[info] Using makefile-style concurrent boot in runlevel 2. [ 24.449473] audit: type=1800 audit(1545626344.546:21): pid=5832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.497917] audit: type=1800 audit(1545626344.546:22): pid=5832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. 2018/12/24 04:39:18 fuzzer started 2018/12/24 04:39:20 dialing manager at 10.128.0.26:33943 2018/12/24 04:39:20 syscalls: 1 2018/12/24 04:39:20 code coverage: enabled 2018/12/24 04:39:20 comparison tracing: enabled 2018/12/24 04:39:20 setuid sandbox: enabled 2018/12/24 04:39:20 namespace sandbox: enabled 2018/12/24 04:39:20 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/24 04:39:20 fault injection: enabled 2018/12/24 04:39:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/24 04:39:20 net packet injection: enabled 2018/12/24 04:39:20 net device setup: enabled 04:41:30 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwritev(r0, &(0x7f0000001580)=[{&(0x7f0000000440)="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", 0xbc1}], 0x1, 0x2) syzkaller login: [ 170.090337] IPVS: ftp: loaded support on port[0] = 21 04:41:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000640)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) sendmmsg(r1, &(0x7f000000bc00)=[{{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000002d80)="dbc6c8a9f76e2be036808e8646abb29f6dc088f27e1041f896c550ba6f4856a714747ac93dff6d8a75dd69bcd4280c138e77a759867870c98a34d9e361b7204012ba0569bbbd92bfa9b75a88c52ef4bf1d228977fa27fc98f4098914cd0d7d39", 0x60}], 0x1}, 0x5}], 0x1, 0x40000) [ 170.349497] IPVS: ftp: loaded support on port[0] = 21 04:41:30 executing program 2: r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.594461] IPVS: ftp: loaded support on port[0] = 21 04:41:30 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@empty, @dev, [], {@arp={0x8104, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="dce13542dd7c", @local, @local, @dev}}}}, 0x0) [ 170.976360] IPVS: ftp: loaded support on port[0] = 21 04:41:31 executing program 4: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)) 04:41:31 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) close(r0) [ 171.452057] IPVS: ftp: loaded support on port[0] = 21 [ 171.623268] IPVS: ftp: loaded support on port[0] = 21 [ 171.874976] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.889317] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.906597] device bridge_slave_0 entered promiscuous mode [ 172.005115] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.020787] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.028546] device bridge_slave_1 entered promiscuous mode [ 172.141446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.273260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.439454] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.459848] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.467693] device bridge_slave_0 entered promiscuous mode [ 172.591834] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.603969] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.617299] device bridge_slave_1 entered promiscuous mode [ 172.639289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.714870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.780515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.804852] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.811305] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.820811] device bridge_slave_0 entered promiscuous mode [ 172.833188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.949445] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.958375] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.971761] device bridge_slave_1 entered promiscuous mode [ 173.128110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.233388] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.286129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.306266] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.324686] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.331780] device bridge_slave_0 entered promiscuous mode [ 173.364060] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.404106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.411752] team0: Port device team_slave_0 added [ 173.440597] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.468153] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.475871] device bridge_slave_1 entered promiscuous mode [ 173.501255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.512871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.554374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.561702] team0: Port device team_slave_1 added [ 173.599830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.618855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.633007] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.639377] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.663664] device bridge_slave_0 entered promiscuous mode [ 173.670312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.682464] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.689820] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.697565] device bridge_slave_0 entered promiscuous mode [ 