[ 38.919137][ T26] audit: type=1800 audit(1554686582.752:25): pid=7749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.958517][ T26] audit: type=1800 audit(1554686582.752:26): pid=7749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.990583][ T26] audit: type=1800 audit(1554686582.752:27): pid=7749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2019/04/08 01:23:19 fuzzer started 2019/04/08 01:23:23 dialing manager at 10.128.0.26:34543 2019/04/08 01:23:23 syscalls: 2408 2019/04/08 01:23:23 code coverage: enabled 2019/04/08 01:23:23 comparison tracing: enabled 2019/04/08 01:23:23 extra coverage: extra coverage is not supported by the kernel 2019/04/08 01:23:23 setuid sandbox: enabled 2019/04/08 01:23:23 namespace sandbox: enabled 2019/04/08 01:23:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/08 01:23:23 fault injection: enabled 2019/04/08 01:23:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/08 01:23:23 net packet injection: enabled 2019/04/08 01:23:23 net device setup: enabled 01:25:36 executing program 0: syzkaller login: [ 192.439702][ T7937] IPVS: ftp: loaded support on port[0] = 21 01:25:36 executing program 1: [ 192.588171][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 192.677999][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.686579][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.699469][ T7937] device bridge_slave_0 entered promiscuous mode [ 192.711320][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.719234][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.727270][ T7937] device bridge_slave_1 entered promiscuous mode [ 192.743365][ T7940] IPVS: ftp: loaded support on port[0] = 21 [ 192.759069][ T7937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.771453][ T7937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 192.801088][ T7937] team0: Port device team_slave_0 added [ 192.811050][ T7937] team0: Port device team_slave_1 added 01:25:36 executing program 2: [ 192.892319][ T7937] device hsr_slave_0 entered promiscuous mode [ 192.938763][ T7937] device hsr_slave_1 entered promiscuous mode [ 193.002394][ T7942] IPVS: ftp: loaded support on port[0] = 21 [ 193.017950][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.025353][ T7937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.033382][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.040549][ T7937] bridge0: port 1(bridge_slave_0) entered forwarding state 01:25:36 executing program 3: [ 193.177558][ T7940] chnl_net:caif_netlink_parms(): no params data found [ 193.202214][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.241250][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.254211][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.267109][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.295220][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.305947][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 193.357452][ T7945] IPVS: ftp: loaded support on port[0] = 21 [ 193.394043][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 01:25:37 executing program 4: [ 193.406265][ T3628] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.413470][ T3628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.425189][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.434032][ T3628] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.441185][ T3628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.514947][ T7942] chnl_net:caif_netlink_parms(): no params data found [ 193.553273][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.563146][ T7940] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.575058][ T7940] device bridge_slave_0 entered promiscuous mode [ 193.586613][ T261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.596114][ T261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.618847][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.626056][ T7940] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.639738][ T7940] device bridge_slave_1 entered promiscuous mode [ 193.660585][ T7937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 193.681719][ T7937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.702188][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 01:25:37 executing program 5: [ 193.714769][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.724888][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.737994][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.747493][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.762494][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.783157][ T7940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.821112][ T7940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.858013][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.893600][ T7949] IPVS: ftp: loaded support on port[0] = 21 [ 193.924336][ T7951] IPVS: ftp: loaded support on port[0] = 21 [ 193.966215][ T7940] team0: Port device team_slave_0 added [ 193.975036][ T7940] team0: Port device team_slave_1 added [ 193.992313][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.000604][ T7942] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.009617][ T7942] device bridge_slave_0 entered promiscuous mode 01:25:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r0, r1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0xc, 0x4) [ 194.089645][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.096785][ T7942] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.106411][ T7942] device bridge_slave_1 entered promiscuous mode 