 4: 03:13:28 executing program 3: 03:13:28 executing program 5: 03:13:28 executing program 4: 03:13:28 executing program 2: 03:13:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:28 executing program 4: 03:13:28 executing program 1: 03:13:28 executing program 3: 03:13:28 executing program 5: 03:13:28 executing program 2: 03:13:28 executing program 1: 03:13:28 executing program 3: 03:13:28 executing program 2: 03:13:28 executing program 4: 03:13:28 executing program 5: 03:13:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:28 executing program 1: 03:13:28 executing program 3: 03:13:28 executing program 4: 03:13:28 executing program 2: 03:13:29 executing program 3: 03:13:29 executing program 5: 03:13:29 executing program 1: 03:13:29 executing program 2: 03:13:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write(r1, &(0x7f0000000080)="002862b42ddcd93a5b486f8d26111ac4", 0xffffffef) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:13:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 03:13:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000400000000000000000000009500000000000000a99aa79dd70707afb9cba8267c6549"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 176.559623][ C1] hrtimer: interrupt took 27738 ns 03:13:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd3"]}, 0x18}}, 0x0) listen(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) [ 176.651394][ T8796] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:13:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd3"]}, 0x18}}, 0x0) listen(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) 03:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) [ 176.921452][ T2578] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 176.956165][ T2578] in_atomic(): 0, irqs_disabled(): 0, pid: 2578, name: kworker/u4:4 [ 177.004249][ T2578] 3 locks held by kworker/u4:4/2578: [ 177.023347][ T2578] #0: ffff888216751ba8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 177.064903][ T2578] #1: ffff8880a1c1fdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 177.106782][ T2578] #2: ffff8880624b0c90 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 177.140942][ T2578] CPU: 1 PID: 2578 Comm: kworker/u4:4 Tainted: G W 5.3.0+ #0 [ 177.149645][ T2578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.159708][ T2578] Workqueue: kstrp strp_work [ 177.159717][ T2578] Call Trace: [ 177.159735][ T2578] dump_stack+0x172/0x1f0 [ 177.159754][ T2578] __cant_sleep.cold+0xa4/0xbc [ 177.159772][ T2578] kcm_parse_func_strparser+0x54/0x200 [ 177.159782][ T2578] ? memset+0x32/0x40 [ 177.176796][ T2578] __strp_recv+0x5dc/0x1b80 [ 177.176813][ T2578] ? __kasan_check_read+0x11/0x20 [ 177.176840][ T2578] strp_recv+0xcf/0x110 [ 177.176860][ T2578] tcp_read_sock+0x285/0xa00 [ 177.186431][ T2578] ? strp_process+0xf0/0xf0 [ 177.186450][ T2578] ? compat_tcp_getsockopt+0x80/0x80 [ 177.186466][ T2578] ? mark_held_locks+0xa4/0xf0 [ 177.186482][ T2578] ? __local_bh_enable_ip+0x15a/0x270 [ 177.186497][ T2578] ? lock_sock_nested+0xe2/0x120 [ 177.186512][ T2578] ? compat_tcp_getsockopt+0x80/0x80 [ 177.186527][ T2578] strp_read_sock+0x14d/0x200 [ 177.186542][ T2578] ? strp_stop+0x40/0x40 [ 177.186560][ T2578] ? lock_sock_nested+0xe2/0x120 [ 177.186577][ T2578] strp_work+0xe3/0x130 03:13:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x10154, 0x20008081, &(0x7f0000000200)=@file={0x0, './file0/file0\x00'}, 0x6d) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, 0x0) 03:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:30 executing program 4: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 177.186596][ T2578] process_one_work+0x9af/0x1740 [ 177.186620][ T2578] ? pwq_dec_nr_in_flight+0x320/0x320 [ 177.186638][ T2578] ? lock_acquire+0x190/0x410 [ 177.205001][ T2578] worker_thread+0x98/0xe40 [ 177.205016][ T2578] ? trace_hardirqs_on+0x67/0x240 [ 177.205046][ T2578] kthread+0x361/0x430 [ 177.205061][ T2578] ? process_one_work+0x1740/0x1740 [ 177.205078][ T2578] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 177.293652][ T2578] ret_from_fork+0x24/0x30 [ 177.368685][ T8847] tty_tiocsserial: 'syz-executor.4' is using deprecated serial flags (with no effect): 00000200 03:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:30 executing program 4: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x28) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) open$dir(&(0x7f0000000180)='./file0\x00', 0x1000000841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, 0x0) 03:13:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 03:13:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x5) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic, @nested={0x4, 0x1}]}, 0x18}}, 0x0) listen(r0, 0x5) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) 03:13:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ppoll(&(0x7f00000001c0)=[{}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x5) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic, @nested={0x4, 0x1}]}, 0x18}}, 0x0) listen(r0, 0x5) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) 03:13:30 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) [ 177.922289][ T8892] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. 