[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 22.256819] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.677956] random: sshd: uninitialized urandom read (32 bytes read) [ 26.048558] random: sshd: uninitialized urandom read (32 bytes read) [ 26.704955] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.39' (ECDSA) to the list of known hosts. [ 32.373223] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/03 09:10:25 fuzzer started [ 33.354635] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/03 09:10:26 dialing manager at 10.128.0.26:44939 2018/09/03 09:10:37 syscalls: 1 2018/09/03 09:10:37 code coverage: enabled 2018/09/03 09:10:37 comparison tracing: enabled 2018/09/03 09:10:37 setuid sandbox: enabled 2018/09/03 09:10:37 namespace sandbox: enabled 2018/09/03 09:10:37 fault injection: enabled 2018/09/03 09:10:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/03 09:10:37 net packed injection: enabled 2018/09/03 09:10:37 net device setup: enabled [ 46.180751] random: crng init done 09:13:52 executing program 0: 09:13:52 executing program 1: 09:13:52 executing program 2: 09:13:52 executing program 7: 09:13:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0xebe) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(0x0) gettid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000029c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000280)=ANY=[]}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:13:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x831, 0x0, 0x1}, {0x0, 0x0, 0x8}, 0x0, 0x0, 0x1, 0x1, 0x3}, {{@in6=@remote}, 0x0, @in6=@mcast2, 0x3503, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/89, 0x59, 0x0, &(0x7f0000000940)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80) sendfile(r0, r1, &(0x7f0000000040)=0xe00, 0x1080001800) 09:13:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(r0, r1, &(0x7f0000000040), 0x1080001800) 09:13:52 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000580)}, 0x20008844) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 240.141709] IPVS: ftp: loaded support on port[0] = 21 [ 240.142164] IPVS: ftp: loaded support on port[0] = 21 [ 240.170719] IPVS: ftp: loaded support on port[0] = 21 [ 240.173640] IPVS: ftp: loaded support on port[0] = 21 [ 240.189236] IPVS: ftp: loaded support on port[0] = 21 [ 240.211801] IPVS: ftp: loaded support on port[0] = 21 [ 240.221471] IPVS: ftp: loaded support on port[0] = 21 [ 240.242840] IPVS: ftp: loaded support on port[0] = 21 [ 242.637899] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.644517] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.668768] device bridge_slave_0 entered promiscuous mode [ 242.690665] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.697097] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.714731] device bridge_slave_0 entered promiscuous mode [ 242.744624] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.751032] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.766039] device bridge_slave_0 entered promiscuous mode [ 242.773931] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.780364] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.809043] device bridge_slave_0 entered promiscuous mode [ 242.824050] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.830498] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.839157] device bridge_slave_0 entered promiscuous mode [ 242.848562] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.854961] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.879009] device bridge_slave_1 entered promiscuous mode [ 242.888057] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.894472] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.907916] device bridge_slave_1 entered promiscuous mode [ 242.938039] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.944442] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.962527] device bridge_slave_0 entered promiscuous mode [ 242.974897] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.981299] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.999725] device bridge_slave_1 entered promiscuous mode [ 243.014909] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.021350] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.033909] device bridge_slave_1 entered promiscuous mode [ 243.041072] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.047468] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.056507] device bridge_slave_1 entered promiscuous mode [ 243.065465] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.074865] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.081290] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.104716] device bridge_slave_0 entered promiscuous mode [ 243.118052] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.125408] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.131849] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.151844] device bridge_slave_0 entered promiscuous mode [ 243.167797] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.174273] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.185243] device bridge_slave_1 entered promiscuous mode [ 243.194752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.204344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.213113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.220631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.232367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.246988] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.253431] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.304826] device bridge_slave_1 entered promiscuous mode [ 243.326457] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.332864] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.347481] device bridge_slave_1 entered promiscuous mode [ 243.357579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.382146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.390996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.398267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.470162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.509507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.580598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.621783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.629201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.720225] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.732104] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.817970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.827625] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.864550] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 243.880103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.919407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 