01:25:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000000180)="0001000000005a1c800047c3e7f75f1f15601de8cc9401aaf077434dc2df9d0737c54e1b8066119f1fac8863e0a5b9b166bbcff70d00e18f0c000000ed4e8d7a8863bbe1152600c53fcba87cd584c020a16023f21ffe1816db5d0fddf431a9a60228f00f3910b1c14cb4da5f872ab8ff3fedd8ac5ef47679c423d12c75c72255dfb657201a078d0900000024", 0x8c, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 194.180610][ T7940] device hsr_slave_0 entered promiscuous mode [ 194.238971][ T7940] device hsr_slave_1 entered promiscuous mode [ 194.279062][ T7945] chnl_net:caif_netlink_parms(): no params data found [ 194.306063][ T7942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.343996][ T7942] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:25:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 194.420830][ T7942] team0: Port device team_slave_0 added [ 194.453032][ T7942] team0: Port device team_slave_1 added [ 194.511579][ T7942] device hsr_slave_0 entered promiscuous mode [ 194.548749][ T7942] device hsr_slave_1 entered promiscuous mode [ 194.600429][ T7945] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.607571][ T7945] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.615643][ T7945] device bridge_slave_0 entered promiscuous mode [ 194.627208][ T7945] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.635704][ T7945] bridge0: port 2(bridge_slave_1) entered disabled state 01:25:38 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$mouse(0x0, 0x0, 0x6000) [ 194.644011][ T7945] device bridge_slave_1 entered promiscuous mode [ 194.670370][ C1] hrtimer: interrupt took 35245 ns 01:25:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3736030000000000, 0xfeff0000]}, @empty, @loopback}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr=0x80d, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) setresuid(0x0, 0xee01, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 194.798297][ T7945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.850572][ T7945] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.864250][ T7951] chnl_net:caif_netlink_parms(): no params data found [ 194.908159][ T7945] team0: Port device team_slave_0 added [ 194.925413][ T7949] chnl_net:caif_netlink_parms(): no params data found 01:25:38 executing program 0: r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x2) [ 195.017219][ T7945] team0: Port device team_slave_1 added [ 195.040042][ T7940] 8021q: adding VLAN 0 to HW filter on device bond0 01:25:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, "5103315ddd66a05659abba501058afad513c46719d6ee5f310ab64c24408c1e5e380145a9118754058c934e5d8425a4379145540521f02835fbf5901a86267ae", "d52796f0dd67902068d6399a4883f7381bb595d40aaa302228475c7a01e80d15754353393c75e6e0aafa2f76b72c22b26d2bbd131da2183b1f2bf312354542cc", "c888873abad1fdd7b8997d312639d66ef0e484c4b99872fb703de96f2d4902c8"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c03, 0xffffffffffffffff) [ 195.102916][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.117098][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.127766][ T7951] device bridge_slave_0 entered promiscuous mode [ 195.142832][ T7940] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.196096][ T7945] device hsr_slave_0 entered promiscuous mode [ 195.250487][ T7945] device hsr_slave_1 entered promiscuous mode [ 195.311916][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.322661][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.331860][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.339941][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.347660][ T7951] device bridge_slave_1 entered promiscuous mode [ 195.378979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.388050][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.398121][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.405524][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.414669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.432329][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.440245][ T7949] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.448049][ T7949] device bridge_slave_0 entered promiscuous mode [ 195.463590][ T7951] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.479822][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.486986][ T7949] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.495325][ T7949] device bridge_slave_1 entered promiscuous mode [ 195.504391][ T7951] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.519038][ T7942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.532628][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.541389][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.549909][ T3628] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.557047][ T3628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.564799][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.591149][ T7949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.606816][ T7949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.626250][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.634605][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.654520][ T7951] team0: Port device team_slave_0 added [ 195.662893][ T7951] team0: Port device team_slave_1 added [ 195.672873][ T7942] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.690999][ T7949] team0: Port device team_slave_0 added [ 195.705276][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.713866][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.722922][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.731492][ T3628] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.738672][ T3628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.747074][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.782412][ T7949] team0: Port device team_slave_1 added [ 195.797730][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.810781][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.819640][ T3628] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.826692][ T3628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.834905][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.844055][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.852979][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.862070][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.870864][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.879581][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.887795][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.896391][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.904596][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.913206][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.921385][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.930873][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.942066][ T7942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.011009][ T7951] device hsr_slave_0 entered promiscuous mode [ 196.049070][ T7951] device hsr_slave_1 entered promiscuous mode [ 196.097174][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.106339][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.117611][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.126257][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.134884][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.143502][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.151799][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.160000][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.180510][ T7942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.230227][ T7949] device hsr_slave_0 entered promiscuous mode [ 196.279282][ T7949] device hsr_slave_1 entered promiscuous mode [ 196.319793][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.383634][ T7945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.433250][ T7940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.445479][ T7945] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.455944][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.464567][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:25:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000480)) r2 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 01:25:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) [ 196.529930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.540909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.550757][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.557846][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.567751][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.579568][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.588182][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.595369][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.603038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.612663][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.622233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.631021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.639971][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.648049][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.849323][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.858093][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.866863][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.875324][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.891736][ T7945] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.903600][ T7945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.914767][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.924035][ T2978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.957730][ T7951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.984741][ T7945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.014184][ T7949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.026771][ T7951] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.038121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.047821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.066461][ T7949] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.088748][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.097675][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 01:25:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) close(r1) [ 197.112606][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.121325][ T7989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.131794][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.156514][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.166792][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.183790][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.194300][ T7989] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.201574][ T7989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.219326][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.228272][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.242973][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.262424][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.276965][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.286385][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.299155][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.307448][ T7989] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.314597][ T7989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.322858][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.331905][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.350801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.358824][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.366724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.376036][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.385684][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.392959][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.401474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.410066][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.418732][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.432119][ T7951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.444925][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.454635][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.463854][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.472358][ T7989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.498285][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.512828][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.522435][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.531637][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.540667][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.549033][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.557625][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.566787][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.575545][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.589031][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.611811][ T7951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.647795][ T7949] 8021q: adding VLAN 0 to HW filter on device batadv0 01:25:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x9, 0x0, &(0x7f0000000040)) 01:25:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000b80)='\x00\xaf1\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfew\xe4\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xc9\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\x1c\n\xb0@mns\x8el\x9b{2\xa7 h\xc7\xac\xfa\xd9!pR\xa8\xcaY%%\xb0\xbc\x85\xd1\x13R0\x94\xeb4\xf3\xb1\xd33\xca*q\x1f\xf6\xc79nUy:\xc2Aw\xf2\xecj\x81\x85\xecW\x17h\x84\xbav\xbd\x0fz\x1bN\x8a\xb1\xf7%\x7f~E\r\xe6\x94\xec\xafU\xa5l4\x17\x89H\xc2\xe5H\xd0\xd7\xa7\xb0\xc8\b\xc0\x19\xe2$|\xd31m\x8a\xb2\xd3\x15\xe9\xbaiM\xef\xf9\x9b7\xf3\x1a\vo\'f\v\x14\x84~\xf4\'s6\x18\x9e\xd6\xb43r\xe50\xe3\x84\xf5\xea\xc2\xda\xcd\xfbXa\xc5') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x0) 01:25:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000200)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") setsockopt$inet_mreq(r1, 0x0, 0x23, 0x0, 0x0) write$nbd(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], 0x1) 01:25:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) 01:25:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 01:25:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="b1", 0x1}], 0x1}, 0x0) 01:25:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x186, 0x0) [ 197.831529][ T8029] check_preemption_disabled: 3 callbacks suppressed [ 197.831553][ T8029] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8029 [ 197.847924][ T8029] caller is ip6_finish_output+0x335/0xdc0 [ 197.853764][ T8029] CPU: 0 PID: 8029 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 197.862813][ T8029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.872907][ T8029] Call Trace: [ 197.876243][ T8029] dump_stack+0x172/0x1f0 [ 197.880591][ T8029] __this_cpu_preempt_check+0x246/0x270 [ 197.886158][ T8029] ip6_finish_output+0x335/0xdc0 [ 197.891113][ T8029] ip6_output+0x235/0x7f0 [ 197.895467][ T8029] ? ip6_finish_output+0xdc0/0xdc0 [ 197.900607][ T8029] ? ip6_fragment+0x3980/0x3980 [ 197.905531][ T8029] ? tipc_mon_rcv+0xde8/0xe40 [ 197.910243][ T8029] ip6_xmit+0xe41/0x20c0 [ 197.914511][ T8029] ? ip6_finish_output2+0x2550/0x2550 [ 197.919902][ T8029] ? mark_held_locks+0xf0/0xf0 [ 197.924697][ T8029] ? ip6_setup_cork+0x1870/0x1870 [ 197.929750][ T8029] ? tipc_mon_rcv+0xd90/0xe40 [ 197.934450][ T8029] inet6_csk_xmit+0x2fb/0x5d0 [ 197.939147][ T8029] ? inet6_csk_update_pmtu+0x190/0x190 [ 197.944631][ T8029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.950906][ T8029] ? csum_ipv6_magic+0x20/0x80 [ 197.957548][ T8029] __tcp_transmit_skb+0x1a32/0x3750 [ 197.957574][ T8029] ? tcp_connect+0x1184/0x4280 [ 197.957599][ T8029] ? __tcp_select_window+0x8b0/0x8b0 [ 197.957614][ T8029] ? lockdep_hardirqs_on+0x418/0x5d0 [ 197.957630][ T8029] ? trace_hardirqs_on+0x67/0x230 [ 197.964409][ T8039] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8039 [ 197.968091][ T8029] ? tcp_rbtree_insert+0x188/0x200 [ 197.968109][ T8029] tcp_connect+0x2e18/0x4280 [ 197.968135][ T8029] ? tcp_push_one+0x110/0x110 [ 197.968152][ T8029] ? secure_tcpv6_ts_off+0x24f/0x360 [ 197.968167][ T8029] ? secure_dccpv6_sequence_number+0x280/0x280 [ 197.968181][ T8029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.968206][ T8029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.981996][ T8039] caller is ip6_finish_output+0x335/0xdc0 [ 197.987122][ T8029] ? prandom_u32_state+0x13/0x180 [ 198.054450][ T8029] tcp_v6_connect+0x150b/0x20a0 [ 198.059332][ T8029] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 198.064663][ T8029] __inet_stream_connect+0x83f/0xea0 [ 198.069974][ T8029] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 198.075273][ T8029] ? __inet_stream_connect+0x83f/0xea0 [ 198.080739][ T8029] ? mark_held_locks+0xa4/0xf0 [ 198.085508][ T8029] ? inet_dgram_connect+0x2e0/0x2e0 [ 198.090716][ T8029] ? lock_sock_nested+0x9a/0x120 [ 198.095668][ T8029] ? trace_hardirqs_on+0x67/0x230 [ 198.100721][ T8029] ? lock_sock_nested+0x9a/0x120 [ 198.106040][ T8029] ? __local_bh_enable_ip+0x15a/0x270 [ 198.111433][ T8029] inet_stream_connect+0x58/0xa0 [ 198.116377][ T8029] __sys_connect+0x266/0x330 [ 198.120988][ T8029] ? __ia32_sys_accept+0xb0/0xb0 [ 198.125941][ T8029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.132585][ T8029] ? put_timespec64+0xda/0x140 [ 198.138042][ T8029] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.144046][ T8029] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.149528][ T8029] ? do_syscall_64+0x26/0x610 [ 198.154211][ T8029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.160278][ T8029] ? do_syscall_64+0x26/0x610 [ 198.164965][ T8029] __x64_sys_connect+0x73/0xb0 [ 198.169739][ T8029] do_syscall_64+0x103/0x610 [ 198.174336][ T8029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.180230][ T8029] RIP: 0033:0x4582b9 [ 198.184126][ T8029] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.203733][ T8029] RSP: 002b:00007fbc05d7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 198.212172][ T8029] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 198.220154][ T8029] RDX: 000000000000001c RSI: 0000000020000100 RDI: 0000000000000003 01:25:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 01:25:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00\x06\xe8\x00a\x9e\xdfl0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x5) dup3(r0, r1, 0x0) 01:25:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) close(r1) [ 198.228240][ T8029] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 198.236233][ T8029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc05d7f6d4 [ 198.244225][ T8029] R13: 00000000004be64c R14: 00000000004cf1e0 R15: 00000000ffffffff [ 198.252247][ T8039] CPU: 1 PID: 8039 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190405 #19 [ 198.261287][ T8039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.271355][ T8039] Call Trace: [ 198.271383][ T8039] dump_stack+0x172/0x1f0 01:25:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x13, &(0x7f0000000400)={@local, @broadcast}, 0xc) [ 198.271406][ T8039] __this_cpu_preempt_check+0x246/0x270 [ 198.271427][ T8039] ip6_finish_output+0x335/0xdc0 [ 198.271450][ T8039] ip6_output+0x235/0x7f0 [ 198.271466][ T8039] ? ip6_finish_output+0xdc0/0xdc0 [ 198.271483][ T8039] ? ip6_fragment+0x3980/0x3980 [ 198.271497][ T8039] ? mark_held_locks+0xa4/0xf0 [ 198.271514][ T8039] ip6_local_out+0xc4/0x1b0 [ 198.271528][ T8039] ip6_send_skb+0xbb/0x350 [ 198.271544][ T8039] ip6_push_pending_frames+0xc8/0xf0 [ 198.271560][ T8039] rawv6_sendmsg+0x299c/0x35e0 [ 198.300077][ T8039] ? rawv6_getsockopt+0x150/0x150 [ 198.300096][ T8039] ? aa_profile_af_perm+0x320/0x320 [ 198.300112][ T8039] ? _copy_from_user+0xdd/0x150 [ 198.300130][ T8039] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 198.300148][ T8039] ? rw_copy_check_uvector+0x2a6/0x330 [ 198.300174][ T8039] ? ___might_sleep+0x163/0x280 [ 198.333840][ T8039] ? __might_sleep+0x95/0x190 [ 198.333874][ T8039] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 198.333895][ T8039] inet_sendmsg+0x147/0x5e0 [ 198.355162][ T8039] ? rawv6_getsockopt+0x150/0x150 01:25:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x40000000010) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000400)={0x6c, r2, 0xc01, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @empty={[0x60]}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) [ 198.355178][ T8039] ? inet_sendmsg+0x147/0x5e0 [ 198.355193][ T8039] ? ipip_gro_receive+0x100/0x100 [ 198.355223][ T8039] sock_sendmsg+0xdd/0x130 [ 198.370308][ T8039] ___sys_sendmsg+0x806/0x930 [ 198.370338][ T8039] ? copy_msghdr_from_user+0x430/0x430 [ 198.370365][ T8039] ? kasan_check_read+0x11/0x20 [ 198.370383][ T8039] ? __fget+0x381/0x550 [ 198.370413][ T8039] ? ksys_dup3+0x3e0/0x3e0 [ 198.384588][ T8039] ? lock_downgrade+0x880/0x880 [ 198.384612][ T8039] ? __fget_light+0x1a9/0x230 [ 198.384629][ T8039] ? __fdget+0x1b/0x20 [ 198.384651][ T8039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.422697][ T8039] __sys_sendmsg+0x105/0x1d0 [ 198.422713][ T8039] ? __ia32_sys_shutdown+0x80/0x80 [ 198.422739][ T8039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.422752][ T8039] ? do_syscall_64+0x26/0x610 [ 198.422768][ T8039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.422782][ T8039] ? do_syscall_64+0x26/0x610 [ 198.422799][ T8039] __x64_sys_sendmsg+0x78/0xb0 [ 198.422833][ T8039] do_syscall_64+0x103/0x610 [ 198.442376][ T8039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.442390][ T8039] RIP: 0033:0x4582b9 [ 198.442405][ T8039] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.442421][ T8039] RSP: 002b:00007fd7e2f6bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.518832][ T8039] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 198.526841][ T8039] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 198.534838][ T8039] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 