[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 17.816559] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.457712] random: sshd: uninitialized urandom read (32 bytes read) [ 22.792150] random: sshd: uninitialized urandom read (32 bytes read) [ 23.741211] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. [ 29.234576] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/24 13:28:02 fuzzer started [ 30.115414] random: cc1: uninitialized urandom read (8 bytes read) 2018/06/24 13:28:04 dialing manager at 10.128.0.26:41321 2018/06/24 13:28:10 syscalls: 1656 2018/06/24 13:28:10 code coverage: enabled 2018/06/24 13:28:10 comparison tracing: enabled 2018/06/24 13:28:10 setuid sandbox: enabled 2018/06/24 13:28:10 namespace sandbox: enabled 2018/06/24 13:28:10 fault injection: enabled 2018/06/24 13:28:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/06/24 13:28:10 net packed injection: enabled 13:28:18 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x428000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/212, &(0x7f0000000140)=0xd4) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8003, &(0x7f0000000180)=0x9, 0x1, 0x2) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000200)="df32c16bffb0881fb0940a50e75b2575202a30c581961a2f5006d57f75a9b9e9896f0b268c0c057f616c0ef0e318d60aa70dc21534bf1cc0be0d19f42033a78f40bc166ab326c15733242f554687ac74e8520d7c07e7276824eefdf96a7cdd8976c972526a76223c822244f3abbf4c8d639f95655d", 0x75, 0x2, 0x0, 0x1, r0}, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300)={0x100000000, 0x2, 0xfff, 0x9}, 0x8) name_to_handle_at(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0xab, 0x9, "c1bcd9e6de04098b0f77265da2a43ec8d84be4067064f2bc0aff2f2e85a5f3af3ebb6d09b2b610137cd8678420556d156aee5ab7f7051d5959d4d43044d5afcff65c6c5e440e2125a31e753cf7a2f5b6bb86838bf09cd0a18d30d3e068a0b3b336c9bad8199fcee1c93557120b735904597f22e063b928ba7c7cabf936dddfe9416b0ece955b8c227ccf50b731d5df90a45b5fe2251cf36009faace0ed262fd5ad3d5c"}, &(0x7f0000000440), 0x1000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001a80)={&(0x7f00000004c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000540)=""/226, 0xe2}, {&(0x7f0000000640)=""/246, 0xf6}, {&(0x7f0000000740)=""/130, 0x82}, {&(0x7f0000000800)=""/247, 0xf7}, {&(0x7f0000000900)=""/201, 0xc9}], 0x5, &(0x7f0000000a80)=""/4096, 0x1000, 0x100000000}, 0x10002) ioctl$TIOCSTI(r0, 0x5412, 0x8) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000001ac0)) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/autofs\x00', 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000001b40), &(0x7f0000001b80)=0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000001bc0)=0x7, 0x4) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001c00)="a465d8ff3b7410b95081208d874179527720617fed21e72c6cb7c7d0501526346236caf63bea4a3bee92d63de6ce00a034446e804de1b85f2416a09238df2290a0d30016a9f2e8c6952d1435c51e9253ae8489aabede48595753ec4bd303f4e5b1807506e1c6ccc148", 0x69) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000001c80)={'filter\x00', 0xfe, "ffbb51d35fdfa33f10a12c6464b4efa2a5306a76d101d06abd2b549047c0be525db50253a8cf829c755872c50c55c755eb1e22a1fe9fc325ae000b817ea523d733cfd56b6df547fd5f28514d3fd6504bf10da7bc84193b2718cf0873bbe632ed99ead24f182b3de04d8168aa345e2158e1c6dfafe6ac7a4d5f73f9cf3cf33f0faa539cff0423b8ef356b5f970ff8123376c0e12f590edda67bcd8cfcb1f8462edca1718edf87db8c0443d17aed399f04840115537e6f6095afc2b1b763509140fd6aeb7899baef1975a7f737836b524f8150686ad03818f126e5dfad504153f25fd88e2763820c38eed10eabfc965d3a9300d01b80ec98202c3830d97359"}, &(0x7f0000001dc0)=0x122) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/ptmx\x00', 0x10b000, 0x0) ioctl(r0, 0x7, &(0x7f0000001e40)="d6f4b44cb8aafffce35c6ad248fb79059abba6b0a0611998b3d456e1e4f57b2b3e4b4a") setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000001e80)=0x9, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000001ec0)={0x0, 0xf8, "ff0bc86db9a1f362f9246884ded60916725469683b8980ee0bcd84a9e14bcf51528161db73bf9d0ddb4ffa9cd019c69e47dc23a9c1e2bee2d34c3732c3dbc2e5c9f5aa6cc4645051d7a6d96f13c976b508c2f4052e90c54073f0e7be9418c63b7258211eb302b10b10c7758adf714fe2b928c692bae86e32bb3649b86f699d42f9c02334a290210e8ef780292c5c17f4a62cf19a4d9fe0b4042dc5761288fe73b7bfb98021b748eca35ff17c4e570dd590a264c760804b3a048b36220ee28c1fce3e87c8badb3518cbed4be2de1f74fc3dd25fa56ced6150d4c5d526382a0683da6a8eb45a7397a39eb1842affd0e467299b6ec5e2bec352"}, &(0x7f0000001fc0)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000002000)={r6, @in={{0x2, 0x4e21, @rand_addr=0x64c8}}, 0x4, 0x2, 0x709, 0x80000001, 0x20}, &(0x7f00000020c0)=0x98) get_mempolicy(&(0x7f0000002100), &(0x7f0000002140), 0x1, &(0x7f0000ffe000/0x1000)=nil, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000002180), &(0x7f00000021c0)=0x14) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002200)='/dev/ptmx\x00', 0x40, 0x0) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, &(0x7f0000002240)=""/137) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000002300), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000002340)=[@in={0x2, 0x4e23}], 0x10) socket$inet6(0xa, 0x6, 0x2) socket$inet_sctp(0x2, 0x5, 0x84) 13:28:18 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0xf001, 0x6000}) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x5}) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/158) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000180)={0x3c, @empty, 0x4e21, 0x0, 'wrr\x00', 0x8, 0x5, 0x7b}, 0x2c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000001c0)={0x1, {{0xa, 0x4e21, 0x7, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x8}}, {{0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0xca}}}, 0x108) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x80, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000340)={0x1000, 0x19, 0x5d3a, 0x4, "9e1ff7e44b1b1fd6ae2e27fcfa395216a83b9dbdf82af778fa99321396f6ed7c"}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x8, 0x5, 0x6, 0x101, 0x9}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r4, 0xb9}, &(0x7f0000000500)=0x8) r6 = openat(r2, &(0x7f0000000540)='./file0\x00', 0x0, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000580)={0x0, 0x0}) fcntl$lock(r3, 0x7, &(0x7f00000005c0)={0x3, 0x3, 0x62, 0x2, r7}) clock_settime(0x0, &(0x7f0000000600)={0x0, 0x1c9c380}) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000000640)={0xec8, {{0xa, 0x4e21, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x5}}, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffffff01}}}, 0x108) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000780)={r5, @in6={{0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}, 0x6, 0x2}, &(0x7f0000000840)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000880)={0x7, 0x4, 0x800000008000, 0xff, r5}, &(0x7f00000008c0)=0x10) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000900)={'veth1\x00', 0x8}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000940), &(0x7f0000000980)=0x14) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000b00)={&(0x7f00000009c0)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x4c, r9, 0x602, 0x70bd2a, 0x25dfdbfe, {0x3}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x67}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf00000000}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x81) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xa4, r9, 0x2, 0x70bd2b, 0x25dfdbfc, {0xa}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x13, 0x5}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0xa4}, 0x1}, 