243.964083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.017228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.047973] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.058253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.065223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.088935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.117968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.130114] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.143726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.150614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.163362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.170384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.208013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.214947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.230926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.239957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.253750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.286553] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.300131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.307092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.319187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.329003] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.337055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.386958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.393905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.412947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.419869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.468434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.475405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.496495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.512442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.539578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.546785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.562304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.601861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.628751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.663598] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.683002] team0: Port device team_slave_0 added [ 244.707990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.730504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.739762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.799292] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.824521] team0: Port device team_slave_0 added [ 244.863127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.884461] team0: Port device team_slave_1 added [ 244.900247] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.911052] team0: Port device team_slave_0 added [ 244.932772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.946520] team0: Port device team_slave_0 added [ 244.983175] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.999124] team0: Port device team_slave_0 added [ 245.024412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.043005] team0: Port device team_slave_1 added [ 245.065767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.081004] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.089016] team0: Port device team_slave_1 added [ 245.106056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.119046] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.163874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.177586] team0: Port device team_slave_1 added [ 245.184908] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.194866] team0: Port device team_slave_1 added [ 245.203043] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.212552] team0: Port device team_slave_0 added [ 245.228089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.237797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.246431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.256087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.280875] team0: Port device team_slave_0 added [ 245.298274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.311400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.332633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.352265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.359948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.367656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.378420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.387498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.401227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.413050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.419966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.437128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.457347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.472428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.484154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.492647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.500239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.508327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.516735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.524282] team0: Port device team_slave_0 added [ 245.530406] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.538537] team0: Port device team_slave_1 added [ 245.547659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.555562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.563487] team0: Port device team_slave_1 added [ 245.571476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.581619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.595490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.624570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.645604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.656504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.668101] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.677731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.687043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.696284] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.712414] team0: Port device team_slave_1 added [ 245.729572] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.737009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.744825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.765200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.790636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.812027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.826757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.834489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.842323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.850131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.858254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.866299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.873967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.881808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.893621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.902893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.915209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.931233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.947486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.962432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.978568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.992403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.004463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.016395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.025072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.032184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.069893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.099451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.112936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.121179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.129206