198.542872][ T8039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7e2f6c6d4 [ 198.550866][ T8039] R13: 00000000004c5279 R14: 00000000004d93f8 R15: 00000000ffffffff 01:25:42 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@initdev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, 0x0) lstat(&(0x7f00000006c0)='./file1/file0\x00', &(0x7f0000000840)) fstat(0xffffffffffffffff, &(0x7f0000000980)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1\x00']) chdir(&(0x7f0000000300)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 198.709301][ T8066] Started in network mode [ 198.714655][ T8068] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8068 [ 198.724309][ T8068] caller is ip6_finish_output+0x335/0xdc0 [ 198.730139][ T8068] CPU: 0 PID: 8068 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 198.739266][ T8068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.749440][ T8068] Call Trace: [ 198.752769][ T8068] dump_stack+0x172/0x1f0 [ 198.757120][ T8068] __this_cpu_preempt_check+0x246/0x270 [ 198.759928][ T8066] Own node identity 6, cluster identity 4711 [ 198.762776][ T8068] ip6_finish_output+0x335/0xdc0 [ 198.762806][ T8068] ip6_output+0x235/0x7f0 [ 198.762850][ T8068] ? ip6_finish_output+0xdc0/0xdc0 [ 198.762892][ T8068] ? ip6_fragment+0x3980/0x3980 [ 198.789952][ T8068] ip6_xmit+0xe41/0x20c0 [ 198.794335][ T8068] ? ip6_finish_output2+0x2550/0x2550 [ 198.797584][ T8066] Enabling of bearer rejected, failed to enable media 01:25:42 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000086dd60182ff900288800fe80000000000000000000000004000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000199000"/94], 0x0) [ 198.799724][ T8068] ? mark_held_locks+0xf0/0xf0 [ 198.799747][ T8068] ? ip6_setup_cork+0x1870/0x1870 [ 198.799783][ T8068] inet6_csk_xmit+0x2fb/0x5d0 [ 198.799800][ T8068] ? inet6_csk_update_pmtu+0x190/0x190 [ 198.799814][ T8068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.799842][ T8068] ? csum_ipv6_magic+0x20/0x80 [ 198.799866][ T8068] __tcp_transmit_skb+0x1a32/0x3750 [ 198.799879][ T8068] ? tcp_connect+0x1184/0x4280 [ 198.799902][ T8068] ? __tcp_select_window+0x8b0/0x8b0 [ 198.855178][ T8068] ? lockdep_hardirqs_on+0x418/0x5d0 [ 198.860568][ T8068] ? trace_hardirqs_on+0x67/0x230 [ 198.865606][ T8068] ? tcp_rbtree_insert+0x188/0x200 [ 198.870732][ T8068] tcp_connect+0x2e18/0x4280 [ 198.875353][ T8068] ? tcp_push_one+0x110/0x110 [ 198.878182][ T8066] Enabling of bearer rejected, failed to enable media [ 198.880259][ T8068] ? secure_tcpv6_ts_off+0x24f/0x360 [ 198.880279][ T8068] ? secure_dccpv6_sequence_number+0x280/0x280 [ 198.880295][ T8068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.880307][ T8068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.880323][ T8068] ? prandom_u32_state+0x13/0x180 [ 198.880342][ T8068] tcp_v6_connect+0x150b/0x20a0 [ 198.880364][ T8068] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 198.880399][ T8068] __inet_stream_connect+0x83f/0xea0 [ 198.880409][ T8068] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 198.880420][ T8068] ? __inet_stream_connect+0x83f/0xea0 [ 198.880435][ T8068] ? mark_held_locks+0xa4/0xf0 [ 198.880453][ T8068] ? inet_dgram_connect+0x2e0/0x2e0 [ 198.880468][ T8068] ? lock_sock_nested+0x9a/0x120 [ 198.880482][ T8068] ? trace_hardirqs_on+0x67/0x230 [ 198.880495][ T8068] ? lock_sock_nested+0x9a/0x120 [ 198.880512][ T8068] ? __local_bh_enable_ip+0x15a/0x270 [ 198.880531][ T8068] inet_stream_connect+0x58/0xa0 [ 198.880547][ T8068] __sys_connect+0x266/0x330 [ 198.880564][ T8068] ? __ia32_sys_accept+0xb0/0xb0 [ 198.880575][ T8068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.880590][ T8068] ? put_timespec64+0xda/0x140 [ 198.880626][ T8068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.899958][ T8068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.917770][ T8068] ? do_syscall_64+0x26/0x610 [ 198.917788][ T8068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.917803][ T8068] ? do_syscall_64+0x26/0x610 [ 198.917826][ T8068] __x64_sys_connect+0x73/0xb0 [ 198.917857][ T8068] do_syscall_64+0x103/0x610 [ 199.002026][ T8068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.002039][ T8068] RIP: 0033:0x4582b9 [ 199.002054][ T8068] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.002061][ T8068] RSP: 002b:00007fbc05d5dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 199.002076][ T8068] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582b9 [ 199.002084][ T8068] RDX: 000000000000001c RSI: 0000000020000100 RDI: 0000000000000004 [ 199.002092][ T8068] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 199.002101][ T8068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc05d5e6d4 [ 199.002110][ T8068] R13: 00000000004be64c R14: 00000000004cf1e0 R15: 00000000ffffffff [ 199.209743][ T8072] overlayfs: filesystem on './file0' not supported as upperdir 01:25:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000700)='ext3\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:25:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) 01:25:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) 01:25:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x40000000010) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000400)={0x6c, r2, 0xc01, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @empty={[0x60]}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x6c}}, 0x0) 01:25:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000009c0)) 01:25:43 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@initdev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, 