0x20004000) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000cc0)={"c4fa426150b91e038993b60df3211c54a064838769585335aedb080edd8aa0f25dd5ea4f300275333905ea7220a44a80aaba892b60fd4566f6df597a22dbf02ecafe34c44f4feedc572627b1a2abfd31b08119f1d0b3cf97aaba2c7f4bb88175a696e2fb45217d1e1b959ba8e6abc3d520513ae7fd26f176dece81ba9ac0005b2269087a314fe3f0c90f910d6927d91ece55c245f57a45f89d7f2a9c56144f18a8d65b69ca1aa507269456e9a6be9cae1071bbeebe292c89e6ba32426d9a700d532f7e3e5766dcc6b909b6ac8b379059cd0a1560e67183a37f1b17ded8e52f1cf07e4ce6cc9a7d72722e085c4a246054ef17258e803b32e5d55f29ad2b6c0a65ca0dd98f17c2d0f09f0db3a12f573098c95d076ddde0d64a1b3dbb0bb3867506b97e56ec23d1331cc85153f855b9834e89954ad2ecaae651c162dff8527226bdf8696059ec5e48bac0d1adb1c39635b85d80006ba331335ac296848fab16b8041fba67e675e0e4e1e33c9d0d0176925d30805214ac2507fbf20cbf6d23a7573c8f6bcaaf44c928533d4613f06f254aa44a35630b4a6981d62bbca7b0a42e4acc385eac6d17268f4d95a02cc226e66fcadbcd6d4ebfec3a0250b8d2c70fbee6c3f17f7448ac2271041e249fd713762d8413d8f3879d8a63fd5273a1ee1dac55b8cc09aadd9e6c77878d4258a27816b8afa61ae118c701a42050f80e722f1c5660caed1c1c5131e17981c072dce6d6f95e8ed1d7d1b6b5f39254453b5197b723faccbfa088d0992ea8feea58e9cf8cad48f068b7936fc5d7624e6afbd17b78b285463e7861fbe6f636b2e954150cab7315a5ab1d2900d9847ff690409187b870fab2a0e15124c134bded79a377b1c76b5968a342d13fc81592bceb4b7b97a168ef321acf831622594101dd7ee0116d2702f719962aad89301e3296c136cb605315a37ef9b25b3845d9fc536e495ca15ffa4e51507d20e7bd3a07c120777ba75b1661bdc8b2703d0a5698eb60b972d29306152c67716f9d9850d2a0df3a9813d250ed1b5325d6817b2d0ce4810a16f6cb230d8e4f9f57e4641507b7dfaeb7c82e61860183ab326d09cab5a7e1b430cbcb67d186dbda467dbac833b302df7756e34c8e0c0f2e37937bac9b0af2c7892710f005e11f86fa543dadc415c830cefea99ec63c4f842ded384a9056c646f6dbcca19c6bcdf89c2ecccc95dc97808117103d227e3b34ebd1c9248ca9326fe9b8503957ba0ebe31fa0c50fba88457fe26ce24d7bf8f66a272e5dde310e4a0351beff1857cedbc2dfd731aa4e1d5d152382b1f6b57738389f544f1efe04884cd0119b195a3e99de38e93076f80e2196014a67fb5b538c55d04c8a077a5ce21ee0d048c97b4d275d77739fd6258588460c90f2371dfdcab3b97f0d696e6904f5fe3b71c8550269d8e5857a6e9b494253960c303"}) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000010c0)={0xa3d, 0x6, 0x3f, 0x2, 0x7}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001100)={r8, 0x7fffffff}, &(0x7f0000001140)=0x8) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000001180)=0x1) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000011c0)='lp\x00', 0x3) 13:28:18 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffff, 0x101001) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xc6, "c0549673bb53340202c5db8470e26d433d0b848da3e290ecb63e857145dc2979332fd89a92a2482e5115064d42dba46146e82ead6b3d5a11498f2137ac62a5f2db9a3dfb8e02a51aca1c5f98e1c2f5f8febe9c21a5613a0cb7d999b8823aa8fd26bce31444f1daf0e1963162128f46d12cb5d599909b7680e5bf036cfe692be14d8e98bcd867ed7d7198fb7ce3febee05e58ead4f1cefb994343a1da2cf56eca19e5f808d283a29ceee7b550b6806e9ba9833be56346326abcdc9f30e658eece7dab0b0b352c"}, &(0x7f0000000140)=0xce) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x6, 0x1}, 0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, r2}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000240)={'syz_tun\x00', 0x9}) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r1, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0x0, 0x74, "2d3f99b5f37dbeb8de9d863ce7872c47dc41c5cf9cb3c3a3aba999cda2f532968edd884569b5594f1572a41216fbc496103b13d5b9f10f901fd076027090ebdaad96501164b3e488230ffd11b721d9a0e8f80fa22b6513a177b9009d4c7cace81f14985c8dbabd914ca69b9cabd7d1afc89c94f4"}, 0x7c) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x1000, 0x0, 0x9, 0x6, 0x3, 0x3e, 0x8001, 0x52, 0x40, 0x63, 0x0, 0x7, 0x38, 0x1, 0x0, 0xffffffff, 0x1f}, [{0x60000000, 0xffff, 0x80000000, 0x1, 0x8, 0x0, 0x3, 0x515b}, {0x0, 0x88, 0x8, 0x1f8000000000000, 0x3, 0x5, 0x5, 0xff}], "680eeedf5880b44d95a73674bd79432ff316109d06d5e392", [[], [], [], [], [], [], [], [], [], []]}, 0xac8) r4 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000f00)=""/251) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001000)={r1, 0x1b, "9c918902ba315964f1c2d5c0ea952cde49e3cafcecd7fc0b783956"}, &(0x7f0000001040)=0x23) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000001080)={r1, 0x100000000}, &(0x7f00000010c0)=0x8) setresuid(r3, r3, r3) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000001100)) connect$inet(r4, &(0x7f0000001140)={0x2, 0x4e24, @rand_addr=0xb6e}, 0x10) signalfd(r6, &(0x7f0000001180)={0x9}, 0x8) rt_sigpending(&(0x7f00000011c0), 0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000001200)={'teql0\x00', 0x80}) setsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001240)={r5, 0x1, 0x5, 0xfffffffffffeffff}, 0x10) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000001280)={0x3, 0x100000001}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000012c0)=@assoc_value, &(0x7f0000001300)=0x8) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000001340)={0x2, r0}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001380)={r5, 0x3}, 0x8) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000001400)=[@in6={0xa, 0x4e20, 0x7, @empty, 0x7}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x7}], 0x38) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440)='/dev/ptmx\x00', 0x200101, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000001480)={{0x3b, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x2, 'lc\x00', 0x20, 0x5, 0x12}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e23, 0x10000, 0x800, 0x6, 0x6}}, 0x44) 13:28:18 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x80101) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000140)={0x7, 0x390, &(0x7f0000000040)="18f15f475c45dd8e9382952505be831776eac2f0630c2b12b8eb24e05d2f92c35d614a962872e3c98ebf36c511132305af4a9e518cb5976043c080689021dff1b0443edc571034c66ec81fe2458ce29198f14cc2f97ea00e83a95ea2ac2039493d00ea8dcee58d236f18f40598ab45d5128c95c9759127c7961b326264f93a2e686c4d679233ce12f1ecb0fe3494874bb25b73a76881bc7fc48ef440282ae382b82c57335ad411", &(0x7f0000000100)="419d140b5796ba5d0ac121c9cc2d", 0xa7, 0xe}) ioctl$TIOCNOTTY(r0, 0x5422) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x89, "7dfe8f55c9099fbd380bafe1fea7d0ffad782ea42d3762e92b91c15d770d22f2f86f13443717f1f740363f8bc9a0b5edcda63bc60e42d9e8f06d545a1a2ce9da8422eb8dfa1294878d6461bad97532d6bae577897f62bd1f53fc0f115416e6c954b03d5e80860ba0735f1f25d9bbcda45c3471f6c1ddb46c11943d174e9bf8b25a25aaa34dff69836f"}, &(0x7f0000000340)=0xad) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000380)={0x0, 'ifb0\x00', 0x4}, 0x18) r1 = semget(0x0, 0x7, 0x410) semctl$GETZCNT(r1, 0x7, 0xf, &(0x7f00000003c0)=""/45) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000400)={'dummy0\x00', 0x3}) semctl$GETPID(r1, 0x7, 0xb, &(0x7f0000000440)=""/109) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000004c0)={{0x2, 0x4e24, @loopback=0x7f000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004c40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000004d40)=0xe8) recvfrom$packet(r0, &(0x7f0000000540)=""/94, 0x5e, 0x2000, &(0x7f0000004d80)={0x11, 0x8, r2, 0x1, 0x7fff, 0x6, @random="95d3b37bc4eb"}, 0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004dc0)={0x0, @multicast1, @remote}, &(0x7f0000004e00)=0xc) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000004e40)={0x2, 0x0, [{0x8, 0x5, 0x0, 0x0, @sint={0x7f, 0x7}}, {0x5, 0x3, 0x0, 0x0, @irqchip={0x8, 0x3}}]}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000004ec0)={0x0, @in6={{0xa, 0x4e20, 0x3a9, @empty, 0xff}}, 0x6, 0x100000000000, 0x7f, 0x0, 0x20}, &(0x7f0000004f80)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000004fc0)=@assoc_value={r3, 0x4}, 0x8) futex(&(0x7f0000005000), 0x1, 0x0, &(0x7f0000005040)={0x0, 0x989680}, &(0x7f0000005080), 0x1) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000050c0)=0x10, 