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.136792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.144533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.152846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.160045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.168326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.185532] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.193216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.203384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.224613] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.236025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.248234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.264395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.292558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.307587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.328365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.342839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.350078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.379564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.393746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.407352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.423879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.441528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.462415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.489249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.505233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.538269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.650812] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.658051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.669422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.530641] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.537212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.544224] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.550633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.561051] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.581596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.743368] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.749825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.756556] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.762962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.827895] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.959897] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.966350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.973068] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.979476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.001011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.010028] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.016436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.023134] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.029540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.040510] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.052924] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.059317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.066035] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.072443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.082262] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.091562] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.097954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.104639] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.111041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.119271] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.133049] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.139441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.146113] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.152509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.168850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.398060] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.404502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.411199] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.417602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.442143] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.614035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.626243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.657604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.680235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.692136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.699522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.707162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.383520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.714729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.866927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.896900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.917843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.953459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.989976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.241103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.259007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.281874] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.411354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.418761] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.425276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.432767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.467695] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.505384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.527937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.814818] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.822833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.831456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.872357] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.883252] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.906760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.912956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.929231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.007467] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.038525] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.047245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.062402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.083399] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.098140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.133536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.157356] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.164073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.176228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.375962] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.462166] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.532630] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.538895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.550517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.589762] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.619225] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.627204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.642513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.671410] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.701103] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.165595] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.213727] 