0x0) lstat(&(0x7f00000006c0)='./file1/file0\x00', &(0x7f0000000840)) fstat(0xffffffffffffffff, &(0x7f0000000980)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1\x00']) chdir(&(0x7f0000000300)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 199.337247][ T8095] Enabling of bearer rejected, failed to enable media 01:25:43 executing program 5: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x7f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0xa48204) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) pread64(r2, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) [ 199.441528][ T8103] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:25:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x114, 0x0) 01:25:43 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) socket$inet6_sctp(0xa, 0x0, 0x84) 01:25:43 executing program 4: capset(&(0x7f00000fc000), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x252, &(0x7f0000000080)={0x0, 0x2ae}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="5500000018007f1de7fe01b2a4a280930a00000000000000000000003900090035000c000600000019000500fe800000000000dc1338d54400009b8413200000008307008daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) socket(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pipe(0x0) sendto$rxrpc(r2, &(0x7f00000001c0)="ddd65dfa3a8cdab652e0c40580512adfcb57a8b040e26a4aa03284048b30522e619d36a9d8fa774e4d9a1c6e7451ebf0c94fc4e48c15f6cece26ec0fc96edc50836cb43d4c155f218448e5d8", 0x4c, 0x91, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) [ 199.651751][ T8103] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:25:43 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x0, {0x3ff}}, 0x18) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe2(&(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)={0xfff}) memfd_create(&(0x7f0000000080)='/dev/hwrng\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 199.825545][ T26] audit: type=1804 audit(1554686743.652:31): pid=8128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir659799945/syzkaller.4XshKU/6/bus" dev="sda1" ino=16538 res=1 [ 199.876104][ T8129] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:25:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") close(r0) [ 199.984556][ T8137] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 01:25:43 executing program 0: 01:25:44 executing program 0: 01:25:44 executing program 0: 01:25:44 executing program 0: 01:25:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0xfffffd33, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\bYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, 0x0, 0xdd) 01:25:44 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) socket$inet6_sctp(0xa, 0x0, 0x84) [ 200.625146][ T26] audit: type=1804 audit(1554686744.452:32): pid=8128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir659799945/syzkaller.4XshKU/6/bus" dev="sda1" ino=16538 res=1 01:25:44 executing program 5: 01:25:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 01:25:44 executing program 1: 01:25:44 executing program 0: 01:25:44 executing program 4: 01:25:44 executing program 2: [ 200.677216][ T26] audit: type=1804 audit(1554686744.482:33): pid=8128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir659799945/syzkaller.4XshKU/6/bus" dev="sda1" ino=16538 res=1 01:25:44 executing program 1: 01:25:44 executing program 0: 01:25:44 executing program 4: 01:25:44 executing program 2: 01:25:44 executing program 3: 01:25:44 executing program 1: 01:25:44 executing program 5: 01:25:44 executing program 0: 01:25:44 executing program 4: 01:25:44 executing program 2: 01:25:44 executing program 3: 01:25:45 executing program 4: 01:25:45 executing program 1: 01:25:45 executing program 5: 01:25:45 executing program 0: 01:25:45 executing program 2: 01:25:45 executing program 5: 01:25:45 executing program 3: 01:25:45 executing program 0: 01:25:45 executing program 1: 01:25:45 executing program 2: 01:25:45 executing program 4: 01:25:45 executing program 3: 01:25:45 executing program 0: 01:25:45 executing program 2: 01:25:45 executing program 5: 01:25:45 executing program 4: 01:25:45 executing program 0: 01:25:45 executing program 1: 01:25:45 executing program 5: 01:25:45 executing program 4: 01:25:45 executing program 3: 01:25:45 executing program 2: 01:25:45 executing program 0: 01:25:45 executing program 1: 01:25:45 executing program 4: 01:25:45 executing program 5: 01:25:45 executing program 2: 01:25:45 executing program 0: 01:25:45 executing program 3: 01:25:45 executing program 4: 01:25:45 executing program 1: 01:25:45 executing program 5: 01:25:45 executing program 0: 01:25:45 executing program 2: 01:25:46 executing program 3: 01:25:46 executing program 4: 01:25:46 executing program 1: 01:25:46 executing program 5: 01:25:46 executing program 2: 01:25:46 executing program 0: 01:25:46 executing program 3: 01:25:46 executing program 1: 01:25:46 executing program 4: 01:25:46 executing program 5: 01:25:46 executing program 0: 01:25:46 executing program 3: 01:25:46 executing program 2: 01:25:46 executing program 1: 01:25:46 executing program 4: 01:25:46 executing program 5: 01:25:46 executing program 0: 01:25:46 executing program 3: 01:25:46 executing program 5: 01:25:46 executing program 4: 01:25:46 executing program 2: 01:25:46 executing program 1: 01:25:46 executing program 5: 01:25:46 executing program 3: 01:25:46 executing program 4: 01:25:46 executing program 0: 01:25:46 executing program 5: 01:25:46 