0x4) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000005100)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000005140)=[@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) exit_group(0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000005180)='/dev/vcsa#\x00', 0x5, 0x8100) io_setup(0x3ff, &(0x7f00000051c0)=0x0) io_destroy(r5) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000005240)={0x1, &(0x7f0000005200)=[{0x5, 0x80000001, 0xffffffffffffffe1, 0x7}]}, 0x10) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000005280)) 13:28:18 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffff}, 0x2, 0xffffffff, 0x30, 0x0, @in6={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffff}, 0x111, 0x39d3598890ff000f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r3, 0x3f}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000340)={r0, 0x0, 0x1, "7f8a513612e9227f94c876f7fc092d2dbdadf76912e969446d91cf1e211cd506fe3bf40ccca8c70cc0a516e183cbe2bd3de4f14311275db3fbd06edab59c6fce00ab82f53ed521a1b036740e8e353bb056d81002d74866464559bd3382e376b8dd6a016892068ed2a023cb151cc5acdec4a30a26a95a5666bc890c85921766633b1de65dcf6a2ee6a06880d046978e46941a339765f5a79f6f537170317382633546051d19e34c9031575c39fa1efa843941d5f0873f59c93be7f21a88e03c3588ac3c9aa329eb920b2b404ca01ee2af6af6f79bd4caa0563504ad5cf7af66fc7b3caedc748e1074a083d90b8e96179931834514310af27ac9d52c2b2548a4"}) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000480)=""/196) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000580)={0x4, 0x8, 0xfa00, {r3, 0x20}}, 0x10) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000600)={0x1000, 0xffffffffffffffe1, 0xd7b9, {0x77359400}, 0x800, 0x81}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000880)={0xffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000900)={0x13, 0x10, 0xfa00, {&(0x7f0000000680), r4, 0x1}}, 0x18) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000940)=0xedfc, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000a40)={0x8, 0xea9, 0x91, &(0x7f0000000980)="97ad165e619723316b39b43bc3ba7b086d940cce74dc562045a946974006163453660020ae6c5c0f5191b1ff575814867d02fd2f07a348bf041857a66024958813c17b66eb6926b7ee2101de7e60a9fb4d7cb1dff7a81c2923809c4a1fb04b17f0372d77e2126fbd1ef84cb9b7e5792642db3d893ed75e8575e5041c60a5ea4e6d88ee628c425ffd107abf0ca518e533a3"}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/qat_adf_ctl\x00', 0x100, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000ac0)={@rand_addr=0x6}, 0x8) msgget(0x2, 0x2) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000b00)=0x2, 0x4) setns(r0, 0x42000000) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000b40)={0x0, 0x0, 0x9, 0x1000, 0x7fff}, 0xc) getsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000c00)) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000c40)) process_vm_writev(r2, &(0x7f0000000ec0)=[{&(0x7f0000000c80)=""/98, 0x62}, {&(0x7f0000000d00)=""/49, 0x31}, {&(0x7f0000000d40)=""/98, 0x62}, {&(0x7f0000000dc0)=""/216, 0xd8}], 0x4, &(0x7f0000001240)=[{&(0x7f0000000f00)=""/251, 0xfb}, {&(0x7f0000001000)=""/35, 0x23}, {&(0x7f0000001040)=""/145, 0x91}, {&(0x7f0000001100)=""/209, 0xd1}, {&(0x7f0000001200)=""/6, 0x6}], 0x5, 0x0) sendto$unix(r5, &(0x7f00000012c0)="e2f8a5ce77f6ba2f358bd909956b9ba62da5c8f61cc183f0e83ffb63b7a1", 0x1e, 0x4000000, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000001300)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000001340)) 13:28:18 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2c002, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x8) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x9261, 0x8, 0x0, 0xe0000, 0xdc06, 0x41d4410c}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$TIOCEXCL(r0, 0x540c) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000280)=[{0xff, 0xa3d, 0x0, 0x5eb6, @time={0x0, 0x1c9c380}, {0x10000, 0x80000001}, {0x6, 0x1f}, @control={0x3ff, 0x0, 0x45dce887}}, {0x3e, 0x5, 0xff, 0x3, @tick=0x5, {0x0, 0xdc8}, {0x6, 0x2}, @ext={0x74, &(0x7f00000000c0)="3bb4a9a97d64334b48b4c4bd063440fadd5d52fec2dc3556a31ee7688db4098d744291941d12af2eeb03742d5a87f6db2d28774ef37f7e6a557c1f4c4c01a13f90e4e297ff69f39b321323ca1f0f5b7b321069f582be78eeedafb29fb793788a0dd369d197d5528b0f55035a291c8ee829cb0b2f"}}, {0x1010000000000, 0x19, 0xdd54, 0xe90, @time={0x0, 0x1c9c380}, {0x7fff, 0x7}, {0x3f, 0x24}, @time=@time={r1, r2+10000000}}, {0x3ff, 0x10000, 0x3f, 0x1, @time, {0x1, 0x3}, {0x7, 0xffffffffffffaabb}, @result={0x61f0, 0x4}}, {0x7, 0x100000000, 0x1000, 0x7fffffff, @tick=0xc111, {0x40, 0xe2}, {0x8000, 0xfffffffffffffffc}, @ext={0xed, &(0x7f0000000180)="a4b087a65b5a0fc934bdb2d40728b264082242076b60a467722fc244a72b5c44ff5604de8ce7a0ad11a233c7594ef8f09c67608bc222ea22b469aeffc4a55b49165b2919abd3e6d9371f15ff5b8fcc881fc49f6941371e4ded9437c94e70d0ad507d1cb4e088d9fff0a275cafc7f40b99818047a820ffc0ae2c2ab1ea347c8cb9ee67316ab8a5a2941f1bf66762fd8eb671e5653917affc92d98b5c54154bcf80390a06bc0dd7e6103c1cb1588b3bc2b3c6a87525f0306c92eb01f9d9a4290f6a9fd069c420b6d73040c4eff7bcc9c106bfd64a19b84d803b0005bf8e1a3898ed734c7e3dc7c99b18ad155b09e"}}, {0x7fff, 0x6, 0xe345, 0x5, @time, {0x2, 0x7ff}, {0xffffffff7fffffff, 0x401}, @control={0x40, 0x8, 0x7}}, {0x9, 0xfc000000000, 0x5, 0x1, @time, {0x5, 0xfd23}, {0x0, 0x1}, @time=@time}], 0x150) ioctl(r0, 0x9a51, &(0x7f0000000400)="64f1c5bfc42ccfe7713100d5260192e206afdf163f228cb4378da6da1b1a3d3ede2e0c3c4a8916d560c65d2a12bcb97ccc3ae0016fc1b9a965a994d529e6bc80df914c83e74269b8d3610ab78b688eacf279a8f6b8debaa3eab71a929ae8812c9bc0f7672cf31558e2e25fb04360a327") ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000480)={{0x2, 0x4e23, @broadcast=0xffffffff}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xa, {0x2, 0x4e21, @loopback=0x7f000001}, 'ip6gre0\x00'}) clock_gettime(0x0, &(0x7f0000000500)) r3 = memfd_create(&(0x7f0000000540)='\x00', 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9b) fcntl$getownex(r3, 0x10, &(0x7f0000000580)={0x0, 0x0}) sched_rr_get_interval(r4, &(0x7f00000005c0)) ioctl(r0, 0xff, &(0x7f0000000600)="f66604cadd73ccac8a1f3656ac8187f64a5b390f52c8ede1") ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xebe1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000640)=0x4) semget(0x0, 0x0, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x28, &(0x7f0000000680)={0x0, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r5, 0x4, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r6, 0x28, &(0x7f0000000740)}, 0x10) rmdir(&(0x7f00000007c0)='./file0\x00') socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000008c0)={'nat\x00', 0xa9, "72b9628ed1e33426fab425745d949fcfe389c20512672b036d3d88f1351f0a9e1d1beb4237856fb5968aecce385532c3bfbb5c6f2b5d988838cad3940730585e4089de854d7d43ba57c05df14599f09ac9dfb8bd082e015ab92d05c26f2af394bca60065e348caf632f3647971307b3a255265caaa44cb55073a926604a515a0cfe4544761daa007dee02c30ee0cc0a09a18504c52dc806b75d46097de20c2ee9b0b8478bfd1341d54"}, &(0x7f00000009c0)=0xcd) timer_create(0x3, &(0x7f0000000b40)={0x0, 0x32, 0x0, @thr={&(0x7f0000000a00)="0883b1d97c031fe0a3d53f4c1c24835b2b58fe39691e83e954991928a87b9f587e66146f20c4a2df5bfbc480f105ee27ec91a00241b6a72e8277940e2626a44cd14f9a31620b3a11e4088988f9851b851ac2ccd4d03fb19b73cedc1fd34c1be8c8f260975044aab1ec447e1e8aadfce1eb194a6bb3d28bb834c31043", &(0x7f0000000a80)="d9e431fa92ef563c23b423d1073641bd3ff167fad5e95b46737134b092310babd26011e4b9697165669618369498c0308007635419d39304e5f39b7a9f91ed22f7719f18c79880f6a9da32e15317c74a38bb2e5b9ba174a584ee931061ad2378b2698a3ffd33373c8cf611ccde95f167a21a7f4f7e1c84c5c2f5e429195a4959155eaa814fa3e3f1987eefbc440fa077c4bfe20c4e8f4d49afa900d92bebcd"}}, &(0x7f0000000b80)=0x0) timer_settime(r7, 0x0, &(0x7f0000000bc0)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000c00)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000c80)={r8}) 13:28:18 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000040)=""/142, &(0x7f0000000100)=0x8e) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x4, 