8021q: adding VLAN 0 to HW filter on device team0 09:14:11 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000580)}, 0x20008844) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 09:14:11 executing program 6: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f00000000c0)=@ethtool_channels={0x42, 0x0, 0x0, 0x0, 0x1ff}}) 09:14:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/220}, 0x18) 09:14:11 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) 09:14:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/220}, 0x18) [ 258.884695] hrtimer: interrupt took 34357 ns 09:14:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000200)={{}, {0x2, 0x5}}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0xebe) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000029c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) write$binfmt_misc(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:14:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/220}, 0x18) 09:14:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/220}, 0x18) 09:14:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a040007000000000013002d54036205001a000000000009001b00000000d7079f3514ffffff87f9d95331c099c887ac0c17d8bc000b02"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000230, 0x0) 09:14:11 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd944ef20c0020200a1009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:14:11 executing program 7: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getpgid(r2) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), 0xc) 09:14:11 executing program 1: r0 = memfd_create(&(0x7f0000000840)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(r0, r1, &(0x7f0000000040), 0x1080001800) 09:14:12 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000f00), 0x0, &(0x7f0000000f80)=""/45, 0xfffffffffffffec2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000340), 0x3dc, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) [ 259.496019] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:14:12 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000000), &(0x7f000044cfc0), &(0x7f0000000ff8), &(0x7f0000000ff8)={&(0x7f0000000ff8), 0xffffffffffffff0d}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 09:14:12 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0xebe) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getpgrp(0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:14:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0xebe) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000029c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000280)=ANY=[]}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) write$binfmt_misc(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:14:12 executing program 4: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000000100)=[{r0, 0x4000}, {r0, 0x24}], 0x2, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x38, 0x4, [0x1, 0x0, 0x1, 0x7]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) 09:14:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0xebe) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000029c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="100000002afcdbdf339f8ed087aec587622c6b0c2753c2b8d2024b49c1f5ecb0f7d36f1fdbc39d3b6a991c3f9138c7fc60f2"], 0x1}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:14:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x32, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 09:14:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 09:14:12 executing program 5: socketpair$unix(0x1, 0x8000000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='P']}) 09:14:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x2e, 0x119, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) 09:14:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000840)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(r0, r1, &(0x7f0000000040), 0x1080001800) 09:14:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="15"]}) 09:14:12 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f00000000c0)=@ethtool_channels={0x48, 0x0, 0x0, 0x0, 0x1ff}}) 09:14:12 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:12 executing program 7: socketpair$unix(0x1, 0x8000000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='*']}) 09:14:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x84e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='gre0\x00', 0x10) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") close(r0) 09:14:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) 09:14:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0xebe) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000029c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="100000002afcdbdf339f8ed087aec587622c6b0c2753c2b8d2024b49c1f5ecb0f7d36f1fdbc39d3b6a991c3f9138c7fc60f2"], 0x1}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x7fd) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d28006822e785c3ffdad9b352080da8cc3656d5fd911f4f02a6f881baf252778ec846b0456a04ab8ee8488fac9b2ec1af3f") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0xfff, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) 09:14:12 executing program 7: 09:14:12 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) [ 260.100854] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:12 executing program 3: 09:14:12 executing program 4: 09:14:12 executing program 1: 09:14:12 executing program 0: 09:14:12 executing program 5: 09:14:12 executing program 3: 09:14:12 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) [ 260.265643] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:13 executing program 7: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'bond0\x00', &(0x7f0000000240)=@ethtool_gstrings}) 09:14:13 executing program 0: 09:14:13 executing program 4: 09:14:13 executing program 1: [ 260.396482] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:13 executing program 6: 09:14:13 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:13 executing program 5: 09:14:13 executing program 0: 09:14:13 executing program 7: 09:14:13 executing program 3: 09:14:13 executing program 4: 09:14:13 executing program 1: 09:14:13 executing program 6: [ 260.625326] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:13 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:13 executing program 5: 09:14:13 executing program 7: 09:14:13 executing program 0: 09:14:13 executing program 1: 09:14:13 executing program 3: 09:14:13 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:13 executing program 4: 09:14:13 executing program 6: 09:14:13 executing program 7: 09:14:13 executing program 5: 09:14:13 executing program 1: 09:14:13 executing program 0: 09:14:13 executing program 3: 09:14:13 executing program 4: 09:14:13 executing program 6: [ 260.955504] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:13 executing program 7: 09:14:13 executing program 1: 09:14:13 executing program 5: 09:14:13 executing program 0: 09:14:13 executing program 3: 09:14:13 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:13 executing program 4: 09:14:13 executing program 6: 09:14:13 executing program 7: 09:14:13 executing program 5: 09:14:13 executing program 1: 09:14:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000200)={{0x5}, {0x2, 