173.708176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.729437] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.739521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.754378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.764509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.796958] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.812115] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.838060] device bridge_slave_1 entered promiscuous mode [ 173.844913] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.851258] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.859029] device bridge_slave_1 entered promiscuous mode [ 173.879973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.907622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.923311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.931132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.955533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.976769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 174.008796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.059470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.068125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.080359] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 174.088058] team0: Port device team_slave_0 added [ 174.104866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.114882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.124341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.142387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.174339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.182148] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 174.201071] team0: Port device team_slave_1 added [ 174.244828] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.333327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 174.340209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.353707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.376764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.448097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.467772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.488229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.515619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.525756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 174.534494] team0: Port device team_slave_0 added [ 174.551040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.574012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.590443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.601621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.613681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.633794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.657295] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 174.668058] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 174.676142] team0: Port device team_slave_1 added [ 174.689551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.716861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.734008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.750386] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.767857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.793256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.844299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.865780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.890656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.911654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.005367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 175.012551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.024738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.110256] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 175.131607] team0: Port device team_slave_0 added [ 175.162156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 175.197155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.223490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.286754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 175.304175] team0: Port device team_slave_1 added [ 175.330423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 175.344988] team0: Port device team_slave_0 added [ 175.449574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 175.457424] team0: Port device team_slave_0 added [ 175.471330] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 175.497891] team0: Port device team_slave_1 added [ 175.529906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 175.537792] team0: Port device team_slave_1 added [ 175.544207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.572072] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.578662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.585798] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.592166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.617190] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 175.625407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.640353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.657874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 175.668624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.681799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.698074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.721144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.750716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.771592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.780197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.788291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.799232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 