0x202000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r2}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000300)={0x8, 0x5, 0x15}) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000340)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/88, 0x58}, {&(0x7f0000000440)=""/133, 0x85}], 0x2, &(0x7f0000000540)=""/132, 0x84, 0x5}, 0x40) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000640)=0x3) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={r1, 0x7, 0x0, 0x401, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000700)='tls\x00', 0x4) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000740)=0x5, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000780)={0x7, 0xdfd, 0x2, {0x77359400}, 0x80, 0x1}) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000800)) getpeername$unix(r0, &(0x7f0000000840), &(0x7f00000008c0)=0x6e) rmdir(&(0x7f0000000900)='./file0\x00') write$cgroup_type(r4, &(0x7f0000000940)='threaded\x00', 0x9) flistxattr(r1, &(0x7f0000000980)=""/190, 0xbe) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockname$netlink(r4, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@remote, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000c80)={0x0, 0x400, 0xe3741c260d5bcf71, 0x7f, 0x7}, &(0x7f0000000cc0)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000d00)={r5, 0xfffffffffffffc00, 0x1, [0x80]}, &(0x7f0000000d40)=0xa) socket$inet(0x2, 0x80a, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000e00)={0x10, 0x30, 0xfa00, {&(0x7f0000000dc0)={0xffffffff}, 0x1, {0xa, 0x4e22, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, r2}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000e40)={0x11, 0x10, 0xfa00, {&(0x7f0000000d80), r6}}, 0x18) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000e80)) signalfd(r3, &(0x7f0000000ec0)={0x80000001}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000f00)={r5, 0xffffffff00000001}, &(0x7f0000000f40)=0x8) 13:28:18 executing program 7: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x2f1, 0x30}, &(0x7f0000000100)=0xc) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000140)=""/3) r3 = semget$private(0x0, 0x0, 0x429) semctl$GETZCNT(r3, 0x4, 0xf, &(0x7f0000000180)=""/5) r4 = getpgrp(0x0) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x3, 0x4, 0x2, 0x8, r4}) setsockopt$packet_int(r0, 0x107, 0x19, &(0x7f0000000200)=0xb020, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000240)={0x8, 0x3166, 0x7, 0x10000, 0x2ce}) times(&(0x7f0000000280)) rt_sigreturn() io_setup(0x574f, &(0x7f00000002c0)=0x0) io_pgetevents(r5, 0x1, 0x2, &(0x7f0000000300)=[{}, {}], &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={0x4}, 0x8}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000400)={0x80000000, 0x8, [0x2, 0x7]}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000440)={'veth0_to_team\x00', @ifru_map={0x80000000, 0xa6, 0x1, 0x8a, 0x0, 0x80000001}}) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x80000, 0x0) rt_sigaction(0x1d, &(0x7f00000004c0)={0x1, {0x4}, 0x0, 0x1}, 0x0, 0x8, &(0x7f0000000500)) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r6, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x18, r7, 0x200, 0x70bd27, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x5) semctl$IPC_INFO(r3, 0x5, 0x3, &(0x7f0000000680)=""/103) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000700)={0x90000000}) fcntl$setsig(r6, 0xa, 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(r6, 0x8934, &(0x7f0000000740)={'syz_tun\x00', 0xfa98}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000780)=r4) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x40) creat(&(0x7f00000007c0)='./file0\x00', 0x40) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000800)=""/152, &(0x7f00000008c0)=0x98) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f0000000900)={r2, @in6={{0xa, 0x4e21, 0x100000000, @empty, 0x1}}}, 0x84) [ 44.914990] IPVS: ftp: loaded support on port[0] = 21 [ 44.940926] IPVS: ftp: loaded support on port[0] = 21 [ 45.009558] IPVS: ftp: loaded support on port[0] = 21 [ 45.018288] IPVS: ftp: loaded support on port[0] = 21 [ 45.027642] IPVS: ftp: loaded support on port[0] = 21 [ 45.043973] IPVS: ftp: loaded support on port[0] = 21 [ 45.061249] IPVS: ftp: loaded support on port[0] = 21 [ 45.063533] IPVS: ftp: loaded support on port[0] = 21 [ 47.082636] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.089165] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.113534] device bridge_slave_0 entered promiscuous mode [ 47.166439] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.172820] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.202455] device bridge_slave_1 entered promiscuous mode [ 47.211739] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.218139] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.230606] device bridge_slave_0 entered promiscuous mode [ 47.238420] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.244790] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.253994] device bridge_slave_0 entered promiscuous mode [ 47.262755] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.269146] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.278932] device bridge_slave_0 entered promiscuous mode [ 47.288220] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.294600] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.302791] device bridge_slave_0 entered promiscuous mode [ 47.309962] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.316364] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.328595] device bridge_slave_0 entered promiscuous mode [ 47.345618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.354503] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.360890] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.372053] device bridge_slave_1 entered promiscuous mode [ 47.382563] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.389128] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.414281] device bridge_slave_1 entered promiscuous mode [ 47.422132] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.428499] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.437488] device bridge_slave_0 entered promiscuous mode [ 47.446518] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.452898] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.463765] device bridge_slave_1 entered promiscuous mode [ 47.470062] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.476508] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.487957] device bridge_slave_1 entered promiscuous mode [ 47.499236] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.505628] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.525603] device bridge_slave_1 entered promiscuous mode [ 47.533242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.545876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.553133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.561649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.574913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.582158] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.588503] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.618386] device bridge_slave_0 entered promiscuous mode [ 47.640945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.648177] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.654625] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.674350] device bridge_slave_1 entered promiscuous mode [ 47.682220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.690893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.699191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.716284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.742267] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.748691] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.795198] device