0x5}}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xf7e7, 0x420402) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002980)=0xe8) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000003100)={0x10, 0x0, 0x10, 0x70bd26, 0x25dfdbfd}, 0x10}], 0x1, &(0x7f00000029c0), 0x0, 0x100000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="00797a31587872cd00a2bfc8892f8d8b9ccf61d121d04dd77e6036d43895dc8fdc92d1fe3f551a2c859f33cccdeeb62be28b4340"], 0x34) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000300)={&(0x7f00003a1000/0x3000)=nil, &(0x7f0000844000/0x2000)=nil, 0x3000, 0x1}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000140)="8cd04b54db9ec9a1539afe1f94439b8d083d") getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x4, 0x9, 0x2, 0x7}, &(0x7f00000001c0)=0x98) [ 261.265038] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x61bf, 0x1c2dc0000}) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) 09:14:13 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwrite64(r1, &(0x7f0000000480)="06", 0x1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x61bf, 0x1c2dc0000}) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) 09:14:14 executing program 6: 09:14:14 executing program 5: 09:14:14 executing program 7: 09:14:14 executing program 1: 09:14:14 executing program 0: 09:14:14 executing program 5: 09:14:14 executing program 6: [ 261.553178] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:14 executing program 0: 09:14:14 executing program 5: 09:14:14 executing program 7: 09:14:14 executing program 1: 09:14:14 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:14 executing program 6: 09:14:15 executing program 5: 09:14:15 executing program 0: 09:14:15 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:15 executing program 7: 09:14:15 executing program 1: 09:14:15 executing program 6: 09:14:15 executing program 3: 09:14:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x61bf, 0x1c2dc0000}) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) 09:14:15 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:15 executing program 7: 09:14:15 executing program 1: 09:14:15 executing program 5: 09:14:15 executing program 0: 09:14:15 executing program 6: 09:14:15 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:15 executing program 1: 09:14:15 executing program 7: 09:14:15 executing program 6: 09:14:15 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:15 executing program 0: 09:14:15 executing program 5: 09:14:15 executing program 1: 09:14:15 executing program 3: 09:14:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 6: 09:14:16 executing program 5: 09:14:16 executing program 7: 09:14:16 executing program 0: 09:14:16 executing program 1: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=':']}) 09:14:16 executing program 3: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) add_key(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0), &(0x7f0000000400)='L', 0x1, 0xfffffffffffffffb) prctl$intptr(0x0, 0x200) keyctl$link(0x8, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000280)) 09:14:16 executing program 3: 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 1: 09:14:16 executing program 0: 09:14:16 executing program 5: 09:14:16 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r2 = dup2(r0, r1) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003c00)=0x14) bind$packet(r2, &(0x7f0000003c40)={0x11, 0x7, r3, 0x1, 0x7fffffff, 0x6, @broadcast}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000006fc0)=[{{&(0x7f0000001b40)=@pppoe, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f40)=""/197, 0xc5}], 0x1, &(0x7f00000020c0)=""/97, 0x61}}], 0x1, 0x0, &(0x7f0000007100)={0x77359400}) memfd_create(&(0x7f0000007240)='hash\x00', 0x2) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="469cfb5a473263c26f567d62c053e575c4c264ae0fb1b972c084c52ce0959169e6cbb953fd42b5de6372b62d8719077e3543a7416e"}, {&(0x7f00000002c0)="484022ca267fbe4a9d862a12b9ddb106399f14c131ad84993178e183fa6fdb4a7d413245d225130161570bd2e8ccbd4cb11640e4287245825951d7addf7e41786668a323467a6ffcde81134cbf102bf500a72455d3546d714bde253e93209bdc7f108f0b8b6f0ff9cd8ba44e24c4a17728a1642e5402f4c7546cc4"}, {&(0x7f00000001c0)="7c5c7230fbd8bc1d140215e8b70205b6e7148b5d04499dd01a71d96d1b67b7568eb0cf40a6a00a768dbe2dc46239851b67190692574107be1114fd34fbaaa1b9eb1a2b9e4cc7db2c572021d3f7b8e6f4c818ab3bccee0dd1f3e1dba898adfaeb48bbb5b85676cd7e6d732ef4deed88e89dd147cc8909d4f5d8b9ad70cf9cd6235c8e0b120e035809d1f9fc48e3209e612e7d6060cebb264828e518dec49873c21a20006acfb6b5bffaf1c44b678cd6af54e99e4cc962ded2e5aa518b5201939288250395f30b2261817994351235238ecaff661249ccaa2a0e586aed298143902b716f"}], 0x10000021, &(0x7f0000000100)=[@op={0x0, 0x117, 0x3, 0x1}], 0x24}], 0x4924924924924b1, 0x0) 09:14:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x3c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev}, @in={0x2, 0x0, @multicast2}, @in={0x2, 0x0, @loopback}]}, &(0x7f0000000300)=0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) io_submit(r1, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) 09:14:16 executing program 0: r0 = socket$inet6(0xa, 0x7, 0x94) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x98}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x7, 0x9, 0x4, 0x5c, 0x200}, &(0x7f0000000280)=0x14) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000180)=0x54) 09:14:16 executing program 4: socket$inet6(0xa, 0x3, 0x400000000006) unshare(0x40000002) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") 09:14:16 executing program 2 (fault-call:3 fault-nth:0): ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xa4b, 0x800) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x0, 0x9, 0x6, 0x7, 0xf880, 0x9, 0x9, 0x1ff, 0x949, 0x7}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x5, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xf5f9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000140)={r4, 0xbf, "cfd35a51853c5d6ca9ec4dc0f16fc95cac1bbae765a6454c9e992242e6324ad99a742a49257bde8e9137fadc7fc70d5aaed9e9de8a5181dac2de7e4e517121019eaa23a2d44000cb0f6e769cd8e23be303c15482e43832efb722207bc55acec775657ef9199f6b0366ea127927320f223512e0a57352e5cff25f5f11a4ee7c0d83e7897e46072c2acfa1d2bc3ff2320db5bb5ee084a9f5fc1c5a80bf1cd743991517caa4605d3fea0f4bde6915a66f8cfcf6a0931e39bc4ddbc7c70e5eeca8"}, &(0x7f0000000240)=0xc7) close(r3) close(r1) 09:14:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002803624496f00000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000280)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x15}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) 09:14:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x14, 0xb, 0x6, 0x1}, 0x39}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x800, 0x40000) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000100)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:14:16 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x1000000000004, 0x5) ioctl(r2, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r3 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150005000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003240)={'bridge_slave_1\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000038c0)={&(0x7f00000000c0), 0xc, &(0x7f0000003880)={&(0x7f0000003500)={0x20, r4, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r5}, {0x4}}]}, 0x20}}, 0x0) 09:14:16 