03:13:30 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x4000, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000013003586000000030000000007000000", @ANYRES32, @ANYBLOB="02000005000023000c001a0008000200c1000400"], 0x2c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 03:13:30 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x2081ff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 03:13:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:30 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 178.155370][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 178.155384][ T26] audit: type=1804 audit(1569726810.898:31): pid=8911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir373079531/syzkaller.4OdLqH/14/bus" dev="sda1" ino=16551 res=1 03:13:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) [ 178.373205][ T26] audit: type=1804 audit(1569726811.118:32): pid=8917 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir373079531/syzkaller.4OdLqH/14/bus" dev="sda1" ino=16551 res=1 03:13:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ppoll(&(0x7f00000001c0)=[{}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:31 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0207000010000000000000000000000008001200000001000000000000000000f9ffffffffffffff0000000000000200e0a6c9b80df5b85b40000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500010000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 03:13:31 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:31 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='\xa6\xc4\xbcQ7\x9f\xf0\xe3\xd1\xd0\xac\x1a\x0f\x06\xd1\x92\xc7jp\x02=\x94\x95Iz\xfd\x15jQ\xbc7\xb6\x9a\x89\xea\xda\xf3(\xa3x\\\x99U\"\\%\xeb\xbf<+\x1d\xb50n\x86~\x80\xf5\xbfa\xa8Y\x8c\xc5C\xe5\xa1g\r\x957\xfb\x90\xb5\xc6\xa6\xf6V\x8f\xb6\xf4|\xa3\x9f\x88\xf5q{?\x97H\xd5\x11n\x00T5D\xf9\xbfV\xe6\xa3X\xdd)bT\xe6Z,X(\xf1\xecPi\x98\xf8\x03\x00%\x9a\x98\x95\x11\t3\xae\xa2\xc7\xc3\xbaPF\x15\x80M\xb1\xe5\xa2\xbf\xbe=\xaa\x87\xc4.\xb9\xb9\xac\x82\xd7\x1c\xf4\xb4j\xc24E\x80\x91\xea\xb3v\xdd@\x05\xddO\xd6\xd9B\xc7Y', 0x0, 0x0) 03:13:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:31 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000880)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000a00)=[{0x0}, {&(0x7f0000000900)="a0dee542c503c3ecab934189f79c2b4c664995f75e973128713a30dc4b70a1a10f71139318fee95ee89343da539d4fcf35ea5e7631c905af4336d04c9ef740f0d29804ed0632dbfcd36a34c309d0c4005e3b8367d346bf1f600d6df358bce6727af665598fcd1f87f12bfd01bfef38745854ce8c9277f7f815c369ee158d2c92b214ea71a185c8b81ab682d9b67de37bef5df330b659a946178a6541bfbfb056e3f82f446cd7f8f7123e518cbee94bd20ba46ce9eb586aa37ea732255cd7193af4d3003e32326ec22975aad02bf857901a77272e2e0b8fdaab8e", 0xda}], 0x2, &(0x7f0000001f00)=[@dontfrag={{0x14}}, @dontfrag={{0x14}}], 0x30}}], 0x2, 0x48000) 03:13:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:31 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ppoll(&(0x7f00000001c0)=[{}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:32 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000f660102d000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:13:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:32 executing program 3: 03:13:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:32 executing program 3: 03:13:32 executing program 4: 03:13:32 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:32 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:32 executing program 4: 03:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:33 executing program 3: 03:13:33 executing program 4: 03:13:33 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:33 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:33 executing program 4: 03:13:33 executing program 3: 03:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:33 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:33 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:33 executing program 3: 03:13:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:33 executing program 4: 03:13:33 executing program 3: 03:13:33 executing program 4: 03:13:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:33 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:33 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) 03:13:33 executing program 4: 03:13:33 executing program 3: 03:13:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:34 executing program 3: 03:13:34 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) 03:13:34 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:34 executing program 4: 03:13:34 executing program 3: 03:13:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r0, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:34 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) 03:13:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:34 executing program 4: 03:13:34 executing program 3: 03:13:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:34 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:34 executing program 4: 03:13:34 executing program 3: 03:13:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:34 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:34 executing program 3: 03:13:34 executing program 4: 03:13:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:13:34 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000000000000000400000000000000000000000000100000000000000003800020000000000000003000000"], 0x44) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:13:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) 03:13:35 executing program 3: 03:13:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f00000000c0)="f2a6bad004b00fadad0f0966b8090000000f23d80f21f86635c00000400f23f836f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x3f}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:13:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000004000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)='_', 0x100000}], 0x1}, 0x0) 03:13:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0)