bridge_slave_1 entered promiscuous mode [ 47.809741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.824455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.910562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.964704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.975306] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.058255] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.079873] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.111749] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.135853] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.146591] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.158691] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.233374] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.254695] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.285594] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.310202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.321154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.357198] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.410604] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.455896] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.476078] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.561301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.568276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.588250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.595185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.622315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.629337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.658675] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.672713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.691876] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.713239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.721554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.753506] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 48.781661] team0: Port device team_slave_0 added [ 48.809860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.816728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.826481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.866743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.932111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 48.947792] team0: Port device team_slave_1 added [ 48.958558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.973424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 49.002212] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.019378] team0: Port device team_slave_0 added [ 49.027733] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.040671] team0: Port device team_slave_0 added [ 49.053294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.078394] team0: Port device team_slave_0 added [ 49.107182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.118762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 49.137243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.148667] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.156506] team0: Port device team_slave_0 added [ 49.163141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.172466] team0: Port device team_slave_1 added [ 49.180176] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.193963] team0: Port device team_slave_0 added [ 49.207304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.222946] team0: Port device team_slave_1 added [ 49.245600] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.265714] team0: Port device team_slave_1 added [ 49.284921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.305952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.327812] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.336309] team0: Port device team_slave_1 added [ 49.343972] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.360799] team0: Port device team_slave_1 added [ 49.368952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.378077] team0: Port device team_slave_0 added [ 49.391931] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 49.406937] team0: Port device team_slave_0 added [ 49.430403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.439632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.459933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.479734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.494674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.503316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.520337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.533355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.545331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.555104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.566506] team0: Port device team_slave_1 added [ 49.573696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.582404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.590766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 49.606343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.615231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 49.628350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.651537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.663105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.672700] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 49.680890] team0: Port device team_slave_1 added [ 49.686460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.693652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.705663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.718806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.728685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.736155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.748843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 49.759096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.778596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.790461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.802000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 49.809678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.818973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.825807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 49.835480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.843484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.852387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.861442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.871591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.878520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.911824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.935416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.943508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.951351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.959072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.966702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 49.974390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.981989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.989279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.997487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.006676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.013901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.023859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.049352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.063065] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.071899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.081535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 