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) bind$can_raw(0xffffffffffffffff, &(0x7f0000002a00), 0x10) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000180)=ANY=[@ANYBLOB="88dc704b6974acdf94ffe25ff59665118458bc91f9bad47b2c9f9f645d0302d9d676d34f09645eaa1cf1500b85b33664a3f09c702f92a5aee8e48940d95dfc34c87ebcfd702707cae67a4ee84124f6aaba41006a3c67f547fe2f5b8c97884b4b6bac20d303e47d5686c82f958e63926aaf3d542656c43fa48bd3fd6f56c602fbfe82ad42df51c4911da3728ed41090732916eb3011bf6f1a57763b2e9a6f6f4ce9ff0f6cb225"]) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) [ 263.884766] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 263.901633] kernel msg: ebtables bug: please report to author: Wrong len argument 09:14:16 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x24) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000007c0)={0x0, 0x38}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000a00)=ANY=[], &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x101000000000}, 0x5ea813bad44acf26) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x3, 0x1000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="06050032000094560836e90615353200"], 0x1) listen(r1, 0xfffffffffffffe14) r4 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40008, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x1, 0x3, 0x3, 0xa, 0xffffffffffffff81, 0x6, 0xfffffffffffffffa}, 0x20) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000880), 0x336) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000900)={r2, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0x1e}, 0xfff}}, 0xfffffffffffffffd, 0x99fa, 0x6, 0x3ff, 0x63}, 0x98) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) sendto$inet6(r8, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000480)={0x0, 0xffff}, &(0x7f00000004c0)=0xffffffffffffff20) read(r4, &(0x7f00000006c0)=""/216, 0xd8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000540)=0x8) 09:14:16 executing program 5: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = accept(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000001c0)="7f35eaa8df1c862ea6f2755bf639378f", 0x10) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000180)=0x1, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000240)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x5, r3, &(0x7f0000000280)="d57c6331f9c560bbe3414af84b28e91db0a5720ec517422aa08efdea667e75c9d51f5469c11319d5804e367515c484c6", 0x30, 0x9, 0x0, 0x0, r1}]) [ 263.946870] netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. [ 263.960403] mmap: syz-executor1 (7132) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 09:14:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc8070031715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000000)={0x6, 0x1, 0xff, 0xfffffffffffffff8, 0x848}, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x111000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000180)=0x20) close(r2) close(r1) [ 264.043378] kernel msg: ebtables bug: please report to author: Wrong len argument [ 264.050074] netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000001000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) mlockall(0x0) connect$l2tp(r1, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f00000047c0)=[{{&(0x7f0000004500)=@ethernet={0x0, @local}, 0xffffffffffffff5a, &(0x7f0000004740), 0x3e, 0x0, 0x23a}, 0x3}], 0x209, 0x0) 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000005000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000840)={0x9, 0x1}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000380)=0x80000001, 0x12) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="5d0939b55b67865e76ceca5d99226140095c6706879f47a9c3e0174f583661bf9844c8dead896fa889ac28d037b58b463eb557687284212dbc334d362e72c9bac87721bfb92c"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r3 = getpgid(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000002c0)={r1, 0xffffffffffffffff, 0x2}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000640)="e90a5401af537e1999f1434f48fe99", 0xf) ptrace(0x4207, r4) ptrace$getregset(0x4, r4, 0x0, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0xd7}) semget(0x3, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)="6365706800e9939d7656b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0177bc8f8d8bc8f9d30f9c55ced1150431a9b1a839bbf3fe67d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000280)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="3ec9b8d1bbfb46b8bb816e3007911d1b9b2f5d780236f81ddd278e4b71b1d32a1b4ca307bd0f4adec7fcd04f03367b153778931b315bacabfe0f50ee91b5fe6fbd8f7f3fc82eda074bde4868f173dafa91d2a7607f806bdd83d00e3b132f86c60abe40e24db7b57409984800"], &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0x3, @mcast2, 0xf7}}, [0x0, 0xab5f, 0x8, 0x200, 0x8, 0x7, 0x2, 0x400, 0x9, 0xc892, 0x1, 0x9, 0x7, 0x3f, 0x5]}, &(0x7f0000000580)=0x100) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000a00)=""/253, &(0x7f00000009c0)=0xfffffead) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000005c0)={r5}, 0x8) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x9) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000600)=0x1, 0x4) fallocate(r1, 0x0, 0x0, 0x1000f4) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000008c0)) 09:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x400000000000007, &(0x7f0000000080)={0xffffffffffffffff, {0xffffdfbfffbff275}}, &(0x7f0000000000), 0x8, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6f6f6d5f73626f72655fa50f2247c4269643c352409a29b2d94af041d0bc54c3901b356f33462dcf38dc") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e23, 0x4, @loopback, 0x1}, r1}}, 0x38) 09:14:16 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000008bfa30002000000000000000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2417d7fc0000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x8e, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e408a977c3f1d1716be5143d84648a27f6d2d414f81f1fdf83007cc47cee140b36f287193609cfbcad168fd029589b65fdc1ee622d688cbff73dcb9caeb9e9b73b8f9478c9f31f0be6724f1590cfd9994656ae99d7ff7fc67299a970ef9d8b406e924338492f738fd96fc28c45cd95b17df4f5950c26b6da065a6fc86c065e22d2f985862", &(0x7f00000000c0)=""/41, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x88a8ffff00000000, 0x4, 0x8f, &(0x7f0000000100)="46f1263a", &(0x7f0000000280)=""/143, 0x49}, 0x28) 09:14:16 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000088000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:16 executing program 5: r0 = socket$inet6(0xa, 0x80e, 0x7b) ioctl(r0, 0x9, &(0x7f0000000000)="0a5cc80700315f85715070") unshare(0x400) getsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@loopback}, &(0x7f0000000080)=0x14) 09:14:17 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x400000) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f00000000c0)=""/245, &(0x7f00000001c0)=0xf5) ptrace(0x4207, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$cont(0x21, r1, 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000200)={0x7fff, 0x4}) 09:14:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000600)={0x0, 0x6}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r1, 0x90}, &(0x7f0000000680)=0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x9, 0xfffffffffffffc00, 0x200, 0x3, 0x3, 0x10000, 0x9, 0x1, r2}, &(0x7f00000005c0)=0x20) r3 = shmget(0xffffffffffffffff, 0x2000, 