175.815467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 175.833630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.841588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.888877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.910090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.924349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 175.946240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.953981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.961939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.984942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 175.998767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 176.018497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.033442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.041339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.064014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.094451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 176.101576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.110412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.164536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 176.171664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.185263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.313076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.384734] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.391242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.398107] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.404527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.417110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 176.749960] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.756378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.763013] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.769349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.807324] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 177.260075] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.266595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.273290] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.279658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.289652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 177.390202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.408973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.430507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.450988] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.457410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.464088] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.470464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.478279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 177.604889] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.611276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.617992] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.624378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.637723] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.422382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.444394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.490377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.860384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.041778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.263920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 181.270127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.283284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.574462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.585927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.734822] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.986751] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.054822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.070869] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.083373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.099868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.236978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.298570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.452515] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.471621] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.501690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.515060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.536265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.731816] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.768368] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.896248] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.931466] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.943531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.963040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.119874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 183.132717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.163859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.219246] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 183.236165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.253636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.424427] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.551418] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.707175] 8021q: adding VLAN 0 to HW filter on device team0 04:41:44 executing program 0: 04:41:44 executing program 0: 04:41:45 executing program 0: 04:41:45 executing program 0: 04:41:45 executing program 0: 04:41:45 executing program 0: 04:41:45 executing program 0: 04:41:45 executing program 1: 04:41:45 executing program 2: 04:41:46 executing program 3: 04:41:46 executing program 4: 04:41:46 executing program 0: 04:41:46 executing program 1: 04:41:46 executing program 2: 04:41:46 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) close(r0) 04:41:46 executing program 3: 04:41:46 executing program 1: 04:41:46 executing program 2: 04:41:46 executing program 0: 04:41:46 executing program 4: 04:41:46 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) close(r0) 04:41:46 executing program 4: 04:41:46 executing program 1: 04:41:46 executing program 0: 04:41:46 executing program 3: 04:41:46 executing program 4: 04:41:46 executing program 2: 04:41:46 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) close(r0) 04:41:46 executing program 0: 04:41:46 executing program 1: 04:41:46 executing program 3: 04:41:46 executing program 2: 04:41:46 executing program 4: 04:41:46 executing program 3: 04:41:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0xa70, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001100000000000000000076657468315f746f5f626f6e6400000069705f76746930000000000000000000726f736530000000000000000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000000000000000000000000000000080900000809000040090000616d6f6e6700000000000000000000000000000000000000000000000000000038080000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414bb000000006d616300000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000003000000000000000000626f6e645f736c6176655f300000000000000000000000000000000000000000726f736530000200000000000000000069706464703000000000000000000000e915b0505f73000000000000aaaaaaaaaaaa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff000000000000000000000000000000000000000000000000000000000000000000000000000000ab02000000ffffffff00000000"]}, 0xae8) 04:41:46 executing program 5: close(0xffffffffffffffff) 04:41:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x121141, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 04:41:46 executing program 4: 04:41:46 executing program 2: 04:41:46 executing program 3: [ 186.579966] ebt_among: wrong size: 2104 against expected 1056, rounded to 1056 04:41:46 executing program 0: 04:41:46 executing program 4: 04:41:46 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) close(r0) 04:41:46 executing program 1: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_pid(r0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') write$FUSE_OPEN(r0, 0x0, 0x0) 04:41:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000240), 0x0) 04:41:46 executing program 2: pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)='q', 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000480)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 04:41:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeffffdef) 04:41:46 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) close(r0) 04:41:46 executing program 0: memfd_create(&(0x7f0000000100)='X\xf7\xff\xd3Ps\xa3\xba\x10\xb6P\xc2P%\x1d#\xf3h\xad\x12\xa04\xcb\xd8\x16\x9c\xa3V\n\xa0\x91\xe3\xb3\xb3\xb1\x99$\xe3\x9d\xdf\x1e\x1e3w/', 0x20000006) 04:41:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r2 = dup(r0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000280)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ftruncate(r3, 0xee72) arch_prctl$ARCH_GET_GS(0x1004, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) getegid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001c40)={{{@in6, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)=0x289) lstat(&(0x7f0000001980)='./bus\x00', &(0x7f0000006200)) lstat(0x0, 0x0) getuid() stat(&(0x7f0000004500)='./bus\x00', &(0x7f0000004540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000047c0)) getresuid(&(0x7f0000005b00), &(0x7f0000005b40), &(0x7f0000005b80)) fstat(0xffffffffffffffff, &(0x7f0000005bc0)) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:41:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) unlink(0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYBLOB="c500000071f4c8fbbf21113ce5933f3ad3460940e4d7b2cb5cf12612f479ee136554575a733a4c891083235103ad69725f741343fd4da1ab59d5d3220da0f66e365e59d4066b35174ad79c99f0f5894d1c8912387fc76a901b05068dbccf46af61d4ec4dbd668dd4ec86e9924ead3136a10fd32a2bcfe38918bad7493a59296396ad9ba7654d97ac4d6c07df7f836d9bbfec41613b5f19413945829e92e8d9e0e4f44f74300c7430bbf87b13d7ba5a335d63bc23880042f913ed5958297173133fd25cb637c56c8d20"], 0x0) 04:41:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) close(r0) 04:41:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.cpus\x00@\xa9-\xeb\xdd\x1d\xaav\xdc\x86BY\x91\xe7\xd3ByR\xeb\t\xe18~p#\x10\x1e\xc2+!r%\xf8U\xb2\xa2\xf98`', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendfile(r1, r2, 0x0, 0x1) 04:41:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) close(r0) [ 187.014164] hrtimer: interrupt took 28532 ns 04:41:47 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) close(0xffffffffffffffff) 