[ 97.591416] audit: type=1800 audit(1552370173.631:25): pid=10301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 97.611512] audit: type=1800 audit(1552370173.651:26): pid=10301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 97.631031] audit: type=1800 audit(1552370173.661:27): pid=10301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 98.830891] sshd (10366) used greatest stack depth: 54160 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. 2019/03/12 05:56:28 fuzzer started 2019/03/12 05:56:34 dialing manager at 10.128.0.26:42131 2019/03/12 05:56:34 syscalls: 1 2019/03/12 05:56:34 code coverage: enabled 2019/03/12 05:56:34 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/12 05:56:34 extra coverage: extra coverage is not supported by the kernel 2019/03/12 05:56:34 setuid sandbox: enabled 2019/03/12 05:56:34 namespace sandbox: enabled 2019/03/12 05:56:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/12 05:56:34 fault injection: enabled 2019/03/12 05:56:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/12 05:56:34 net packet injection: enabled 2019/03/12 05:56:34 net device setup: enabled 06:00:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) syzkaller login: [ 332.914567] IPVS: ftp: loaded support on port[0] = 21 [ 333.084731] chnl_net:caif_netlink_parms(): no params data found [ 333.162657] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.169259] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.177990] device bridge_slave_0 entered promiscuous mode [ 333.188300] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.194919] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.203570] device bridge_slave_1 entered promiscuous mode [ 333.238981] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 333.251291] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 333.287498] team0: Port device team_slave_0 added [ 333.296865] team0: Port device team_slave_1 added [ 333.477613] device hsr_slave_0 entered promiscuous mode [ 333.643373] device hsr_slave_1 entered promiscuous mode [ 333.928921] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.935605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.942887] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.949441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.043046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.066031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.077726] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.089340] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.100700] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 334.124434] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.140252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.149057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.157522] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.164062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.180493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.189519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.198108] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.204732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.232242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 334.241887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.263045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 334.272916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.282163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 334.291073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.314424] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 334.324288] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 334.337778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 334.346426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.355006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.364120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.373460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.383648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 334.428057] 8021q: adding VLAN 0 to HW filter on device batadv0 06:00:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000240001000000000000000000000000006a974e4ec17c903a95d1000000ff020000000000120000000800000000"], 0x1}}, 0x0) 06:00:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) creat(&(0x7f00000001c0)='./file0\x00', 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) [ 335.386941] hrtimer: interrupt took 33580 ns 06:00:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) creat(&(0x7f00000001c0)='./file0\x00', 0x46) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) 06:00:12 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0/file0\x00', 0x0) [ 336.730481] IPVS: ftp: loaded support on port[0] = 21 06:00:12 executing program 0: chdir(0x0) symlink(&(0x7f0000000100)='..', &(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000740)='./file0\x00', 0x14100, 0x0) [ 336.956648] chnl_net:caif_netlink_parms(): no params data found [ 337.053250] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.059800] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.068730] device bridge_slave_0 entered promiscuous mode 06:00:13 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4, 