50.110761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.133432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 50.151501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.166785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.174723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.185715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.192965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.201240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.211371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.220225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.227731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.241480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.249673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.257966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.269506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.291071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.318652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.363745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.373439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.387999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.429698] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.436857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.457596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.341057] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.347550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.354494] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.360880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.371573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.479129] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.485530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.492196] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.498574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.509775] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.527083] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.533470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.540153] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.546528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.555192] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.582862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.612831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.644935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.673670] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.680065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.687247] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.693614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.701624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.722606] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.728981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.735594] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.741966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.790134] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.802534] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.808937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.815597] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.821950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.829979] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.857804] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.864232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.870883] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.877275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.936956] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.963049] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.969449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.976148] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.982527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.050610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.640323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.653599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.671800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.678921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.686510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.591475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.629570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.657131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.871839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.894686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.054876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.092567] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.105567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.122316] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.133922] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.144769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.325837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.375311] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.512284] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.526356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.547742] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.554198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.567994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.595803] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.602123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.620499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.660887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.667434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.676270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.698925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.877117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.883379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.902699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.948618] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.955704] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.962068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.975101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.006610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.013754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.038459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.049328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.078818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.108203] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.137822] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.159324] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.201828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.208345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.222573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.370218] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.402269] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.507776] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.592495] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.737830] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.963095] QAT: Invalid ioctl 13:28:34 executing program 7: sched_setattr(0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)={0xffffffffc0000001}) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x0) close(r2) epoll_wait(r3, &(0x7f0000cd8ff4)=[{}], 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000000040)={&(0x7f0000011000/0x1000)=nil, 0x1000}) 13:28:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') rt_sigprocmask(0x1, &(0x7f0000000000)={0x3}, &(0x7f0000000140), 0x8) getdents64(r0, &(0x7f0000000200)=""/78, 0x24) getdents(r0, &(0x7f0000000080)=""/188, 0xbc) 13:28:34 