[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.425357][ T26] audit: type=1800 audit(1568486174.038:25): pid=8632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.467870][ T26] audit: type=1800 audit(1568486174.048:26): pid=8632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.494296][ T26] audit: type=1800 audit(1568486174.048:27): pid=8632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.139' (ECDSA) to the list of known hosts. 2019/09/14 18:36:25 fuzzer started 2019/09/14 18:36:26 dialing manager at 10.128.0.26:41177 2019/09/14 18:36:27 syscalls: 2487 2019/09/14 18:36:27 code coverage: enabled 2019/09/14 18:36:27 comparison tracing: enabled 2019/09/14 18:36:27 extra coverage: extra coverage is not supported by the kernel 2019/09/14 18:36:27 setuid sandbox: enabled 2019/09/14 18:36:27 namespace sandbox: enabled 2019/09/14 18:36:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/14 18:36:27 fault injection: enabled 2019/09/14 18:36:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/14 18:36:27 net packet injection: enabled 2019/09/14 18:36:27 net device setup: enabled 18:38:51 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xa05a, 0x4040) socket(0xa, 0x1, 0x0) socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3, 0x6, 0x7fff, 0xb2f, 0x45, 0xffffffffffffffff}, 0x3}) getpriority(0x0, 0x0) ftruncate(r3, 0x8003f1) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) ioctl$BLKPG(r2, 0x1269, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r5, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x24}}}, 0x1c) 18:38:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syzkaller login: [ 213.676730][ T8802] IPVS: ftp: loaded support on port[0] = 21 [ 213.801198][ T8804] IPVS: ftp: loaded support on port[0] = 21 18:38:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf2, 0xf087}, 0x14) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) write$binfmt_elf64(r1, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], []]}, 0x278) [ 213.856727][ T8802] chnl_net:caif_netlink_parms(): no params data found [ 213.962305][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.987673][ T8802] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.995911][ T8802] device bridge_slave_0 entered promiscuous mode [ 214.035947][ T8807] IPVS: ftp: loaded support on port[0] = 21 [ 214.043919][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.053599][ T8802] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.066725][ T8802] device bridge_slave_1 entered promiscuous mode 18:38:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") [ 214.172755][ T8802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.195413][ T8804] chnl_net:caif_netlink_parms(): no params data found [ 214.223750][ T8802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.346911][ T8807] chnl_net:caif_netlink_parms(): no params data found [ 214.368798][ T8802] team0: Port device team_slave_0 added [ 214.376269][ T8802] team0: Port device team_slave_1 added 18:38:52 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0xf) setresuid(0xee00, 0xee01, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) setuid(0x0) fcntl$setlease(r0, 0x400, 0x0) [ 214.394469][ T8804] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.403362][ T8804] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.411806][ T8804] device bridge_slave_0 entered promiscuous mode [ 214.454003][ T8804] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.465378][ T8812] IPVS: ftp: loaded support on port[0] = 21 [ 214.478683][ T8804] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.502961][ T8804] device bridge_slave_1 entered promiscuous mode [ 214.600619][ T8802] device hsr_slave_0 entered promiscuous mode 18:38:52 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) syz_open_dev$loop(0x0, 0xa05a, 0x0) socket(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x0, 0x0, 0x7fff, 0xb2f, 0x45, 0xffffffffffffffff}, 0x3}) getpriority(0x0, 0x0) ftruncate(r1, 0x8003f1) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000ffffffff0000000000000000000000000100000000000000000000000000000000000000000000000000faffffffffffffff00000000000000000000000000000000001d0000000000000000000000006ec23bdbff020f7526a6dd770da796732d6a7233d5606aadf7356ffa2ce67eaa4ec542dbbe388af4bbdb170b7d7db74a7c889d070ed7f0dcfad7d119f652be940d6ea4ca3ad9a1afce61e7d81ff23e66d6f6bb81ef59a3452a0ea07ddd42f4dfccbcd7cbd3636fe88e0c2279de9c959d40922e29232f2e820190bd5430012592c32ef2ae585507b14bcdf81f"]) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) [ 214.658127][ T8802] device hsr_slave_1 entered promiscuous mode [ 214.737908][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.745134][ T8802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.753160][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.760473][ T8802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.777085][ T8814] IPVS: ftp: loaded support on port[0] = 21 [ 214.802949][ T8816] IPVS: ftp: loaded support on port[0] = 21 [ 214.803007][ T8807] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.816205][ T8807] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.824729][ T8807] device bridge_slave_0 entered promiscuous mode [ 214.837417][ T8807] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.844777][ T8807] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.854076][ T8807] device bridge_slave_1 entered promiscuous mode [ 214.890937][ T8808] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.909770][ T8808] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.920856][ T8804] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.936412][ T8804] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.970385][ T8807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 214.987303][ T8804] team0: Port device team_slave_0 added [ 215.012703][ T8807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.041491][ T8804] team0: Port device team_slave_1 added [ 215.056790][ T8807] team0: Port device team_slave_0 added [ 215.077121][ T8807] team0: Port device team_slave_1 added [ 215.180969][ T8807] device hsr_slave_0 entered promiscuous mode [ 215.218163][ T8807] device hsr_slave_1 entered promiscuous mode [ 215.287679][ T8807] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.360717][ T8804] device hsr_slave_0 entered promiscuous mode [ 215.407964][ T8804] device hsr_slave_1 entered promiscuous mode [ 215.447774][ T8804] debugfs: Directory 'hsr0' with parent '/' already present! [ 215.502657][ T8814] chnl_net:caif_netlink_parms(): no params data found [ 215.517322][ T8802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.551039][ T8812] chnl_net:caif_netlink_parms(): no params data found [ 215.592166][ T8816] chnl_net:caif_netlink_parms(): no params data found [ 215.645813][ T8812] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.653415][ T8812] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.662213][ T8812] device bridge_slave_0 entered promiscuous mode [ 215.670200][ T8812] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.677257][ T8812] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.685847][ T8812] device bridge_slave_1 entered promiscuous mode [ 215.695226][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.704710][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.745522][ T8816] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.753908][ T8816] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.761851][ T8816] device bridge_slave_0 entered promiscuous mode [ 215.785116][ T8814] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.792479][ T8814] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.801232][ T8814] device bridge_slave_0 entered promiscuous mode [ 215.813287][ T8814] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.821189][ T8814] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.829332][ T8814] device bridge_slave_1 entered promiscuous mode [ 215.841398][ T8816] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.849555][ T8816] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.857316][ T8816] device bridge_slave_1 entered promiscuous mode [ 215.865728][ T8802] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.879829][ T8812] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.910995][ T8816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.925270][ T8812] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.936677][ T8814] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.950517][ T8814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.964286][ T8816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.006808][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.018283][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.026875][ T3000] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.034014][ T3000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.054339][ T8816] team0: Port device team_slave_0 added [ 216.069814][ T8816] team0: Port device team_slave_1 added [ 216.081291][ T8814] team0: Port device team_slave_0 added [ 216.093369][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.102922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.111919][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.119037][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.138149][ T8807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.146181][ T8812] team0: Port device team_slave_0 added [ 216.153088][ T8814] team0: Port device team_slave_1 added [ 216.230633][ T8816] device hsr_slave_0 entered promiscuous mode [ 216.288445][ T8816] device hsr_slave_1 entered promiscuous mode [ 216.327762][ T8816] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.336263][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.345134][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.363348][ T8812] team0: Port device team_slave_1 added [ 216.419467][ T8814] device hsr_slave_0 entered promiscuous mode [ 216.468102][ T8814] device hsr_slave_1 entered promiscuous mode [ 216.537806][ T8814] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.549098][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.558510][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.566808][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.575658][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.585263][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.593190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.627080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.635054][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.644665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.654048][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.662768][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.720671][ T8812] device hsr_slave_0 entered promiscuous mode [ 216.758119][ T8812] device hsr_slave_1 entered promiscuous mode [ 216.798456][ T8812] debugfs: Directory 'hsr0' with parent '/' already present! [ 216.810942][ T8807] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.824970][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.871690][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.881879][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.890623][ T8822] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.897713][ T8822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.905726][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.915060][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.923728][ T8822] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.930805][ T8822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.939924][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.976979][ T8802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.987273][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.996746][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.006118][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.016144][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.026518][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.035285][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.043735][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.052545][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.061249][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.078775][ T8804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.126199][ T8807] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.140202][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.150415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.160521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.168900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.176507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.192375][ T8804] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.216462][ T8816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.243470][ T8814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.265321][ T8807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.277003][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.296335][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.304944][ T8817] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.312205][ T8817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.320752][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.329413][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.338100][ T8817] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.345136][ T8817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.352789][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.362226][ T8817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.375182][ T8814] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.425074][ T8816] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.437252][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.458571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.466769][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.494671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.506074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.515073][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.521990][ C0] hrtimer: interrupt took 45655 ns [ 217.535276][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.544247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.553299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.561880][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.571392][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 217.571407][ T26] audit: type=1804 audit(1568486335.178:31): pid=8834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir155037043/syzkaller.Ez2Dj3/0/bus" dev="sda1" ino=16519 res=1 [ 217.603276][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.615541][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.624569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.633563][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.640860][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.649176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.658363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.666943][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.674093][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.684829][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.694802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.702833][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.713925][ T8812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.724335][ T8804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.745961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.759454][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.768359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.785656][ T8812] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.838392][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.864749][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.902513][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.928752][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.938612][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.948913][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.964326][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.973323][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.988253][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.995408][ T8823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.011115][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.023666][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.035874][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.043131][ T8823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.092443][ T8804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.122144][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.131213][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.149393][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:38:55 executing program 2: r0 = socket(0x2, 0xc003, 0x0) connect$unix(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x10) socket(0x2, 0x3, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) [ 218.191240][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.237074][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.244277][ T8823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.304373][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.313654][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.322689][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.329812][ T8823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.338381][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 18:38:56 executing program 2: r0 = inotify_init() r1 = epoll_create(0x80001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0xa4000011}) [ 218.347182][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.356610][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.365413][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.374679][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.383895][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.394287][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.403662][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.419747][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.434817][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.446577][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.470727][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.482642][ T8814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.499751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.514478][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.534007][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.542989][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.552230][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.561336][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.570192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.578081][ T26] audit: type=1804 audit(1568486336.188:32): pid=8856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir155037043/syzkaller.Ez2Dj3/0/bus" dev="sda1" ino=16519 res=1 [ 218.603156][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.621239][ T8816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.632360][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.661709][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.674151][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.682809][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.693302][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.701973][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 18:38:56 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) lstat(0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fcntl$notify(r0, 0x402, 0x39) getdents64(r0, 0x0, 0x0) 18:38:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe172, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xf61754394496e060, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x40, 0x1, 0x0, 0x3ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, r0, 0x1, 0xffffffffffffffff, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0x10001, 0x8, &(0x7f0000000040)=0x5}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x444, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x418, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @TCA_CBQ_RATE={0x10, 0x5, {0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}}]}}]}, 0x444}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 218.713879][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.753613][ T8812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.801037][ T8814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.872674][ T8816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.927976][ T8812] 8021q: adding VLAN 0 to HW filter on device batadv0 18:38:56 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 219.081618][ T26] audit: type=1800 audit(1568486336.698:33): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16530 res=0 [ 219.103949][ T26] audit: type=1804 audit(1568486336.698:34): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir155037043/syzkaller.Ez2Dj3/2/file0" dev="sda1" ino=16530 res=1 18:38:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:38:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6500) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffe17) [ 219.454806][ T26] audit: type=1800 audit(1568486337.068:35): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16530 res=0 18:38:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000400)={@ipv4={[], [], @remote}}, 0x14) dup2(r0, r1) 18:38:57 executing program 4: clone(0x23102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0xfbffffffffff8004) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 219.565152][ T26] audit: type=1804 audit(1568486337.118:36): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir155037043/syzkaller.Ez2Dj3/2/file0" dev="sda1" ino=16530 res=1 18:38:57 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 18:38:57 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x86842, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 219.731322][ T26] audit: type=1804 audit(1568486337.138:37): pid=8901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir680293993/syzkaller.yHsqzn/0/bus" dev="sda1" ino=16518 res=1 [ 219.888099][ T26] audit: type=1800 audit(1568486337.508:38): pid=8925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16526 res=0 [ 219.978805][ T26] audit: type=1804 audit(1568486337.538:39): pid=8925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir155037043/syzkaller.Ez2Dj3/3/file0" dev="sda1" ino=16526 res=1 [ 220.384571][ T26] audit: type=1804 audit(1568486337.998:40): pid=8901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir680293993/syzkaller.yHsqzn/0/bus" dev="sda1" ino=16518 res=1 18:38:58 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0}], 0x2040, &(0x7f0000000600)=ANY=[]) 18:38:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:38:58 executing program 2: open(0x0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x16d) r0 = gettid() ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x48020) prctl$PR_SET_THP_DISABLE(0x29, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) eventfd(0x0) pipe(0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) tkill(r0, 0x1010000000016) 18:38:58 executing program 1: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b47888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3d026ef9e0aa0676cecb8c9a2cf9f32e3a2b4edaa8b2d8f2078bde3638d8c9544d6d20c3db4561abe4b081d59cac86f1bfa97df68c28eff709", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x20}, 0x20}}, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:38:58 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x40, 0x0) io_submit(0x0, 0x0, &(0x7f0000000080)) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fcntl$notify(r0, 0x402, 0x39) getdents64(r0, 0x0, 0x0) 18:38:58 executing program 4: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), 0xfffffffffffffffd) pidfd_send_signal(0xffffffffffffffff, 0x3a, &(0x7f0000000480), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x34004102, 0x0, 0x0, 0x0, 0x0) [ 220.576884][ T8901] syz-executor.5 (8901) used greatest stack depth: 22120 bytes left 18:38:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000400)={@mcast2}, 0x14) 18:38:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semtimedop(0x0, &(0x7f0000000340)=[{}], 0x1, &(0x7f0000000400)={0x0, 0x1c9c380}) 18:38:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") close(r1) 18:38:58 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f00000012c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) 18:38:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) [ 221.010197][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:38:58 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720656372797074667320757365723a73797a20303030303030303030303030303030ec"], 0x1, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 18:38:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6772706a71756f74613d07726f6f74636f6e746578743d757365725f74b4a5"]) 18:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x6102) 18:38:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:38:58 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x19\x00\x00\x00\x02\x00', 0x20000005001}) write$P9_RLERRORu(r1, &(0x7f0000000200)=ANY=[@ANYPTR64], 0x8) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYRESHEX], 0x12) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 18:38:59 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x6102) [ 221.385923][ T8995] EXT4-fs (loop5): journaled quota format not specified [ 221.494969][ T9004] EXT4-fs (loop5): journaled quota format not specified 18:38:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) [ 221.540004][ T9003] kcapi: driver "" not loaded. [ 221.578366][ T9009] kcapi: driver "" not loaded. 18:38:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000b00)) 18:38:59 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x2122001ff1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='statm\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}], [{@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, 'mime_type'}}]}}) read(0xffffffffffffffff, 0x0, 0x0) 18:38:59 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:38:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:38:59 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40585414, &(0x7f0000000280)) 18:38:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) [ 221.818323][ T9022] kcapi: driver "" not loaded. 18:38:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='./file1\x00', 0x110862, 0x0) 18:38:59 executing program 5: 18:38:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:38:59 executing program 5: 18:38:59 executing program 0: 18:38:59 executing program 5: 18:38:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x332, 0x0) 18:39:00 executing program 2: 18:39:00 executing program 0: 18:39:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x332, 0x0) 18:39:00 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000b00)) 18:39:00 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) [ 222.830087][ T9073] kcapi: driver "" not loaded. 18:39:00 executing program 0: 18:39:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x332, 0x0) 18:39:00 executing program 2: 18:39:00 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:00 executing program 0: 18:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:00 executing program 2: 18:39:00 executing program 5: 18:39:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) [ 223.124868][ T9091] kcapi: driver "" not loaded. 18:39:00 executing program 0: 18:39:00 executing program 5: 18:39:00 executing program 2: 18:39:01 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:01 executing program 0: 18:39:01 executing program 5: 18:39:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) [ 223.530807][ T9113] kcapi: driver "" not loaded. 18:39:01 executing program 2: 18:39:01 executing program 5: 18:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:01 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:01 executing program 5: 18:39:01 executing program 0: 18:39:01 executing program 2: 18:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) [ 223.867720][ T9129] kcapi: driver "" not loaded. 18:39:01 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:01 executing program 2: 18:39:01 executing program 0: 18:39:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:39:01 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000100), 0x0, 0xb) getdents(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0xc3f4edabf87173bd, 0x82) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x4) renameat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 224.107852][ T9143] kcapi: driver "" not loaded. 18:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$rxrpc(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 18:39:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x6b, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 18:39:01 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) [ 224.386101][ T9165] kcapi: driver "" not loaded. 18:39:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:02 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:02 executing program 0: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x40, &(0x7f0000000240)={0x0, 0x1, 0x1f, 0x0, 0x1, 0x3ff, 0x3ff, 0x200000}, &(0x7f0000000280)={0x9, 0x3, 0x8, 0x3, 0xc000, 0x4, 0x3, 0x1}, &(0x7f00000002c0)={0x10001, 0x0, 0x57, 0x9, 0x7, 0x2, 0x101, 0x9}, &(0x7f0000000300)={0x77359400}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0}, &(0x7f0000000340)=0xfffffffffffffd37) syz_open_procfs(r1, &(0x7f0000000380)='envh&on\x00') syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x120000, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)={0x4}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8}]]}}}]}, 0x68}}, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 18:39:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:39:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 224.572513][ T9180] kcapi: driver "" not loaded. 18:39:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) [ 224.688349][ T9188] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 224.879896][ T9196] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 18:39:04 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x12000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x422800, 0xe85c9d06e8571303) 18:39:04 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:04 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lchown(&(0x7f0000000040)='./file1/../file0\x00', 0x0, 0x0) 18:39:04 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 18:39:04 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:04 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00', 0x0, 0x0) [ 227.220456][ T9202] kcapi: driver "" not loaded. 18:39:04 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:04 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1000005) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2042, &(0x7f0000008c40)) write(0xffffffffffffffff, &(0x7f0000008c80), 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000240)='syz1\x00') getresgid(0x0, 0x0, &(0x7f0000003640)=0x0) socket$unix(0x1, 0x2, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xbc, 0x0, 0x0, 0x0, 0x6, 0x10, 0x4, 0x100000000, 0x1, 0x10001, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7fff, 0x40, 0x6, 0x9, 0x0, 0x0, 0x40020, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x1, 0x80000000, 0x0, 0x0, 0x100000000, 0x0, 0x1000, 0x0, @perf_config_ext={0xe01e, 0x6}, 0x0, 0x3ff, 0xa3, 0x32f829435ce4d168, 0x819, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfe51) connect$inet(r3, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x6) sendmmsg(r3, &(0x7f0000007fc0), 0x40000000000002f, 0x0) r4 = getuid() fchown(r2, r4, r1) ptrace(0x10, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') bind$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80010008}, 0xc, &(0x7f0000000540)={&(0x7f0000001940)=ANY=[@ANYBLOB="b8425f7684f55662de76729330f4caf30de088095288ffbb50111a34d4981098ea99378958652fdcc869d7a56000000000cc37", @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf25010000000000000009410000004c001800000003696200"/98], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x20001000) 18:39:05 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) 18:39:05 executing program 2: r0 = gettid() ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) unlink(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) listen(r1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x1020000000016) 18:39:05 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x4) pipe(&(0x7f00000000c0)) socket$inet6_sctp(0xa, 0x10000000005, 0x84) unshare(0x8000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 227.455288][ T9223] kcapi: driver "" not loaded. 18:39:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 18:39:05 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) [ 227.568230][ T9227] kasan: CONFIG_KASAN_INLINE enabled [ 227.580606][ T9227] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 227.642401][ T9227] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 227.649385][ T9227] CPU: 1 PID: 9227 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190830 #75 [ 227.658401][ T9227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.660332][ T9236] kcapi: driver "" not loaded. [ 227.668475][ T9227] RIP: 0010:xsk_poll+0x95/0x540 18:39:05 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) [ 227.668491][ T9227] Code: 80 3c 02 00 0f 85 70 04 00 00 4c 8b a3 88 04 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 96 00 00 00 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 bf 03 00 00 [ 227.668499][ T9227] RSP: 0018:ffff88805dd97690 EFLAGS: 00010207 [ 227.668510][ T9227] RAX: dffffc0000000000 RBX: ffff8880a1aea000 RCX: ffffc90005f45000 [ 227.668518][ T9227] RDX: 0000000000000012 RSI: ffffffff859b6684 RDI: 0000000000000096 [ 227.668526][ T9227] RBP: ffff88805dd976c0 R08: ffff88805dd60280 R09: ffffed101435d449 [ 227.668532][ T9227] R10: ffffed101435d448 R11: ffff8880a1aea247 R12: 0000000000000000 18:39:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) 18:39:05 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "954e8000000000000000000000000000000029000000000000001e00"}) [ 227.668539][ T9227] R13: 0000000000000304 R14: ffff8880a015c340 R15: ffff88809476c560 [ 227.668549][ T9227] FS: 00007f3cb7fad700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 227.668556][ T9227] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 227.668562][ T9227] CR2: 