0x200000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x9) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1555555555555347, 0x0, 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000200)=0x9) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x72, 0x7, 0x2, 0x5, 0x0, 0x401, 0x8800, 0x8, 0x81, 0x80, 0x9, 0x7f, 0xb0000000000, 0x1000000000, 0xff, 0x9ab4, 0x2, 0x9, 0x8, 0x2, 0x1, 0xe27, 0x6, 0x7, 0x9, 0x6, 0x400, 0x8, 0xfffffffffffffff7, 0x8, 0x1, 0x0, 0x1, 0x401, 0x2d1, 0x3ff, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0xe3ff4f9e17497b67, 0x75f, 0x1000, 0x9, 0xfffffffffffffff9, 0x73e3, 0x7ff}, r3, 0xa, r0, 0x2) [ 337.102924] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.109479] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.118126] device bridge_slave_1 entered promiscuous mode [ 337.165509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 337.196868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 337.237570] team0: Port device team_slave_0 added [ 337.246811] team0: Port device team_slave_1 added [ 337.317982] device hsr_slave_0 entered promiscuous mode [ 337.342774] device hsr_slave_1 entered promiscuous mode 06:00:13 executing program 0: syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x8, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x220000, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000300)={@empty, @local, @broadcast}, &(0x7f0000000340)=0xc) [ 337.526559] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.533199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.540398] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.547044] bridge0: port 1(bridge_slave_0) entered forwarding state 06:00:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x143800, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm], 0x1) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x4, 0x1}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000080)) [ 337.666880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.690014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.743929] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.757664] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.783592] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 337.805118] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.828506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.837043] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.843683] bridge0: port 1(bridge_slave_0) entered forwarding state 06:00:13 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000140)) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x1, 0x0, &(0x7f00000001c0)="10"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000004c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, 0x0}) [ 337.885638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.894179] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.901148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.911257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.942962] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 337.952780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.969897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.978869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.987642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.996483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.031769] binder: 10526 RLIMIT_NICE not set [ 338.036774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.063081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:00:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) unshare(0x20400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff5e) 06:00:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x40000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="fda22e7289a272097e7b8aa4faea2d49", 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000000)={0xa929, 0x97, 0x101, 0x3f, 0x6, 0xffffffffffffff7f}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="8d9bba6c3ac860541cbc5db00e213a80", 0x10) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)=0x1) 06:00:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) [ 338.543081] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 06:00:14 executing program 0: r0 = socket$kcm(0x2b, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f00000000c0)={r1}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000300)=""/222, &(0x7f0000000100)=0xde) setsockopt$sock_attach_bpf(r0, 0x6, 0xc, &(0x7f00000002c0), 0xffda) 06:00:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001780)='/dev/dlm-monitor\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)="dd0cc45119e46bbf0c1b6716277ef9a1a683e822c1b1f510d3611934157507b18c2561258e00e74c788be0f00e3190a501ae305a624d7534e1a66cdb0d201ad0192406dd2531bc0394e9efd36d34f36fb52995826920a28e360494881927e1aa131a02db4d"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x1, 0x4, 0x7}, 0x71) 06:00:14 executing program 1: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') exit(0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000000)={0x6, "3365d689ca4dbe5d157d9bdb0035630bb2d5808ca22a9e57bfaa6c79f6556f1d", 0x6, 0x408, 0x7fffffff, 0x2, 0x4, 0x3, 0x400, 0xffffffffffffff81}) syz_open_procfs(0x0, &(0x7f0000001700)='fd/3\x00') 06:00:15 executing program 0: r0 = socket$kcm(0x2b, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f00000000c0)={r1}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000300)=""/222, &(0x7f0000000100)=0xde) setsockopt$sock_attach_bpf(r0, 0x6, 0xc, &(0x7f00000002c0), 0xffda) 06:00:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) fdatasync(r0) 06:00:15 executing program 1: statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/45) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x180, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10) ioctl$FICLONE(r0, 0x40049409, r1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000700)='F', 0x1, 0xfffffffffffffffe) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) keyctl$describe(0x6, r2, &(0x7f0000000240)=""/196, 0xc4) 06:00:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xcc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000041}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001440)='/dev/cachefiles\x00', 0x101080, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001480)={@in6={{0xa, 0x4e24, 0x1, @mcast2, 0x5a9}}, 0x0, 0x20000, 0x0, "e6f69e92e72953a059adecf60c8c2c8d96cfe40bb37d228f962330591e91178b8ef7b9163b9d4243293d290a45ce4e7b124a9897ba4d4dcb4a0f07f10d2b4cfe113acade4b00b2f5d8b5e0ec1b7a4941"}, 0xd8) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/dev/cachefiles\x00'}) 06:00:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000000c0)=0x6, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xfd7b, 0x8fd, 0xffffffffffff8001, 0x1}]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x22}, 0x67, r4}) getsockopt$inet_opts(r3, 0x0, 0x400000000000021, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 06:00:15 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = fcntl$getown(r0, 0x9) migrate_pages(r2, 0x0, &(0x7f0000000080)=0x200, &(0x7f00000001c0)=0xd1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80240, 0x0) openat$cgroup_int(r3, &(0x7f0000000200)='cpu.weight\x00', 0x2, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0xfffffffffffffffc}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000140)=0x4) 06:00:15 executing program 1: socket$inet6(0xa, 0x6, 0x0) 06:00:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'nlmon0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv4_deladdr={0x28, 0x15, 0xc31, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_LOCAL={0x8, 0x2, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x404c0c4) 06:00:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xea, "b246c5d80848ff3fbd78cf2b01857e05edc0c932d35c89138ab5d1e0fef42d73f6d5f51f1092f42cf90696cca97b17b6e504da9a919fd54d95923e2edda7b3c7cf713c711164157d0fc57018aca6d2c187b92ed24ee0708c42e0dfa0aba955f9e155b966ddc264aee66a587b620e7526e97cd809f7981d144bee151b41a10637b08b50fa1ef3f45725e7f09f2059756b596842e552cc0e954b6835276b2fd25a49719126109768966131c462b4a9262e71bbe4ae4c11a4db1547f8ee05758ac4bf27358121cbe6c41a8f90c9497c879706e6db69db9c90dd055e7b7c2f055c7e5a2ae14b4da460549a80"}, &(0x7f0000000080)=0xf2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={r1, @in={{0x2, 0x4e20, @rand_addr=0x5}}, 0x2, 0x4, 0x2, 0x1e48, 0x21}, 0x98) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f00000004c0)=[{}], 0x1, 0x200) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000340)) shutdown(r0, 0x0) shutdown(r1, 0x0) 06:00:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000002d000108000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="e5ff000000000000a3e8cc01"], 0x3}}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0xffffffffffff3b8f, 0x4) 06:00:16 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0xff, @multicast2, 0x4e20, 0x0, 'wlc\x00', 0x2d, 0x6, 0x6}, 0x2c) unshare(0x2000400) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000269000/0x2000)=nil, 0x2000}, 0x1}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r3 = fcntl$getown(r1, 0x9) setpgid(r2, r3) r4 = gettid() getpriority(0x2, r4) [ 340.541558] IPVS: set_ctl: invalid protocol: 255 224.0.0.2:20000 [ 340.569754] IPVS: set_ctl: invalid protocol: 255 224.0.0.2:20000 06:00:16 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="021800001000000000000019000000000800120000000000000009000000004a10006e39498b80bc0000000000000000e000000100000000000000265bac76070000000000000000000000000000000003000600160000000200000000800000000000000000000003000500da0000000200003db28dbebb0000000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x2a) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x20, 0x2, 0x80000000}) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 06:00:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) utimes(&(0x7f0000000140)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x21c, 0x0, 0x0, 0x351) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:00:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="f00000001a0005020000000000000000ff0100000000000000000000000000017f00000100000000000000000000000000000000000000000000f000000000001ec8bfd4c5de8443439887d75e45ffab7352e265de3a96bb80a5e56d79ef5e59e6c634ffbd3a2b9c22579301323cdfd1bdc2fe78a268abb55e371cf23a7acbe3b1db3f2049fe6d114fdef2fd", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000000000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000"], 0xf0}}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x4d40, 