0x780000a0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="9a0000006a0708a70eee292214a130050e96e13e326f5e57cd34a654e8a0792fee1da39b1f386bd3af6755fe22df16d1f8d5d63106b634b3aed3a24766bd03cb92ce275f73925a87cedebb2c86afd771c1b983d907ff6806b8662edde0a3b3ca0d4b87f16c44c33ae6b3a46c0799808ee35dc183bc09b30d77ffbc626bcfcb5d44ce3e50e221beef7a263337a691d45057beb028239964232aec9e7c295f"], &(0x7f0000000000)=0xa2) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r4, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="d5000000e87c86b567470d8452ba8cb8f91e3ebb2a19cf2ac8f27757898dacbdf103e7f6e534ef956c2292264725646a8e9f7428b00925d4e215c8f96bbc8420ea331cc20bd7c940170b50467fb74c9706e60a58836e45ebf7b2c0f93abac337cc2c01830b31b5451307e18da1a005d011d6440743b5cbb0540b242caeedd8cb9b93ccb5478bffbb8064ba5a6c164f614477ea4a5e0359471056adc954ead018221ad1e3515a6b30c8b4dd889ebc47a90255faf581aa73991e6dc2223e9dd5606e684944dff8ef399fe278cd40f923ee9d9360c7ec70"], &(0x7f0000000080)=0xdd) shmat(r3, &(0x7f0000ffb000/0x4000)=nil, 0x5000) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='syscall\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x0, 0x6, 0x401, 0x7fffffff, 0x10000}, &(0x7f0000000300)=0x20) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r5, 0x40045731, &(0x7f0000000140)=0x5) preadv(r5, &(0x7f00000017c0), 0x1d0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f00000000c0)=[{}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) 09:14:17 executing program 6: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000040)={@empty, 0x6a, r3}) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x251) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000005440)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005600)=[{&(0x7f0000005540)=""/163, 0xa3}], 0x1, &(0x7f0000005640)=""/190, 0xbe}}, {{&(0x7f0000005700)=@ipx, 0x80, &(0x7f0000005840), 0x1e}}], 0x2, 0x0, &(0x7f0000005d00)={0x0, 0x989680}) 09:14:17 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000008800, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x55, [0x0, 0x200001c0, 0x200001f0, 0x20000220], 0x9000, &(0x7f00000000c0), &(0x7f00000001c0)=[{}, {}, {}]}, 0x108) 09:14:17 executing program 7: r0 = socket$l2tp(0x18, 0x1, 0x1) fstatfs(r0, &(0x7f00000000c0)=""/115) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000005c0)=[{}, {}, {}], 0x3, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000280)={0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x6df, 0x0, 0x100000001, 0x89d, 0x20}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0xdc, 0x2, 0x800d, 0x3ff, 0x80, 0x7, 0x3, 0xa7d, r2}, 0x20) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x8000004) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4}, {r3}, {0xffffffffffffffff, 0x4000}], 0x4, &(0x7f0000000200), &(0x7f0000000300)={0x3}, 0x8) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000140)=0x5, 0x4) 09:14:17 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000140)=""/220, 0x1}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@ipx={0x4, 0x100, 0xdc6, "820f748e5810", 0x6}, {&(0x7f0000000000)=""/36, 0x24}, &(0x7f0000000040), 0x8}, 0xa0) 09:14:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000007002e2f66696c902fd0d400b48b0c"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f0000000180)={0xec, 0x29, 0x1, {0x0, [{{0x3}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000600)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RGETATTR(r1, &(0x7f00000006c0)={0xa0, 0x19, 0x1, {0x4}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) 09:14:17 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)={[{@meta='meta'}, {@quota='quota'}]}) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="53513475602257d6e1d9fb1ab12c5ecaef7c43da36b20a736d719f522bb87aa2fc96663b64d041c457c1ed7226390d79b0afd96e4f23d026f74dcad7fee4584a8212b8ccaf677b1081", 0x49, 0x5}], 0x40, &(0x7f0000000280)={[{@errors_remount='errors=remount-ro'}, {@fmask={'fmask', 0x3d, 0x3aa}}, {@case_sensitive_no='case_sensitive=no'}, {@show_sys_files_no='show_sys_files=no'}, {@uid={'uid', 0x3d, r0}}, {@utf8='utf8'}]}) 09:14:17 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x24) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000007c0)={0x0, 0x38}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000a00)=ANY=[], &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x101000000000}, 0x5ea813bad44acf26) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x3, 0x1000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="06050032000094560836e90615353200"], 0x1) listen(r1, 0xfffffffffffffe14) r4 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40008, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x1, 0x3, 0x3, 0xa, 0xffffffffffffff81, 0x6, 0xfffffffffffffffa}, 0x20) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000880), 0x336) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000900)={r2, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0x1e}, 0xfff}}, 0xfffffffffffffffd, 0x99fa, 0x6, 0x3ff, 0x63}, 0x98) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) sendto$inet6(r8, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000480)={0x0, 0xffff}, &(0x7f00000004c0)=0xffffffffffffff20) read(r4, &(0x7f00000006c0)=""/216, 0xd8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000540)=0x8) [ 265.328510] gfs2: not a GFS2 filesystem 09:14:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa0800450000700000000000019078ac1414bbac1414110308907800000040450000000000000000840000ac1414aaac141400444000000008d05eba3588cf0f08031e0000506c1c0ff29b1cc00000000000e000000200000000e000000100000000000000007f10000100000000ffffffff10000000e000000100000000"], &(0x7f0000000000)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x18a00, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000002cc0)=[{{&(0x7f00000001c0)=@hci, 0xfffffeb9, &(0x7f0000000440)=[{&(0x7f0000000240)=""/175, 0xaf}, {&(0x7f0000000300)=""/191, 0xbf}, {&(0x7f00000003c0)=""/93, 0x5d}], 0x3, &(0x7f0000000480)=""/181, 0xb5, 0x1ff}, 0x5}, {{&(0x7f0000000540)=@hci, 0x80, &(0x7f0000001900)=[{&(0x7f00000005c0)=""/217, 0xd9}, {&(0x7f00000006c0)=""/48, 0x30}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/119, 0x77}, {&(0x7f0000001780)=""/172, 0xfffffffffffffeac}, {&(0x7f0000001840)=""/140, 0x8c}], 0x6, &(0x7f0000001980)=""/4096, 0x1000}, 0x1000}, {{&(0x7f0000002980)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002a00)=""/11, 0xb}, {&(0x7f0000002a40)=""/125, 0x7d}, {&(0x7f0000002ac0)=""/228, 0xe4}, {&(0x7f0000002bc0)=""/2, 0x2}], 0x4, &(0x7f0000002c40)=""/90, 0x5a, 0x10000}, 0xfffffffffffffffb}], 0x3, 0x20, &(0x7f0000002d80)={0x77359400}) bind$can_raw(r0, &(0x7f0000002dc0)={0x1d, r1}, 0x10) [ 265.385699] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 265.405499] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 265.543698] WARNING: CPU: 0 PID: 7235 at mm/slab_common.c:1031 kmalloc_slab+0x56/0x70 [ 265.551831] Kernel panic - not syncing: panic_on_warn set ... [ 265.551831] [ 265.559242] CPU: 0 PID: 7235 Comm: syz-executor4 Not tainted 4.19.0-rc2-next-20180903+ #54 [ 265.567751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.577112] Call Trace: [ 265.579724] dump_stack+0x1c9/0x2b4 [ 265.583391] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.588612] panic+0x238/0x4e7 09:14:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB]) [ 265.591824] ? add_taint.cold.5+0x16/0x16 [ 265.595995] ? __warn.cold.8+0x148/0x1ba [ 265.600085] ? kmalloc_slab+0x56/0x70 [ 265.603905] __warn.cold.8+0x163/0x1ba [ 265.607825] ? kmalloc_slab+0x56/0x70 [ 265.611648] report_bug+0x252/0x2d0 [ 265.615299] do_error_trap+0x1fc/0x4d0 [ 265.619210] ? math_error+0x3e0/0x3e0 [ 265.623036] ? kfree+0x124/0x210 [ 265.626424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.631287] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 265.636337] ? p9_fid_destroy+0x9f/0xd0 [ 265.640370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.645242] do_invalid_op+0x1b/0x20 [ 265.648976] invalid_op+0x14/0x20 [ 265.652465] RIP: 0010:kmalloc_slab+0x56/0x70 [ 265.653537] IPVS: ftp: loaded support on port[0] = 21 [ 265.656892] Code: c5 40 db f2 87 5d c3 b8 10 00 00 00 48 85 ff 74 f4 83 ef 01 c1 ef 03 0f b6 87 60 da f2 87 eb d8 31 c0 81 e6 00 02 00 00 75 db <0f> 0b 5d c3 48 8b 04 c5 80 da f2 87 5d c3 66 90 66 2e 0f 1f 84 00 [ 265.656908] RSP: 0018:ffff8801b4757a38 EFLAGS: 00010246 [ 265.656925] RAX: 0000000000000000 RBX: 0000000300000000 RCX: ffffc90002e8c000 [ 265.656935] RDX: 00000000000091c2 RSI: 0000000000000000 RDI: 0000000300000000 [ 265.656949] RBP: ffff8801b4757a38 R08: ffff8801b990a240 R09: 0000000000000006 [ 265.656966] R10: ffff8801b990a240 R11: 0000000000000000 R12: fffffffffffffff4 [ 265.715470] R13: ffff880193450800 R14: ffff880193450800 R15: 0000000000608040 [ 265.722794] __kmalloc+0x25/0x720 [ 265.726268] ? __v9fs_get_acl+0xc5/0x170 [ 265.730358] __v9fs_get_acl+0xc5/0x170 [ 265.734692] v9fs_get_acl+0xe5/0x2a0 [ 265.738443] v9fs_mount+0x64b/0x900 [ 265.742088] ? v9fs_drop_inode+0x150/0x150 [ 265.746331] legacy_get_tree+0x131/0x460 [ 265.750423] ? vfs_get_tree+0x180/0x5c0 [ 265.754416] vfs_get_tree+0x1cb/0x5c0 [ 265.758341] do_mount+0x6f9/0x1e30 [ 265.761917] ? copy_mount_string+0x40/0x40 [ 265.766163] ? retint_kernel+0x10/0x10 [ 265.770069] ? copy_mount_options+0x1e3/0x380 [ 265.774583] ? audit_kill_trees+0x450/0x450 [ 265.778919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.784468] ? copy_mount_options+0x285/0x380 [ 265.788976] ksys_mount+0x12d/0x140 09:14:18 executing program 7: r0 = socket$l2tp(0x18, 0x1, 0x1) fstatfs(r0, &(0x7f00000000c0)=""/115) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000005c0)=[{}, {}, {}], 0x3, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000280)={0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x6df, 0x0, 0x100000001, 0x89d, 0x20}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0xdc, 0x2, 0x800d, 0x3ff, 0x80, 0x7, 0x3, 0xa7d, r2}, 0x20) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x8000004) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x4}, {r3}, {0xffffffffffffffff, 0x4000}], 0x4, &(0x7f0000000200), &(0x7f0000000300)={0x3}, 0x8) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000140)=0x5, 0x4) [ 265.792620] __x64_sys_mount+0xbe/0x150 [ 265.796612] ? do_syscall_64+0xca/0x820 [ 265.800599] do_syscall_64+0x1b9/0x820 [ 265.804501] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.809876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.814820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.819678] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 265.824746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.830298] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.835331] ? trace_hardirqs_off_thunk+0x1a/0x1c 09:14:18 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x24) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000007c0)={0x0, 0x38}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000a00)=ANY=[], &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x101000000000}, 0x5ea813bad44acf26) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x3, 0x1000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYBLOB="06050032000094560836e90615353200"], 0x1) listen(r1, 0xfffffffffffffe14) r4 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40008, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x1, 0x3, 0x3, 0xa, 0xffffffffffffff81, 0x6, 0xfffffffffffffffa}, 0x20) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f0000000180)={0x0, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000880), 0x336) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000900)={r2, @in6={{0xa, 0x4e24, 0x80000001, @dev={0xfe, 0x80, [], 0x1e}, 0xfff}}, 0xfffffffffffffffd, 0x99fa, 0x6, 0x3ff, 0x63}, 0x98) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"79c5f1422578700807d28b38a34aeeb3d86891afa8a4551b15932b697874a52695542e8da9fb5fce97cfbdd642105418521b7fad3f92583296406f669677e1862d7692d6c9a311e7146294e084369b9014a6f1fd4bc557be102d4405cb5636637fda03cfad529fff591d1ee79a89c43ce27a52d728991b15dfbc80570e64f3108787b44921a572b35ec90583d67a152fad6ec931e3a02e5b115cd7b03dc7a17f7eb8060abda472b4109deb521451fbf3a24ffc92ea5cae4f94fa4e27f560d3ce604455a8cad3114e3bb28d3324b748f44ed83e7838fc3c4953caeac1dc3ee3837406bacc6a00899887caf4df942f39dc9be8b4d899268e53daa6ca6807f33e587904cadc54b4c00a849fd2a5ee0a590c2184a9bd4b0a82c554879958375fd124549b85297983745915d12a3cca35317c55de36d6a14bf3e3958e52e29d5029a04c486efd084405812c6e516e17a5eeac0cf682a2381c5445f7e4e20a4a960a9520ba5234fcdc57ec535402470613c8cdef298e12792d12c95e0d0eb48dac2ebf195cda0a0200bf1685a5a7f5a08eee7ee062d1f3470ecdb566f2f4648f7bd268da0fa54da2fac6db95ce41855aad9a72a9b34a6e3e067f2d399ea5ddd416f5f1e6355225acbd34ea4ad8cdab9532a43da486a1125a62001db4bc91914ea7a172d26f3bba644cac8b20034cc373ef52a4e92d9291210f92d805ab53e931d346a9cf0e89732b13c470229d720f156e58677437aa09fb1b46844e79dfe6c89d118851a4c3fa3df9a540b1292172e69386ba5553a9dcfb348c323020778c988a4819a9f371b71af306054da222308cdb5e92a4c8d1c83a5ba734dac1690cc35d006871fd38a71aa8245b17821d86553949e2feb26afbd952f86d7f7ebe7bbbab3a5e211db7380ed8fbaa981ce351c4e1c480db980a199c5b325556f50c3d6c81151cf573399a9758f6e117fbd2789a2b0ce60ecb0cf112f9b9d608dad30cdb91101a4cac83f8c1de05d94a58863f679852d86b380c7abfc7d213a6ca30db0f88432bc559d0c2b8cc155fe7b93f680b64d74ee09ba11e5a93a8bde7f8b3898b146ed15def374f3693c4a276f1fe683b2cc6e8f9cca073d0da62586b71c5676fe83cb9abc9df74dc0c6a8136dbac039d10916061901dfbf77943f90b9beafeb0ca16fbc1101f14dd84cd14fd25000cbbd267e4025ecc0bdea846e0ab180b2a23ca33d7966fa5267dfb652cd4ac6658161c6922ec1bbb84b29d6e79e3b1db54e5275d9e7e83dbe47e4dab0d3fa9bb89b0ed288f3c58f3588302bc9138eaff81a1ee8111c84996125ea1dd5fc4a76323e35b2d2112771571b7eb9dedc6fa061d0ea5c02da1610009cd6ae50c2b0b21d91fa35fff43dabffc26d3a764e6580d13ec95586c3545420f7b7edd58b94dc0d06afe07248e964d17d185817c51db1dcfe3deccb1"}) sendto$inet6(r8, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000480)={0x0, 0xffff}, &(0x7f00000004c0)=0xffffffffffffff20) read(r4, &(0x7f00000006c0)=""/216, 0xd8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000540)=0x8) [ 265.840209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.845413] RIP: 0033:0x457099 [ 265.848617] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.867698] RSP: 002b:00007fee3f6f2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.875422] RAX: ffffffffffffffda RBX: 00007fee3f6f36d4 RCX: 0000000000457099 [ 265.882700] RDX: 0000000020000900 RSI: 0000000020000000 RDI: 0000000000000000 [ 265.889978] RBP: 00000000009300a0 R08: 0000000020000300 R09: 0000000000000000 [ 265.897257] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 265.904540] R13: 00000000004d2ec8 R14: 00000000004c7f7e R15: 0000000000000000 [ 265.912471] Dumping ftrace buffer: [ 265.916109] (ftrace buffer empty) [ 265.919808] Kernel Offset: disabled [ 265.923422] Rebooting in 86400 seconds..