04:41:47 executing program 1: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_pid(r0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') write$FUSE_OPEN(r0, 0x0, 0x0) 04:41:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x2, 0x0, 0x1, 0x2, 0x0, 0x0, 0x9672, 0x0, 0x0, 0x4, 0x0, 0x9, 0x80, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x8, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) 04:41:47 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) modify_ldt$write(0x1, 0x0, 0xffffffffffffff40) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) dup3(r0, r1, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) 04:41:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.cpus\x00@\xa9-\xeb\xdd\x1d\xaav\xdc\x86BY\x91\xe7\xd3ByR\xeb\t\xe18~p#\x10\x1e\xc2+!r%\xf8U\xb2\xa2\xf98`', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendfile(r1, r2, 0x0, 0x1) 04:41:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="850000001514c7ea1c0000000000002139b1070000000000"], 0x0}, 0x48) 04:41:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001040)=0x166) 04:41:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001040)) 04:41:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.cpus\x00@\xa9-\xeb\xdd\x1d\xaav\xdc\x86BY\x91\xe7\xd3ByR\xeb\t\xe18~p#\x10\x1e\xc2+!r%\xf8U\xb2\xa2\xf98`', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) sendfile(r1, r2, 0x0, 0x1) 04:41:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffbf034}, {0x80000006}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3d9, &(0x7f0000000500)={@local, @random="9faa7bed30e1", [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x6, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 04:41:48 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r0) 04:41:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) 04:41:48 executing program 1: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_pid(r0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') write$FUSE_OPEN(r0, 0x0, 0x0) 04:41:48 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f0000000140)='\x00', 0x1, 0x0) 04:41:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:48 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/128, &(0x7f0000000080)=0x80) request_key(0x0, 0x0, &(0x7f00000001c0)='-*%*{\x00', 0xfffffffffffffffe) 04:41:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x22, &(0x7f0000ad2000), &(0x7f0000000080)=0xfdd2) 04:41:48 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x17, 0x68, &(0x7f00000001c0)="efce69810e248ef432d069aa1501f9f265e0a61dd25a0f406836218fe5895e67910f0727cfc6c5dc7c9f6a0d830ca246761fbf1758e542b10d9114c849e3d4451e1e573a9337f20f08ac1957a04b30b1eb5c6512febfc73468083fca98cc06ff8747f8f05521cf2b"}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000140)={0x6, 0x4, 0x8, 0x2}, 0x10) ioctl$TIOCCONS(r2, 0x541d) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0xffffffffffffffff, 0x4) pause() ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000340)=@generic={0x1, 0x7, 0x4}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) ioctl$TIOCNXCL(r2, 0x540d) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000a00)) r4 = getpgrp(0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000380)={0x1, r4}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000240)=@get={0x1, &(0x7f00000002c0)=""/118, 0x5db}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b00)={r5, &(0x7f0000000a40)="a81cd9a1e090a99bb721609b1a7a10c82b13326cebcd345eeada459a38d4198f46f81a77f9643bb7c32094a0dae533d29351f69ab7a6a1be89dfd28012ca4a640d3b25e9b61b5d1bd917465cf3e465887aa5d8f6a069f393b34069a7503baf523655e5850b563c7304c01130e40195e12f64", 0x0}, 0x18) ftruncate(r5, 0x7fff) sendfile(r2, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 04:41:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 188.744487] IPVS: length: 128 != 8 [ 188.756412] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 188.758288] IPVS: length: 128 != 8 04:41:49 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff0200000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed00000"], 0x0) 04:41:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2002102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000380)=[@window={0x3, 0x0, 0x800}, @mss], 0x2037) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) 04:41:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 04:41:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="35000000060000"], 0x7) 04:41:49 executing program 1: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_pid(r0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') write$FUSE_OPEN(r0, 0x0, 0x0) 04:41:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x4080, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r3 = dup(r1) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ftruncate(r4, 0xee72) arch_prctl$ARCH_GET_GS(0x1004, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000001d40)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)=0x289) lstat(&(0x7f0000001980)='./bus\x00', &(0x7f0000006200)) lstat(0x0, 0x0) getuid() stat(&(0x7f0000004500)='./bus\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000047c0)) getresuid(&(0x7f0000005b00), &(0x7f0000005b40), &(0x7f0000005b80)) fstat(r0, &(0x7f0000005bc0)) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:41:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:49 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:41:49 executing program 4: futex(&(0x7f0000000080), 0x8b, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 04:41:49 executing program 3: 04:41:49 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:41:49 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet6_udp_int(r0, 0x11, 0x73, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[], &(0x7f0000000600)) getresgid(0x0, &(0x7f0000001cc0), &(0x7f0000001bc0)) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x0, 0xe6fc, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x6, 0x5, 0x7, 0xb31f, 0x175, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x2, 0x9, 0x100000000, 0x0, 0x0, 0x800, 0x100000000, 0x3f, 0x7, 0x1548, 0x77, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0x6, 0x0, 0x6, 0x5, 0x9, 0x10000}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000840)={0x20, 0xe0, 0x74}) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f0000000100)={0x6, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) getuid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) 04:41:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:49 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:41:49 executing program 4: 04:41:49 executing program 3: 04:41:49 executing program 1: 04:41:49 executing program 4: 04:41:49 executing program 5: 04:41:49 executing program 3: 04:41:49 executing program 4: 04:41:49 executing program 5: 04:41:49 executing program 3: 04:41:50 executing program 4: 04:41:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:52 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:41:52 executing program 5: 04:41:52 executing program 3: 04:41:52 executing program 4: 04:41:52 executing program 1: 04:41:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:52 executing program 3: 04:41:52 executing program 5: 04:41:52 executing program 4: 04:41:52 executing program 1: 04:41:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:52 executing program 3: 04:41:55 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:41:55 executing program 5: 04:41:55 executing program 1: 04:41:55 executing program 4: 04:41:55 executing program 3: 04:41:55 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:55 executing program 3: 04:41:55 executing program 5: 04:41:55 executing program 4: 04:41:55 executing program 1: 04:41:55 executing program 3: 04:41:55 executing program 5: 04:41:58 executing program 1: 04:41:58 executing program 4: 04:41:58 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$cont(0x20, r0, 0x0, 0x0) 04:41:58 executing program 3: 04:41:58 executing program 5: 04:41:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:41:58 executing program 3: 04:41:58 executing program 4: ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/hci\x00') 04:41:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r3, 0xffff, 0x1}, 0x8) 04:41:58 executing program 1: 04:41:59 executing program 4: 04:41:59 executing program 1: 04:41:59 executing program 3: 04:42:01 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$cont(0x20, r0, 0x0, 0x0) 04:42:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:42:01 executing program 4: 04:42:01 executing program 1: 04:42:01 executing program 3: 04:42:01 executing program 5: 04:42:01 executing program 4: 04:42:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="20097be8682bdcde750973368898da64b0919a0f"], 0x14) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2, 0x8dffffff}, 0xfffc}}, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000600)={'L-', 0x81}, 0x28, 0x3) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000580)={0x0, 0xffffffff, 0xffffffffffffffff, 0x5, 0x9, 0x4}, &(0x7f00000005c0)=0x14) 04:42:01 executing program 1: 04:42:02 executing program 5: 04:42:02 executing program 4: 04:42:02 executing program 1: 04:42:04 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$cont(0x20, r0, 0x0, 0x0) 04:42:04 executing program 5: 04:42:04 executing program 1: 04:42:04 executing program 3: 04:42:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:42:04 executing program 4: 04:42:05 executing program 3: 04:42:05 executing program 4: 04:42:05 executing program 1: 04:42:05 executing program 5: 04:42:05 executing program 3: 04:42:05 executing program 1: 04:42:08 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:42:08 executing program 4: 04:42:08 executing program 5: 04:42:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:42:08 executing program 3: 04:42:08 executing program 1: 04:42:08 executing program 3: 04:42:08 executing program 4: 04:42:08 executing program 5: 04:42:08 executing program 1: 04:42:08 executing program 4: 04:42:08 executing program 1: 04:42:11 executing program 5: 04:42:11 executing program 3: 04:42:11 executing program 1: 04:42:11 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:42:11 executing program 4: 04:42:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 04:42:11 executing program 3: 04:42:11 executing program 5: 04:42:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x600000000000000, [0x4000007b], [0xc2]}) 04:42:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x1ca) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) capset(0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 04:42:11 executing program 3: 04:42:11 executing program 5: [ 211.083217] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 211.167396] ================================================================== [ 211.174933] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 211.181522] Write of size 832 at addr ffff8881c3d28bc0 by task syz-executor1/8098 [ 211.189148] [ 211.190792] CPU: 1 PID: 8098 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 211.199286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.208649] Call Trace: [ 211.211241] dump_stack+0x244/0x39d 04:42:11 executing program 5: 04:42:11 executing program 3: 04:42:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x600000000000000, [0x6e0, 0x0, 0x49], [0xc2]}) [ 211.214882] ? dump_stack_print_info.cold.1+0x20/0x20 [ 211.220079] ? printk+0xa7/0xcf [ 211.223362] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 211.228136] print_address_description.cold.4+0x9/0x1ff [ 211.233629] ? fpstate_init+0x50/0x160 [ 211.237536] kasan_report.cold.5+0x1b/0x39 [ 211.241784] ? fpstate_init+0x50/0x160 [ 211.245683] ? fpstate_init+0x50/0x160 [ 211.249669] check_memory_region+0x13e/0x1b0 [ 211.254086] memset+0x23/0x40 [ 211.257309] fpstate_init+0x50/0x160 [ 211.261314] kvm_arch_vcpu_init+0x3e9/0x870 [ 211.265777] kvm_vcpu_init+0x2fa/0x420 [ 211.269679] ? vcpu_stat_get+0x300/0x300 [ 211.274067] ? kmem_cache_alloc+0x33f/0x730 [ 211.278379] vmx_create_vcpu+0x1b7/0x2695 [ 211.282524] ? vmx_exec_control+0x210/0x210 [ 211.286837] ? kasan_check_write+0x14/0x20 [ 211.291059] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 211.295992] ? wait_for_completion+0x8a0/0x8a0 [ 211.300566] ? print_usage_bug+0xc0/0xc0 [ 211.304639] kvm_arch_vcpu_create+0xe5/0x220 [ 211.309055] ? kvm_arch_vcpu_free+0x90/0x90 [ 211.313396] kvm_vm_ioctl+0x526/0x2030 [ 211.313424] ? kvm_unregister_device_ops+0x70/0x70 [ 211.313446] ? mark_held_locks+0x130/0x130 [ 211.313465] ? __lock_acquire+0x62f/0x4c20 [ 211.313501] ? __lock_acquire+0x62f/0x4c20 [ 211.313541] ? mark_held_locks+0x130/0x130 [ 211.313553] ? graph_lock+0x270/0x270 [ 211.313582] ? find_held_lock+0x36/0x1c0 [ 211.322482] ? __fget+0x4aa/0x740 [ 211.322502] ? lock_downgrade+0x900/0x900 [ 211.322530] ? check_preemption_disabled+0x48/0x280 [ 211.322552] ? kasan_check_read+0x11/0x20 [ 211.339440] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 211.339456] ? rcu_read_unlock_special+0x370/0x370 [ 211.339481] ? __fget+0x4d1/0x740 [ 211.347319] ? ksys_dup3+0x680/0x680 [ 211.347339] ? __might_fault+0x12b/0x1e0 [ 211.347357] ? lock_downgrade+0x900/0x900 [ 211.347376] ? lock_release+0xa00/0xa00 [ 211.393534] ? perf_trace_sched_process_exec+0x860/0x860 [ 211.398989] ? kvm_unregister_device_ops+0x70/0x70 [ 211.403915] do_vfs_ioctl+0x1de/0x1790 [ 211.407804] ? ioctl_preallocate+0x300/0x300 [ 211.412209] ? __fget_light+0x2e9/0x430 [ 211.416261] ? fget_raw+0x20/0x20 [ 211.419708] ? _copy_to_user+0xc8/0x110 [ 211.423681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.429207] ? put_timespec64+0x10f/0x1b0 [ 211.433346] ? finish_task_switch+0x1f4/0x910 [ 211.437833] ? nsecs_to_jiffies+0x30/0x30 [ 211.441975] ? do_syscall_64+0x9a/0x820 [ 211.445945] ? do_syscall_64+0x9a/0x820 [ 211.449909] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 211.454483] ? security_file_ioctl+0x94/0xc0 [ 211.458887] ksys_ioctl+0xa9/0xd0 [ 211.462335] __x64_sys_ioctl+0x73/0xb0 [ 211.466216] do_syscall_64+0x1b9/0x820 [ 211.470102] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 211.475457] ? syscall_return_slowpath+0x5e0/0x5e0 [ 211.480378] ? trace_hardirqs_on_caller+0x310/0x310 [ 211.485384] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 211.490392] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 211.497048] ? __switch_to_asm+0x40/0x70 [ 211.501094] ? __switch_to_asm+0x34/0x70 [ 211.505150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.509985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.515163] RIP: 0033:0x457669 [ 211.518346] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.537235] RSP: 002b:00007f401ee47c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 211.544935] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 211.552192] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 211.559452] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 211.566708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f401ee486d4 [ 211.573967] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 211.581235] [ 211.582852] Allocated by task 8098: [ 211.586470] save_stack+0x43/0xd0 [ 211.589916] kasan_kmalloc+0xcb/0xd0 [ 211.593622] kasan_slab_alloc+0x12/0x20 [ 211.597585] kmem_cache_alloc+0x130/0x730 [ 211.601721] vmx_create_vcpu+0x110/0x2695 [ 211.605858] kvm_arch_vcpu_create+0xe5/0x220 [ 211.610253] kvm_vm_ioctl+0x526/0x2030 [ 211.614129] do_vfs_ioctl+0x1de/0x1790 [ 211.618005] ksys_ioctl+0xa9/0xd0 [ 211.621447] __x64_sys_ioctl+0x73/0xb0 [ 211.625319] do_syscall_64+0x1b9/0x820 [ 211.629196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.634365] [ 211.635977] Freed by task 0: [ 211.638975] (stack is not available) [ 211.642670] [ 211.644286] The buggy address belongs to the object at ffff8881c3d28b80 [ 211.644286] which belongs to the cache x86_fpu of size 832 [ 211.656686] The buggy address is located 64 bytes inside of [ 211.656686] 832-byte region [ffff8881c3d28b80, ffff8881c3d28ec0) [ 211.668461] The buggy address belongs to the page: [ 211.673384] page:ffffea00070f4a00 count:1 mapcount:0 mapping:ffff8881d743d840 index:0x0 [ 211.681515] flags: 0x2fffc0000000200(slab) [ 211.685744] raw: 02fffc0000000200 ffff8881d553fb48 ffffea0007305fc8 ffff8881d743d840 [ 211.693617] raw: 0000000000000000 ffff8881c3d28040 0000000100000004 0000000000000000 [ 211.701482] page dumped because: kasan: bad access detected [ 211.707178] [ 211.708791] Memory state around the buggy address: [ 211.713705] ffff8881c3d28d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 211.721049] ffff8881c3d28e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 211.728395] >ffff8881c3d28e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 211.735735] ^ [ 211.741168] ffff8881c3d28f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 211.748530] ffff8881c3d28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 211.755867] ================================================================== [ 211.763219] Disabling lock debugging due to kernel taint [ 211.776021] Kernel panic - not syncing: panic_on_warn set ... [ 211.781935] CPU: 1 PID: 8098 Comm: syz-executor1 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 211.791814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.800381] kobject: 'kvm' (0000000085049193): kobject_uevent_env [ 211.801162] Call Trace: [ 211.801181] dump_stack+0x244/0x39d [ 211.801199] ? dump_stack_print_info.cold.1+0x20/0x20 [ 211.807529] kobject: 'kvm' (0000000085049193): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 211.809995] ? fpstate_init+0x30/0x160 [ 211.810014] panic+0x2ad/0x632 [ 211.834819] ? add_taint.cold.5+0x16/0x16 [ 211.838960] ? preempt_schedule+0x4d/0x60 [ 211.843097] ? ___preempt_schedule+0x16/0x18 [ 211.847519] ? trace_hardirqs_on+0xb4/0x310 [ 211.851843] ? fpstate_init+0x50/0x160 [ 211.855722] end_report+0x47/0x4f [ 211.859162] kasan_report.cold.5+0xe/0x39 [ 211.863305] ? fpstate_init+0x50/0x160 [ 211.867182] ? fpstate_init+0x50/0x160 [ 211.871058] check_memory_region+0x13e/0x1b0 [ 211.875451] memset+0x23/0x40 [ 211.878549] fpstate_init+0x50/0x160 [ 211.882262] kvm_arch_vcpu_init+0x3e9/0x870 [ 211.886575] kvm_vcpu_init+0x2fa/0x420 [ 211.890449] ? vcpu_stat_get+0x300/0x300 [ 211.894502] ? kmem_cache_alloc+0x33f/0x730 [ 211.898816] vmx_create_vcpu+0x1b7/0x2695 [ 211.902954] ? vmx_exec_control+0x210/0x210 [ 211.907274] ? kasan_check_write+0x14/0x20 [ 211.911501] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 211.916430] ? wait_for_completion+0x8a0/0x8a0 [ 211.921000] ? print_usage_bug+0xc0/0xc0 [ 211.925062] kvm_arch_vcpu_create+0xe5/0x220 [ 211.929455] ? kvm_arch_vcpu_free+0x90/0x90 [ 211.933783] kvm_vm_ioctl+0x526/0x2030 [ 211.937673] ? kvm_unregister_device_ops+0x70/0x70 [ 211.942601] ? mark_held_locks+0x130/0x130 [ 211.946827] ? __lock_acquire+0x62f/0x4c20 [ 211.951054] ? __lock_acquire+0x62f/0x4c20 [ 211.955281] ? mark_held_locks+0x130/0x130 [ 211.959503] ? graph_lock+0x270/0x270 [ 211.963298] ? find_held_lock+0x36/0x1c0 [ 211.967350] ? __fget+0x4aa/0x740 [ 211.970791] ? lock_downgrade+0x900/0x900 [ 211.974924] ? check_preemption_disabled+0x48/0x280 [ 211.979925] ? kasan_check_read+0x11/0x20 [ 211.984062] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 211.989328] ? rcu_read_unlock_special+0x370/0x370 [ 211.994251] ? __fget+0x4d1/0x740 [ 211.997694] ? ksys_dup3+0x680/0x680 [ 212.001398] ? __might_fault+0x12b/0x1e0 [ 212.005449] ? lock_downgrade+0x900/0x900 [ 212.009591] ? lock_release+0xa00/0xa00 [ 212.013555] ? perf_trace_sched_process_exec+0x860/0x860 [ 212.018993] ? kvm_unregister_device_ops+0x70/0x70 [ 212.023914] do_vfs_ioctl+0x1de/0x1790 [ 212.027792] ? ioctl_preallocate+0x300/0x300 [ 212.032190] ? __fget_light+0x2e9/0x430 [ 212.036163] ? fget_raw+0x20/0x20 [ 212.039606] ? _copy_to_user+0xc8/0x110 [ 212.043571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.049095] ? put_timespec64+0x10f/0x1b0 [ 212.053227] ? finish_task_switch+0x1f4/0x910 [ 212.057712] ? nsecs_to_jiffies+0x30/0x30 [ 212.061850] ? do_syscall_64+0x9a/0x820 [ 212.065812] ? do_syscall_64+0x9a/0x820 [ 212.069773] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 212.074342] ? security_file_ioctl+0x94/0xc0 [ 212.078738] ksys_ioctl+0xa9/0xd0 [ 212.082178] __x64_sys_ioctl+0x73/0xb0 [ 212.086057] do_syscall_64+0x1b9/0x820 [ 212.089935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 212.095284] ? syscall_return_slowpath+0x5e0/0x5e0 [ 212.100213] ? trace_hardirqs_on_caller+0x310/0x310 [ 212.105218] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 212.110223] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 212.117582] ? __switch_to_asm+0x40/0x70 [ 212.121636] ? __switch_to_asm+0x34/0x70 [ 212.125688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.130525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.135701] RIP: 0033:0x457669 [ 212.138890] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.157785] RSP: 002b:00007f401ee47c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 212.165491] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 212.172749] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 212.180120] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 212.187379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f401ee486d4 [ 212.194638] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 212.202954] Kernel Offset: disabled [ 212.206582] Rebooting in 86400 seconds..