0xffff, 0x7, 0x5}, 0x10) 06:00:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0xa, 0x3, 0x87) r2 = dup3(r1, r0, 0x80000) mq_getsetattr(r2, &(0x7f00000000c0)={0x6, 0x10001, 0x5, 0x9, 0x5c0, 0x800, 0x80000000, 0x3}, &(0x7f0000000140)) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x1f4, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) 06:00:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000200)) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000400)='em0\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_dev$usbmon(0x0, 0x9af, 0x4000) write$P9_RREADDIR(r3, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(0x0, r1, 0x0, r2, 0x0) r4 = getuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev={0xac, 0x14, 0x14, 0x19}, @in=@broadcast, 0x4e23, 0x7fff, 0x4e23, 0x0, 0xa, 0x80, 0x80, 0x7e, 0x0, r4}, {0x6, 0x2, 0x81, 0xde6, 0x1f, 0xffffffffffffff62, 0x6, 0x5}, {0x6, 0x7, 0x5, 0x5dc}, 0x7ff, 0x6e6bb3, 0x2, 0x1, 0x1, 0x2}, {{@in=@multicast1, 0x4d6, 0x3c}, 0x0, @in=@rand_addr=0x6, 0x3500, 0x0, 0x3570a4777411c724, 0x8, 0x2, 0xffffffffffffff96, 0xe27c}}, 0xe8) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000240)={0x1, 0x0, {0x8, 0x4, 0x885, 0x200}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f0000000700)) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f00000001c0)) setsockopt$sock_int(r0, 0x1, 0x1e120d70ea9120c1, &(0x7f00000003c0)=0xda9, 0x23a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = pkey_alloc(0x0, 0x2) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x2, {{0x0, 0x1}, 0x1}}, 0x18) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000040)=0x4) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, r5) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e0000519742f700000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000ffc0481be0404669a20000080005000000000100000000"], 0x58) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x1, 0x3ff, 0xfffffffffffffffe, 0x100000000}}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f00000002c0)) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) readlinkat(r2, 0x0, &(0x7f0000000740)=""/4096, 0x1000) 06:00:18 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) connect$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) io_setup(0x101, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x7f, 0x8, 0xc1f2681, 0x401}, 0x8) io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0xd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 06:00:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000100)=0x80, 0x800) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x7a, 0x9, 0x0, 0xffffffffffffff01, 0x1, [{0xfffffffffffffffa, 0x3, 0x8ad, 0x0, 0x0, 0x800}]}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ext2\x00', 0x0, &(0x7f0000000080)='-\x00') 06:00:18 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') close(r1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) sendfile(r0, r1, 0x0, 0x80000002) 06:00:18 executing program 0: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xfffffffffffffe07, 0x0, 0x1, 0x0, 0x0, 0x404c000}, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80004cb3cdea, 0x20040) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x20009, 0x80) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xc0109207, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x40, 0x2) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000040)=0x3) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)) [ 342.536473] input: syz1 as /devices/virtual/input/input5 06:00:18 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x39c}], 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x404000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000002c0)=0x1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x0, {{0x2, 0x4e21, @loopback}}}, 0x88) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000140)={0x1, 0x14, [0xd7, 0x4, 0x3, 0x7, 0x5]}) [ 342.779036] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.786098] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.793090] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.800455] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.807389] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.814284] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.821210] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.828712] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.835595] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.842499] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.849418] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 342.885668] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 342.921831] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.928891] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.935846] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.942740] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.949587] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.956520] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.963465] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.970301] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.977215] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.984101] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.990940] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 