0000001b32622000 CR3: 00000000a9745000 CR4: 00000000001406e0 [ 227.668577][ T9227] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 227.752611][ T9238] kcapi: driver "" not loaded. [ 227.752662][ T9227] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 227.752668][ T9227] Call Trace: 18:39:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0) [ 227.752688][ T9227] ? datagram_poll+0x314/0x510 [ 227.752706][ T9227] ? xsk_setsockopt+0x680/0x680 [ 227.801295][ T9227] sock_poll+0x15e/0x480 [ 227.805549][ T9227] ? __sock_recv_wifi_status+0x1d0/0x1d0 [ 227.811187][ T9227] do_select+0x927/0x16f0 [ 227.815536][ T9227] ? select_estimate_accuracy+0x330/0x330 [ 227.821265][ T9227] ? __schedule+0x776/0x17a0 [ 227.825862][ T9227] ? poll_initwait+0x180/0x180 [ 227.830732][ T9227] ? set_fd_set.part.0+0x70/0x70 [ 227.835673][ T9227] ? set_fd_set.part.0+0x70/0x70 [ 227.840622][ T9227] ? set_fd_set.part.0+0x70/0x70 [ 227.845573][ T9227] ? set_fd_set.part.0+0x70/0x70 [ 227.850518][ T9227] ? __kasan_check_read+0x11/0x20 [ 227.855555][ T9227] ? __lock_acquire+0x16f2/0x4a00 [ 227.860681][ T9227] ? mark_lock+0xc2/0x1220 [ 227.865200][ T9227] ? __might_fault+0x12b/0x1e0 [ 227.869974][ T9227] ? find_held_lock+0x35/0x130 [ 227.872409][ T3891] kobject: 'loop4' (0000000029ce6ba8): kobject_uevent_env [ 227.874739][ T9227] ? __might_fault+0x12b/0x1e0 [ 227.886583][ T9227] ? core_sys_select+0x212/0x890 [ 227.891523][ T9227] ? lock_downgrade+0x920/0x920 [ 227.896382][ T9227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.902629][ T9227] core_sys_select+0x564/0x890 [ 227.903613][ T3891] kobject: 'loop4' (0000000029ce6ba8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 227.907385][ T9227] ? core_sys_select+0x564/0x890 [ 227.907401][ T9227] ? do_compat_pselect+0x230/0x230 [ 227.907413][ T9227] ? __might_fault+0x12b/0x1e0 [ 227.907429][ T9227] ? __might_fault+0x12b/0x1e0 [ 227.937184][ T9227] ? lock_downgrade+0x920/0x920 [ 227.942149][ T9227] ? set_user_sigmask+0x166/0x1e0 [ 227.947180][ T9227] ? sigprocmask+0x2b0/0x2b0 [ 227.949531][ T3891] kobject: 'loop3' (000000002cc95219): kobject_uevent_env [ 227.951773][ T9227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.951792][ T9227] ? put_timespec64+0xda/0x140 [ 227.970207][ T9227] __x64_sys_pselect6+0x3df/0x490 [ 227.971311][ T3891] kobject: 'loop3' (000000002cc95219): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 227.975324][ T9227] ? __ia32_sys_select+0x150/0x150 [ 227.975343][ T9227] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 227.975360][ T9227] ? do_syscall_64+0x26/0x760 [ 228.000715][ T9227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.004273][ T3891] kobject: 'loop3' (000000002cc95219): kobject_uevent_env [ 228.006783][ T9227] ? do_syscall_64+0x26/0x760 [ 228.006798][ T9227] ? lockdep_hardirqs_on+0x418/0x5d0 [ 228.006815][ T9227] ? trace_hardirqs_on+0x67/0x240 [ 228.015944][ T3891] kobject: 'loop3' (000000002cc95219): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.018587][ T9227] do_syscall_64+0xfa/0x760 18:39:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) flock(r0, 0xadffe4a0078adbef) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 18:39:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000080)={0xb, &(0x7f0000000040)}) [ 228.018606][ T9227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.018616][ T9227] RIP: 0033:0x4598e9 [ 228.018630][ T9227] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.018637][ T9227] RSP: 002b:00007f3cb7facc78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 228.057911][ T3891] kobject: 'loop1' (00000000a6d8a1bb): kobject_uevent_env [ 228.072924][ T9227] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 228.072931][ T9227] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000040 [ 228.072937][ T9227] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.072945][ T9227] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f3cb7fad6d4 [ 228.072951][ T9227] R13: 00000000004c6c05 R14: 00000000004dbe68 R15: 00000000ffffffff [ 228.072963][ T9227] Modules linked in: [ 228.127248][ T9227] ---[ end trace 8597dbdcdc9d6e04 ]--- [ 228.138474][ T9227] RIP: 0010:xsk_poll+0x95/0x540 [ 228.143607][ T3891] kobject: 'loop1' (00000000a6d8a1bb): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.169061][ T9227] Code: 80 3c 02 00 0f 85 70 04 00 00 4c 8b a3 88 04 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 96 00 00 00 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 bf 03 00 00 [ 228.188992][ T9227] RSP: 0018:ffff88805dd97690 EFLAGS: 00010207 [ 228.195211][ T9227] RAX: dffffc0000000000 RBX: ffff8880a1aea000 RCX: ffffc90005f45000 [ 228.203432][ T9227] RDX: 0000000000000012 RSI: ffffffff859b6684 RDI: 0000000000000096 [ 228.218136][ T9227] RBP: ffff88805dd976c0 R08: ffff88805dd60280 R09: ffffed101435d449 [ 228.236134][ T9227] R10: ffffed101435d448 R11: ffff8880a1aea247 R12: 0000000000000000 [ 228.236923][ T3891] kobject: 'loop2' (0000000005d8b206): kobject_uevent_env [ 228.244486][ T9227] R13: 0000000000000304 R14: ffff8880a015c340 R15: ffff88809476c560 [ 228.262202][ T9227] FS: 00007f3cb7fad700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 228.271434][ T9227] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 228.278219][ T3891] kobject: 'loop2' (0000000005d8b206): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 228.288784][ T9227] CR2: 0000000000000000 CR3: 00000000a9745000 CR4: 00000000001406e0 [ 228.297046][ T9227] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 228.306111][ T9227] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 228.311330][ T3891] kobject: 'loop1' (00000000a6d8a1bb): kobject_uevent_env [ 228.314377][ T9227] Kernel panic - not syncing: Fatal exception [ 228.328826][ T9227] Kernel Offset: disabled [ 228.333237][ T9227] Rebooting in 86400 seconds..