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) r1 = socket$inet6(0xa, 0x4, 0x9bb1) ioctl(r1, 0x8912, &(0x7f0000000040)="295ed277a4200100360070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x1, {{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0xffffffffffffffca) r2 = socket$inet(0x15, 0x400000080005, 0x0) connect$inet(r2, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) socket$inet(0x2, 0x0, 0xfffffffffffffffd) r3 = semget(0x3, 0x2, 0x6) semctl$IPC_INFO(r3, 0x1, 0x3, &(0x7f0000000340)=""/250) getsockopt$sock_buf(r2, 0x1, 0x10000000001c, &(0x7f00000005c0)=""/220, &(0x7f00000000c0)=0x10000037d) 13:28:34 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x14800, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000002c0)=""/76) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x70b5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000200)) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r2, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0xff65) close(r2) 13:28:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x280, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000340)={@multicast2, @empty, @rand_addr}, &(0x7f0000000380)=0xc) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000001000), 0x89, 0x0, &(0x7f0000000000), &(0x7f0000000180), 0x2) setrlimit(0xb, &(0x7f0000000080)={0x4, 0x2c}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x400, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000002c0)={0x3e, 0x2}, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000002100)=ANY=[], &(0x7f0000000040)) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7ff, 0x40000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000200)={r4}, &(0x7f0000000240)=0x8) 13:28:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=r0, 0x4) write(r1, &(0x7f0000000040)="0c9495932667ccb18396636511040f7b129e61dee00a1df4c3e10ae1c9822d4427d9e6bea4ff37033072413b8aa0c353f0c1f87a11b089af9ca88332202c00f72a9d010f91d15a08b3ac57e1d1543287e68292f08a864a6410bb904d38dc1160576ef48b57f1e6525f248d4e2d0c2d53c6be59230ce4e8dcc2c81458f02e5561c571f9", 0x83) r2 = socket$inet6(0xa, 0xa, 0x6) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0xeb2, 0x3, 0x1, 0x2, 0x100000001, 0x9, 0xfff, 0x0, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x2, 0x4, 0x5, 0x3, r3}, 0x10) epoll_create1(0xffffffffffffffff) 13:28:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x10000, 0x8fffd) sendmsg$nl_generic(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x2f, 0x0, 0x70bd25, 0x25dfdbfe, {0xf}, [@nested={0x18, 0x85, [@typed={0x14, 0x7c, @ipv6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}]}, @typed={0x8, 0x26, @u32=0x3}, @nested={0x24, 0x5b, [@typed={0x8, 0x1b, @fd=r0}, @typed={0xc, 0x42, @str='bond0\x00'}, @generic="27c845d4d1049a5306a86a15"]}]}, 0x58}, 0x1, 0x0, 0x0, 0x48080}, 0x4000) ioctl$sock_SIOCETHTOOL(r2, 0x8948, &(0x7f00000000c0)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}) close(r2) close(r1) 13:28:34 executing program 4: r0 = socket$inet6(0xa, 0x8001, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000040)="295ee1311f16f477671070") r1 = socket(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @loopback}, &(0x7f00000001c0)=0xc) sendmsg$xdp(r1, &(0x7f00000026c0)={&(0x7f0000001600)={0x2c, 0x5, r2, 0x1c}, 0x10, &(0x7f0000002680)=[{&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="8b9f76b9913508", 0x7}], 0x2, 0x0, 0x0, 0x40000}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmmsg$unix(r1, &(0x7f0000006c00)=[{&(0x7f00000033c0)=@abs, 0x6e, &(0x7f00000035c0), 0x0, &(0x7f0000003ac0)=[@cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}], 0x40}], 0x1, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x204, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000080)={0x0, 0x1aee3fbd}) [ 61.523951] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 13:28:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/54, 0x36}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r0, &(0x7f0000c34fff), 0x100000009) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) ioctl$TCXONC(r1, 0x540a, 0x1) 13:28:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000b3b000), 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x200, 0x2) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) syz_emit_ethernet(0x12, &(0x7f0000591fee)=ANY=[@ANYBLOB], &(0x7f0000746ff0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xa000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000040)={0x3, &(0x7f0000000380)=[{}, {}, {}]}) syz_emit_ethernet(0x108, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x0, 0x4, [0x1d2, 0xbc5, 0x7d3, 0xb6a]}) r3 = shmget(0x0, 0x3000, 0x1024, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) 13:28:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x51) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0xd8) sendto$inet6(r0, &(0x7f0000000000)="15", 0x0, 0x40, &(0x7f00000011c0)={0xa, 0x0, 0x40000000, @dev={0xfe, 0x80, [], 0x20}, 0x40000000000}, 0x1a0) 13:28:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x4) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x200000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x6) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x783, 0x4) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) 13:28:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = getpgrp(0xffffffffffffffff) get_robust_list(r1, &(0x7f0000000340)=&(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f0000000380)=0x18) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000080)=0x5, &(0x7f0000000100)=0x4) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x101000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x50, &(0x7f0000000180)}, 0x10) ppoll(&(0x7f0000000400)=[{r3, 0x1608}, {r4, 0x4000}, {r0}, {r2, 0x4}], 0x4, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0), 0x8) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x1, 0x2, &(0x7f0000cc3ff0), &(0x7f00000000c0), 0x0) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000003c0)=""/39) 13:28:35 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) socketpair$inet(0x2, 0x1002, 0x9, &(0x7f0000000000)) getpeername(r0, &(0x7f0000000040)=@llc, &(0x7f00000000c0)=0x80) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = dup3(r1, r0, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000001c0)=""/4096) 13:28:35 executing program 6: msync(&(0x7f0000952000/0x1000)=nil, 0x1000, 0x1) r0 = socket(0xa, 0x80001, 0x101) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x20000, 0x0) r2 = msgget(0x0, 0x10) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="03000000000000002c3ac9e8df77c2c63e6fd89530495cb0bab99fb07ceee2d59f73881c924c311bf2d0b364fafce2cc43931dc3324c8944f15652b292769c9d4a"], 0x41, 0x800) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000080)={0x100000001, 0x2, 0xfffffffffffeffff}) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x3, 0xfffffffffffffe00, 0x81, 0x3}, 0x8) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000140)={0x7, 0x7ff, 0x3, 0x8000}) 13:28:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000facfff)="06", 0x1, r1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x40000, 0x0) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000280)) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000580)="b3", 0x1, r1) keyctl$update(0x2, r4, &(0x7f0000000340)="df02754677212dfc3e2abcb244e22773e8e1cfef09742258cbae7b26fdc3ffa615d9da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa0238014e3293535d1c0066d28e0f275188b4b4c187e18774fc2227cbb6610fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f2525100400000003e7dc2f8fd85adcd88ca30e75b1e143262d94defa187e482a9b9a9a387353df7a21affce4e9149e040000000000000065afd9", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r4, r2}, &(0x7f0000000140)=""/5, 0x5, &(0x7f00000001c0)={&(0x7f0000a3dffa)={'sha224-generic\x00'}}) socket$inet_udp(0x2, 0x2, 0x0) [ 61.905484] Unknown ioctl 22017 [ 61.927028] ================================================================== [ 61.934525] BUG: KASAN: slab-out-of-bounds in sha256_final+0x303/0x380 [ 61.941194] Write of size 4 at addr ffff8801d6dcb3e0 by task syz-executor3/6681 [ 61.948637] [ 61.950258] CPU: 1 PID: 6681 Comm: syz-executor3 Not tainted 4.18.0-rc1+ #115 [ 61.957518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.966863] Call Trace: [ 61.969448] dump_stack+0x1c9/0x2b4 [ 61.973071] ? dump_stack_print_info.cold.2+0x52/0x52 [ 61.978248] ? printk+0xa7/0xcf [ 61.981513] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 61.986252] ? sha256_final+0x303/0x380 [ 61.990214] print_address_description+0x6c/0x20b [ 61.995052] ? sha256_final+0x303/0x380 [ 61.999031] kasan_report.cold.7+0x242/0x2fe [ 62.003425] __asan_report_store4_noabort+0x17/0x20 [ 62.008425] sha256_final+0x303/0x380 [ 62.012223] crypto_shash_final+0x104/0x260 [ 62.016528] ? sha256_generic_block_fn+0x70/0x70 [ 62.021271] __keyctl_dh_compute+0x1198/0x1be0 [ 62.025860] ? copy_overflow+0x30/0x30 [ 62.029745] ? __sched_text_start+0x8/0x8 [ 62.033879] ? save_stack+0xa9/0xd0 [ 62.037515] ? lock_release+0xa30/0xa30 [ 62.041481] ? check_same_owner+0x340/0x340 [ 62.045821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 62.051361] ? _copy_from_user+0xdf/0x150 [ 62.055507] keyctl_dh_compute+0xc5/0x11f [ 62.059645] ? __keyctl_dh_compute+0x1be0/0x1be0 [ 62.064389] ? syscall_slow_exit_work+0x500/0x500 [ 62.069225] __x64_sys_keyctl+0x12a/0x3b0 [ 62.073365] do_syscall_64+0x1b9/0x820 [ 62.077237] ? finish_task_switch+0x1d3/0x890 [ 62.081735] ? syscall_return_slowpath+0x5e0/0x5e0 [ 62.086672] ? syscall_return_slowpath+0x31d/0x5e0 [ 62.091600] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 62.096956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 62.101784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.106961] RIP: 0033:0x455a99 [ 62.110145] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 62.129413] RSP: 002b:00007fbecb83ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 62.137126] RAX: ffffffffffffffda RBX: 00007fbecb83f6d4 RCX: 0000000000455a99 [ 62.144383] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000017 [ 62.151631] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 62.158880] R10: 0000000000000005 R11: 0000000000000246 R12: 00000000ffffffff [ 62.166127] R13: 00000000004bfd68 R14: 00000000004cefb8 R15: 0000000000000000 [ 62.173381] [ 62.174988] Allocated by task 6681: [ 62.178602] save_stack+0x43/0xd0 [ 62.182044] kasan_kmalloc+0xc4/0xe0 [ 62.185756] __kmalloc+0x14e/0x760 [ 62.189289] __keyctl_dh_compute+0x1000/0x1be0 [ 62.193848] keyctl_dh_compute+0xc5/0x11f [ 62.197973] __x64_sys_keyctl+0x12a/0x3b0 [ 62.202106] do_syscall_64+0x1b9/0x820 [ 62.205975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.211140] [ 62.212749] Freed by task 1: [ 62.215758] save_stack+0x43/0xd0 [ 62.219200] __kasan_slab_free+0x11a/0x170 [ 62.223412] kasan_slab_free+0xe/0x10 [ 62.227189] kfree+0xd9/0x260 [ 62.230280] acpi_ex_stop_trace_method+0x1bf/0x1cb [ 62.235202] acpi_ds_terminate_control_method+0x5ab/0x5bc [ 62.240746] acpi_ps_parse_aml+0x4af/0x86a [ 62.244979] acpi_ps_execute_method+0x521/0x597 [ 62.249636] acpi_ns_evaluate+0x717/0x9bc [ 62.253774] acpi_evaluate_object+0x48c/0x8cf [ 62.258270] acpi_evaluate_integer+0x129/0x280 [ 62.262854] acpi_bus_get_status_handle+0x26/0xa0 [ 62.267695] acpi_bus_check_add+0x3b5/0xb60 [ 62.272021] acpi_ns_walk_namespace+0x224/0x400 [ 62.276690] acpi_walk_namespace+0xf2/0x12c [ 62.281032] acpi_bus_scan+0x146/0x170 [ 62.284922] acpi_scan_init+0x403/0x8fe [ 62.288902] acpi_init+0x941/0xa19 [ 62.292442] do_one_initcall+0x127/0x913 [ 62.296501] kernel_init_freeable+0x49b/0x58e [ 62.300994] kernel_init+0x11/0x1b3 [ 62.304620] ret_from_fork+0x3a/0x50 [ 62.308325] [ 62.309951] The buggy address belongs to the object at ffff8801d6dcb3c0 [ 62.309951] which belongs to the cache kmalloc-32 of size 32 [ 62.322447] The buggy address is located 0 bytes to the right of [ 62.322447] 32-byte region [ffff8801d6dcb3c0, ffff8801d6dcb3e0) [ 62.334583] The buggy address belongs to the page: [ 62.339511] page:ffffea00075b72c0 count:1 mapcount:0 mapping:ffff8801da8001c0 index:0xffff8801d6dcbfc1 [ 62.348955] flags: 0x2fffc0000000100(slab) [ 62.353182] raw: 02fffc0000000100 ffffea00075b11c8 ffff8801da801248 ffff8801da8001c0 [ 62.361050] raw: ffff8801d6dcbfc1 ffff8801d6dcb000 000000010000003f 0000000000000000 [ 62.368911] page dumped because: kasan: bad access detected [ 62.374599] [ 62.376206] Memory state around the buggy address: [ 62.381122] ffff8801d6dcb280: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 62.388473] ffff8801d6dcb300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 62.395816] >ffff8801d6dcb380: 00 00 00 fc fc fc fc fc 00 00 00 00 fc fc fc fc [ 62.403244] ^ [ 62.409731] ffff8801d6dcb400: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 62.417071] ffff8801d6dcb480: 00 00 00 00 fc fc fc fc 00 fc fc fc fc fc fc fc [ 62.424407] ================================================================== [ 62.431744] Disabling lock debugging due to kernel taint [ 62.438346] Kernel panic - not syncing: panic_on_warn set ... [ 62.438346] [ 62.445726] CPU: 1 PID: 6681 Comm: syz-executor3 Tainted: G B 4.18.0-rc1+ #115 [ 62.454385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.463736] Call Trace: [ 62.466337] dump_stack+0x1c9/0x2b4 [ 62.469964] ? dump_stack_print_info.cold.2+0x52/0x52 [ 62.475161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 62.479919] panic+0x238/0x4e7 [ 62.483113] ? add_taint.cold.5+0x16/0x16 [ 62.487263] ? do_raw_spin_unlock+0xa7/0x2f0 [ 62.491674] ? do_raw_spin_unlock+0xa7/0x2f0 [ 62.496090] ? sha256_final+0x303/0x380 [ 62.500063] kasan_end_report+0x47/0x4f [ 62.504037] kasan_report.cold.7+0x76/0x2fe [ 62.508362] __asan_report_store4_noabort+0x17/0x20 [ 62.513983] sha256_final+0x303/0x380 [ 62.517783] crypto_shash_final+0x104/0x260 [ 62.522099] ? sha256_generic_block_fn+0x70/0x70 [ 62.526840] __keyctl_dh_compute+0x1198/0x1be0 [ 62.531410] ? copy_overflow+0x30/0x30 [ 62.535283] ? __sched_text_start+0x8/0x8 [ 62.539415] ? save_stack+0xa9/0xd0 [ 62.543038] ? lock_release+0xa30/0xa30 [ 62.546992] ? check_same_owner+0x340/0x340 [ 62.551306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 62.556826] ? _copy_from_user+0xdf/0x150 [ 62.560958] keyctl_dh_compute+0xc5/0x11f [ 62.565088] ? __keyctl_dh_compute+0x1be0/0x1be0 [ 62.569829] ? syscall_slow_exit_work+0x500/0x500 [ 62.574655] __x64_sys_keyctl+0x12a/0x3b0 [ 62.578783] do_syscall_64+0x1b9/0x820 [ 62.582649] ? finish_task_switch+0x1d3/0x890 [ 62.587127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 62.592041] ? syscall_return_slowpath+0x31d/0x5e0 [ 62.596955] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 62.602302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 62.607130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.612298] RIP: 0033:0x455a99 [ 62.615467] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 62.634666] RSP: 002b:00007fbecb83ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 62.642363] RAX: ffffffffffffffda RBX: 00007fbecb83f6d4 RCX: 0000000000455a99 [ 62.649625] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000017 [ 62.656886] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 62.664137] R10: 0000000000000005 R11: 0000000000000246 R12: 00000000ffffffff [ 62.671396] R13: 00000000004bfd68 R14: 00000000004cefb8 R15: 0000000000000000 [ 62.679125] Dumping ftrace buffer: [ 62.682644] (ftrace buffer empty) [ 62.686337] Kernel Offset: disabled [ 62.689944] Rebooting in 86400 seconds..