343.022707] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 06:00:19 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000004ac0)=[{{&(0x7f0000001e00)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000052c0)=[{&(0x7f0000001f80)="40b6df0436eb6f67273407d815827e5567e0f0d44f482682f559b75109e1f0dcb64eb81564f58db3a0ea3aa9f361fb0941cccd9e99ff9d275b6b1f7f0f300d7363f1ae125569f7f158b3e9915eb8c5d35c67b073cba8a8ac6bacadd579f59d6908bb5ad63ba296527807b3749785a9258c6bdb0dc8bd46eafa36aae29a9a93", 0x7f}], 0x1000000000000032}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfffffffffffffffd, @ipv4={[], [], @dev}}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0xd}, 0xfffffffffffffff7) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp\x00') setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0xffffffffffffffff, 0x4) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 06:00:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140), 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) mq_getsetattr(r1, &(0x7f0000000040)={0x0, 0x9, 0x7, 0x401, 0x5, 0x8, 0x40, 0x3f}, &(0x7f0000000080)) 06:00:19 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x9b, 0x2, 0x5, "4c53548f3bf6bd44ac304f58ee940b00", "a96e4f425c68d74ea8455a78b83ab599a51a34cea77204c80fda0afd8534dd21a9deff3eaae2a47eb1ef8b80d9103dc23502022f1e04b867fa3cb2589558776214ab80de9ae985c31c3ffc3f48c46e300b544f516e031fbb1674a3de18ec435c6778a9a3e50847993daeb3f58297e2f1f26d23111cb493a6156fc93a19371536b6c640e0dcde"}, 0x9b, 0x3) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10) getsockopt$inet6_dccp_buf(r1, 0x21, 0xcd, &(0x7f00000001c0)=""/173, &(0x7f0000000280)=0xad) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f00000002c0)={0x1000, 0x2000}) io_setup(0x0, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) io_getevents(r2, 0xed, 0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000440)={r3, r4+30000000}) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000480)={0x80000000, 0x0, 0x3ff}) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000004c0)={[0x7000, 0x3000, 0x7000, 0x7004], 0x7, 0x4, 0x1}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000580)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lchown(&(0x7f0000000540)='./file0\x00', r5, r6) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000740)) ustat(0x1000, &(0x7f0000000780)) io_setup(0x48, &(0x7f00000007c0)) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8d) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000800)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000840)=r7) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000900)={0x3, 0x52, &(0x7f0000000880)="6c22e4ed111e1b52d02ce97f14a5eb5142e23e4530c18ac9babfb24841f8b676400f2f1b091b03428a7c5846bf5acba25c252e63027dc4e77fe54c4e089e2465d9bc6b32b1fd45e68ca08338e4fb8fe2dc3d"}) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000940)=0xd7, 0x4) tee(r0, r1, 0x7f, 0x2) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000980)={0x3, 0x107, "b2e9bda9c0824ad4d51d07cf0ba62a42101bb04af566e9cfe110836c043e4b67", 0x2, 0x6, 0xffffffffffffbbad, 0x8ec, 0x202}) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000a00)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000a40)) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000a80)) openat$cgroup_int(r1, &(0x7f0000000b80)='cgroup.clone_children\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000d40)={0x7, 0x6, 0x7, 0x101, &(0x7f0000000bc0)=[{}, {}, {}, {}, {}, {}]}) execveat(r1, &(0x7f0000000dc0)='./file0\x00', &(0x7f0000001000)=[&(0x7f0000000e00)='$\xc3', &(0x7f0000000e40)='/dev/autofs\x00', &(0x7f0000000e80)='user(cgroup$user@system$selinuxeth1\x00', &(0x7f0000000ec0)='selinux#[+GPL*bdev@-self\x00', &(0x7f0000000f00)='cgroup.clone_children\x00', &(0x7f0000000f40)='/dev/video35\x00', &(0x7f0000000f80)='\xc7[\x9c-\x00', &(0x7f0000000fc0)='ppp0*:.\x00'], &(0x7f0000001140)=[&(0x7f0000001040)='ppp0}-^proc-\x00', &(0x7f0000001080)='vmnet0\x00', &(0x7f00000010c0)='nodevposix_acl_accesssystem]\x04\x00', &(0x7f0000001100)='cgroup.clone_children\x00'], 0x100) 06:00:19 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000040)) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x4) 06:00:19 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) read(r0, &(0x7f0000000400)=""/70, 0x413) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000080)=0xe8a) unshare(0x400) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) 06:00:19 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockname$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r1 = socket(0x2000000000000021, 0x2, 0x2) connect$unix(r1, &(0x7f0000001100)=@abs, 0x6e) 06:00:19 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffff66e8, 0x400) r1 = fcntl$getown(0xffffffffffffffff, 0x9) mq_notify(r0, &(0x7f0000000040)={0x0, 0x3e, 0x2, @tid=r1}) unshare(0x20400) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000400), 0x0) 06:00:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000100)='./file0\x00', 0x200080, 0x2) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000140)=0xdb) r2 = socket$nl_generic(0x10, 0x3, 0x10) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) r4 = getgid() fchown(r0, r3, r4) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000178df4b0100000000000000040000000c001600e2abb4ec760000000000"], 0x20}, 0x1, 0x300}, 0x0) [ 344.123904] IPVS: ftp: loaded support on port[0] = 21 06:00:20 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x8, 0x2000424, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x18000) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) [ 344.292891] chnl_net:caif_netlink_parms(): no params data found [ 344.411622] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.418324] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.426883] device bridge_slave_0 entered promiscuous mode [ 344.438239] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.444998] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.453706] device bridge_slave_1 entered promiscuous mode 06:00:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001140)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f40"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000000)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r3, &(0x7f0000000080)='ns/user\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 344.492131] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 344.504681] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 344.555873] team0: Port device team_slave_0 added [ 344.571441] team0: Port device team_slave_1 added [ 344.688118] device hsr_slave_0 entered promiscuous mode [ 344.723209] device hsr_slave_1 entered promiscuous mode [ 344.811323] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.817963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.825204] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.831764] bridge0: port 1(bridge_slave_0) entered forwarding state 06:00:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0xfffffffffffffffc, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0xffffffffffffffe4) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x28000, 0x80) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000100)=0x8000) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 345.057676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.116887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.138797] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.170288] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.191361] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:00:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x7, 0xa, 0x7, 0x0, 0x0, [{}, {}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x24) [ 345.224388] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.257535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.266963] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.273583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.333013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.342158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.350514] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.357082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.365044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.442581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.452106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.461223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.470096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.480270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:00:21 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80000000, 0xa00) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000140)='veth1_to_team\x00') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x2, 0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0xd0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='debugfs\x00', 0x0, &(0x7f0000000140)) [ 345.489153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.498190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.506693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.515249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.526948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 06:00:21 executing program 1: syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x20, 0x1) r0 = socket$rxrpc(0x21, 0x2, 0x20402) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000001ac0), 0x4) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x4001, 0x8000}) [ 345.664289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.671444] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 06:00:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x5) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000400)) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000007c0)={0x0, 0x0, [], @bt={0x2, 0x7, 0x1ff, 0x5, 0x2, 0xb4, 0x17, 0x8}}) r3 = fcntl$getown(r0, 0x9) kcmp(0x0, r3, 0x1, r0, r0) prctl$PR_SET_KEEPCAPS(0x8, 0x7) socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_int(r2, 0x6, 0x7, &(0x7f0000000300)=0x100000000, 0x4) tee(r0, r1, 0x4000000000000003, 0xffffffffffffffff) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000001c0)={0xffff, 0x80, 0x80}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000480)={{0x7, 0x8, 0x4, 0xb8, 0x5, 0x4}, 0x10000, 0x9, 0x7ff, 0x20, 0x4, "0c590bbf1802708099abd7516e7ec7a634855539da48ed755c20b30ef7af13167f528bd52e238fb1e48725442a4d1315b217b77ea7ef87db3e945e3a2934e0798ea56531482f30e0fdee5ecb007f4f534a103de6f1114e19938164167e45f0f9470166b89626d1264af49f77494cee9e2e8a3b7852023d51be8ced8ab972a66c"}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x1, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x4000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@broadcast, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000440)) getegid() clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) 06:00:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x6, @dev={[], 0xa}, 'syz_tun\x00'}}, 0xffbb) sendmmsg(r0, &(0x7f0000004500)=[{{0x0, 0x0, 0x0, 0xffffffffffffffd4, 0x0, 0x48}}], 0x1fe, 0x0) 06:00:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r2) dup(r5) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 06:00:22 executing program 2: clock_getres(0x5, &(0x7f0000000000)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) 06:00:22 executing program 0: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb0, 0xb0, 0xe8, [@devgroup={'devgroup\x00', 0x18}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1f0) 06:00:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000002c0)=""/107, 0x1e) getdents(r0, 0x0, 0xfffffffffffffd76) 06:00:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5dc, &(0x7f0000000040)="d50700003ce54a3188b070") syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x581000) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x584, 0x141000) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) mq_timedsend(r2, &(0x7f0000000280)="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", 0x1000, 0x1000, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab008048100000004600010700000014190001c010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 346.465977] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 06:00:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x4, 0x40, 0x3, 0x4, 0x2, 0x4}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060d50fb2f7bb40dd0000"]}) close(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) getitimer(0x0, &(0x7f00000000c0)) 06:00:22 executing program 1: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x2, 0x400000805, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="ff", 0x1}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setitimer(0x0, &(0x7f0000000100)={{}, {0x0, 0x2710}}, &(0x7f0000000180)) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'nr\x00\x00\x00\x00\x00\x00N\x97\x81\x00\x00\x00\x02\x00', 0x213}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000280), 0x4) 06:00:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000001c0)={0xa1d, "dc8f0242e15a16279c5ed528ba99036945921f425f32f86ef788decf367423ca", 0x800, 0x7, 0x3, 0x8, 0x2}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000300)=@bridge_newneigh={0x30, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @remote}}]}, 0x30}}, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x8000, 0x1, 0xffffffffffffffc0, 0x0, 0x7}, 0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) fcntl$lock(r2, 0x24, &(0x7f00000002c0)={0x3, 0x0, 0x6c28000000, 0x8, r3}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000100)={0x40, 0xf, 0x4, 0x4000000, {r4, r5/1000+10000}, {0x3, 0xb, 0x8000, 0x1000, 0x97, 0x2, "365c70c7"}, 0x4, 0x2, @offset=0x7, 0x4}) [ 346.743652] protocol 88fb is buggy, dev hsr_slave_0 [ 346.749307] protocol 88fb is buggy, dev hsr_slave_1 06:00:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x33b001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) 06:00:23 executing program 2: r0 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="5500000018007f8500fe01b2a4a280930a06000000a84308910000003900090035000c00060000001900150000000000000000dc1338d54400009b84136ef75afb83fb448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) socket$inet6(0xa, 0x6, 0x2) 06:00:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000320001000000000000000000000000001400010010000100000008000300000000004000"], 0x28}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000340)={0x2, 0x6004}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000040)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x80, @ipv4={[], [], @loopback}, 0x8}]}, &(0x7f0000000140)=0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000300)=@generic={0x3, 0x380000000000000, 0x10000}) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000280)=""/7, &(0x7f00000002c0)=0x7) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r3, 0xacf}, &(0x7f0000000200)=0x8) 06:00:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000040)=0x7, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x80, {{0x2, 0x4e22, @broadcast}}}, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) [ 347.222860] protocol 88fb is buggy, dev hsr_slave_0 [ 347.228522] protocol 88fb is buggy, dev hsr_slave_1 [ 347.253084] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 347.313221] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 347.317618] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 06:00:23 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) waitid(0x2, r0, &(0x7f00000002c0), 0x40000005, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200040, 0x0) uselib(&(0x7f0000000080)='./file0\x00') ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000340)=ANY=[@ANYBLOB="961ab5f6ffc16b10000000400000000000000000000000ffd95ba13c0000000000000000000000ee380000000000000000000000000000000000be709a000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000"]) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0xd4e, 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x10, r1, 0x0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000001c0)={0x1, @pix_mp={0x0, 0x0, 0x30314442}}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video2\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) prctl$PR_CAP_AMBIENT(0x2f, 0x5, 0x1c) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000480)={0xc6, 0x8, 0xe9, "4245e66c23f8dd9a4821cc82cd07c810704966ec9899d91a652b5d0d208099a4fc22387726755da4143a0920a09ca024dc25ae2c43fed829aaab63cbaaa497b16a35461e23fd29070b7a5097f432bab0d0e779830c382296b17ecd00fc13a3bf3bb8bf13692f8996892b176688dc63b1332684f07ce1988da64319a68f1eb81315c1b9d2b4fe8585eb7aa00c54d7c686625d9863e536c4db4c98160aa56e191e0596be31291933fefb12fc0c5a0c0942c60878e8eef0cea3d19e00da60f0dfce172521964914"}) [ 347.512965] ================================================================== [ 347.520398] BUG: KMSAN: uninit-value in __se_sys_waitid+0x32c/0xb30 [ 347.526831] CPU: 1 PID: 10805 Comm: syz-executor.2 Not tainted 5.0.0+ #11 [ 347.533768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.543139] Call Trace: [ 347.545772] dump_stack+0x173/0x1d0 [ 347.549444] kmsan_report+0x12e/0x2a0 [ 347.553294] kmsan_internal_check_memory+0x9f4/0xb10 [ 347.558462] kmsan_check_memory+0xd/0x10 [ 347.562551] __se_sys_waitid+0x32c/0xb30 [ 347.566672] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 347.572167] ? prepare_exit_to_usermode+0x114/0x420 [ 347.577213] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.582438] ? syscall_return_slowpath+0xb2/0x650 [ 347.587327] __x64_sys_waitid+0x62/0x80 [ 347.591347] do_syscall_64+0xbc/0xf0 [ 347.595106] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.600826] RIP: 0033:0x457f29 [ 347.604046] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.622973] RSP: 002b:00007f2a6b885c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 347.630703] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457f29 [ 347.637989] RDX: 00000000200002c0 RSI: 0000000000000000 RDI: 0000000000000002 [ 347.645728] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 347.653022] R10: 0000000040000005 R11: 0000000000000246 R12: 00007f2a6b8866d4 06:00:23 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000006240)=ANY=[@ANYBLOB="3c00000010000707000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c9112000c000100697036746e6c00000c0002000800080000007e63"], 0x3c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xffffffffffffffa8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x60f) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400001, 0x0) shutdown(r1, 0x1) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f00000000c0)) 06:00:23 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0xc002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r0) ioctl$TUNSETVNETBE(r2, 0x894c, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f0000000040)=0x1d) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000100)='\x00', 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x7, 0x7}) [ 347.660310] R13: 00000000004c6d82 R14: 00000000004dc5d0 R15: 00000000ffffffff [ 347.666470] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 347.667618] [ 347.667632] Local variable description: ----__pu_val120.i@__se_sys_waitid [ 347.667639] Variable was created at: [ 347.667668] __se_sys_waitid+0x18c/0xb30 [ 347.667689] __x64_sys_waitid+0x62/0x80 [ 347.667695] [ 347.667720] Disabling lock debugging due to kernel taint [ 347.704178] Kernel panic - not syncing: panic_on_warn set ... [ 347.710084] CPU: 1 PID: 10805 Comm: syz-executor.2 Tainted: G B 5.0.0+ #11 [ 347.718416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.727784] Call Trace: [ 347.730414] dump_stack+0x173/0x1d0 [ 347.734076] panic+0x3d1/0xb01 [ 347.737340] kmsan_report+0x293/0x2a0 [ 347.741205] kmsan_internal_check_memory+0x9f4/0xb10 [ 347.746385] kmsan_check_memory+0xd/0x10 [ 347.750479] __se_sys_waitid+0x32c/0xb30 [ 347.754604] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 347.760078] ? prepare_exit_to_usermode+0x114/0x420 [ 347.765120] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 347.770395] ? syscall_return_slowpath+0xb2/0x650 [ 347.775290] __x64_sys_waitid+0x62/0x80 [ 347.779288] do_syscall_64+0xbc/0xf0 [ 347.783038] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.788244] RIP: 0033:0x457f29 [ 347.791455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.810891] RSP: 002b:00007f2a6b885c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 347.818621] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457f29 [ 347.825906] RDX: 00000000200002c0 RSI: 0000000000000000 RDI: 0000000000000002 [ 347.833195] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 347.840480] R10: 0000000040000005 R11: 0000000000000246 R12: 00007f2a6b8866d4 [ 347.847766] R13: 00000000004c6d82 R14: 00000000004dc5d0 R15: 00000000ffffffff [ 347.855819] Kernel Offset: disabled [ 347.859454] Rebooting in 86400 seconds..