executing program 1: 01:25:46 executing program 4: 01:25:46 executing program 2: 01:25:46 executing program 0: 01:25:46 executing program 3: 01:25:47 executing program 1: 01:25:47 executing program 5: 01:25:47 executing program 2: 01:25:47 executing program 4: 01:25:47 executing program 3: 01:25:47 executing program 1: 01:25:47 executing program 0: 01:25:47 executing program 5: 01:25:47 executing program 2: 01:25:47 executing program 4: 01:25:47 executing program 1: 01:25:47 executing program 3: 01:25:47 executing program 0: 01:25:47 executing program 4: 01:25:47 executing program 2: 01:25:47 executing program 5: 01:25:47 executing program 1: 01:25:47 executing program 3: 01:25:47 executing program 4: 01:25:47 executing program 5: 01:25:47 executing program 2: 01:25:47 executing program 0: 01:25:47 executing program 1: 01:25:47 executing program 4: 01:25:47 executing program 3: 01:25:47 executing program 0: 01:25:47 executing program 2: 01:25:47 executing program 5: 01:25:47 executing program 1: 01:25:47 executing program 3: 01:25:47 executing program 4: 01:25:47 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 01:25:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000401190300000000021000000000f900"], 0x14}}, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:25:48 executing program 5: 01:25:48 executing program 4: 01:25:48 executing program 3: 01:25:48 executing program 1: [ 204.241877][ T8398] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 01:25:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x40000000010) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x28, r2, 0xc01, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 01:25:48 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x400002000006008, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) unlink(&(0x7f0000000080)='./file0\x00') dup2(r0, r1) 01:25:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) 01:25:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xfffffffffffff008, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x1c, 0xffffff1f, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 01:25:48 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000000)={0x0, 0x8}) syz_open_dev$evdev(0x0, 0x0, 0x2) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x45000) io_setup(0x6, &(0x7f0000000b40)=0x0) getegid() write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x4, 0x40000000011, r2, 0x0) shutdown(r3, 0x1) creat(0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) sendmsg$alg(0xffffffffffffffff, 0x0, 0x40851) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 01:25:48 executing program 5: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 01:25:48 executing program 4: [ 204.610759][ T8421] Enabling of bearer rejected, failed to enable media 01:25:48 executing program 1: 01:25:48 executing program 4: [ 204.778933][ T8445] Enabling of bearer rejected, failed to enable media 01:25:48 executing program 3: 01:25:48 executing program 1: 01:25:48 executing program 4: 01:25:48 executing program 3: 01:25:48 executing program 1: 01:25:48 executing program 4: 01:25:48 executing program 0: 01:25:49 executing program 2: 01:25:49 executing program 3: 01:25:49 executing program 1: 01:25:49 executing program 4: 01:25:49 executing program 0: 01:25:49 executing program 5: 01:25:49 executing program 5: 01:25:49 executing program 0: 01:25:49 executing program 1: 01:25:49 executing program 2: 01:25:49 executing program 3: 01:25:49 executing program 4: 01:25:49 executing program 5: 01:25:49 executing program 3: 01:25:49 executing program 1: 01:25:49 executing program 4: 01:25:49 executing program 2: 01:25:49 executing program 0: 01:25:50 executing program 5: 01:25:50 executing program 3: 01:25:50 executing program 2: 01:25:50 executing program 4: 01:25:50 executing program 0: 01:25:50 executing program 1: 01:25:50 executing program 5: 01:25:50 executing program 2: 01:25:50 executing program 3: 01:25:50 executing program 0: 01:25:50 executing program 4: 01:25:50 executing program 1: 01:25:50 executing program 3: 01:25:50 executing program 5: 01:25:50 executing program 2: 01:25:50 executing program 1: 01:25:50 executing program 0: 01:25:50 executing program 3: 01:25:50 executing program 4: 01:25:50 executing program 1: 01:25:50 executing program 2: 01:25:50 executing program 0: 01:25:50 executing program 4: 01:25:50 executing program 5: 01:25:50 executing program 3: 01:25:50 executing program 2: 01:25:50 executing program 4: 01:25:50 executing program 0: 01:25:50 executing program 1: 01:25:50 executing program 3: 01:25:50 executing program 5: 01:25:50 executing program 4: 01:25:50 executing program 2: 01:25:50 executing program 3: 01:25:50 executing program 0: 01:25:50 executing program 5: 01:25:50 executing program 1: 01:25:51 executing program 0: 01:25:51 executing program 4: 01:25:51 executing program 3: 01:25:51 executing program 5: 01:25:51 executing program 2: 01:25:51 executing program 1: 01:25:51 executing program 0: 01:25:51 executing program 5: 01:25:51 executing program 3: 01:25:51 executing program 4: 01:25:51 executing program 2: 01:25:51 executing program 2: 01:25:51 executing program 5: 01:25:51 executing program 4: 01:25:51 executing program 1: 01:25:51 executing program 3: 01:25:51 executing program 0: 01:25:51 executing program 5: 01:25:51 executing program 4: 01:25:51 executing program 1: 01:25:51 executing program 2: 01:25:51 executing program 3: 01:25:51 executing program 0: 01:25:51 executing program 1: 01:25:51 executing program 4: