[ 64.424149] audit: type=1800 audit(1542317043.471:25): pid=6638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 64.443418] audit: type=1800 audit(1542317043.471:26): pid=6638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 64.462850] audit: type=1800 audit(1542317043.491:27): pid=6638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 65.866240] sshd (6704) used greatest stack depth: 53448 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. 2018/11/15 21:24:21 fuzzer started 2018/11/15 21:24:26 dialing manager at 10.128.0.26:36127 2018/11/15 21:24:26 syscalls: 1 2018/11/15 21:24:26 code coverage: enabled 2018/11/15 21:24:26 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/15 21:24:26 setuid sandbox: enabled 2018/11/15 21:24:26 namespace sandbox: enabled 2018/11/15 21:24:26 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/15 21:24:26 fault injection: enabled 2018/11/15 21:24:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/15 21:24:26 net packed injection: enabled 2018/11/15 21:24:26 net device setup: enabled 21:27:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0xffffffffffffffcd) syzkaller login: [ 255.807141] IPVS: ftp: loaded support on port[0] = 21 [ 258.219175] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.225927] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.234733] device bridge_slave_0 entered promiscuous mode [ 258.375946] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.382572] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.391241] device bridge_slave_1 entered promiscuous mode [ 258.530389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 258.671094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 259.101311] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 259.244723] bond0: Enslaving bond_slave_1 as an active interface with an up link 21:27:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x20}, 0x20}}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') [ 260.043745] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.051859] team0: Port device team_slave_0 added [ 260.224412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.232709] team0: Port device team_slave_1 added [ 260.441245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.469211] IPVS: ftp: loaded support on port[0] = 21 [ 260.678824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 260.686028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.695001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.917457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 260.925393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.934735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.185991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.193812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.203226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.556429] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.563057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.570043] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.576661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.585560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 264.161951] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.168595] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.177357] device bridge_slave_0 entered promiscuous mode [ 264.332694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.435190] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.441671] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.450704] device bridge_slave_1 entered promiscuous mode [ 264.729099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 264.878944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.524638] bond0: Enslaving bond_slave_0 as an active interface with an up link 21:27:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="c03e71cb06f3260f350f588a849b6766c7442400fc0000006766c74424020a0000006766c744240600000000670f011424660f6f5ebb670f01c92e3e0f4d5b0a0f01bfe64a0f01cf26f30f1b91eb74", 0x4f}], 0x1, 0x0, &(0x7f0000000140), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)) [ 265.806307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.116566] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 266.123872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.456772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 266.464141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.540690] IPVS: ftp: loaded support on port[0] = 21 [ 267.412257] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.420469] team0: Port device team_slave_0 added [ 267.766938] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.775084] team0: Port device team_slave_1 added [ 268.060395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 268.067828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.076817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.284044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 268.291155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.300238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.531144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.539033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.547876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.785341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.793420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.802892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.907568] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.914326] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.922944] device bridge_slave_0 entered promiscuous mode [ 271.286671] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.293307] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.301849] device bridge_slave_1 entered promiscuous mode [ 271.631084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 271.883671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.929417] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.935960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.943035] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.949492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.958590] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 272.663242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.802697] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.046250] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 273.310576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 273.317777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.547078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 273.554254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:27:33 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc008551b, &(0x7f0000000080)) [ 274.446654] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.455045] team0: Port device team_slave_0 added [ 274.688326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.794911] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.803334] team0: Port device team_slave_1 added [ 275.147832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 275.155053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.163892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.541622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 275.548928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.557654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.590408] IPVS: ftp: loaded support on port[0] = 21 [ 275.866239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.874040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.883352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.117119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 276.125047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.134176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.150019] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.485655] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 277.492715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.500443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.755464] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.147231] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.153862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.160817] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.167461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.176726] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 280.723882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.556707] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.563440] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.572085] device bridge_slave_0 entered promiscuous mode [ 281.961972] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.968667] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.977435] device bridge_slave_1 entered promiscuous mode [ 282.349734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 282.660426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 283.756945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 284.161971] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.506845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 284.514220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.843796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 284.850958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.625028] 8021q: adding VLAN 0 to HW filter on device bond0 21:27:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) [ 285.888187] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 285.896374] team0: Port device team_slave_0 added [ 286.290104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 286.298202] team0: Port device team_slave_1 added [ 286.731853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 286.739118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.748089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.103278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 287.110385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.119252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.199471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 287.269126] IPVS: ftp: loaded support on port[0] = 21 [ 287.437579] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 287.445353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.454395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:27:46 executing program 0: memfd_create(&(0x7f0000000000)=',eth0cgrouptrusted:\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000500)={0x0, 0x4c9, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000004c0)}}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e20, @rand_addr=0x32f}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 287.750913] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 287.887456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 287.895383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.904509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:27:47 executing program 0: memfd_create(&(0x7f0000000000)=',eth0cgrouptrusted:\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000500)={0x0, 0x4c9, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000004c0)}}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e20, @rand_addr=0x32f}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:27:47 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000300)) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x80a, 0x101) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r2, r3, &(0x7f0000000180), 0x100000001) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') renameat(r3, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00') lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) [ 288.844565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 288.851013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.859128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.903400] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) 21:27:48 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000300)) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x80a, 0x101) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r2, r3, &(0x7f0000000180), 0x100000001) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') renameat(r3, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00') lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 21:27:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000080)={0x7, 0x101, 0x4, {0x0, 0xffef, 0x9, 0x1}}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x1, 0x5, 0x2, 0x1, {0x8, 0x3, 0x2b9b}}) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000040)=0xacc) 21:27:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xff, 0xa0400) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000200)=""/84, &(0x7f0000000280)=0x54) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000040)={{&(0x7f000091d000/0x3000)=nil, 0x3000}, 0x1}) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000180)={0xffffffff, "1339eb1c61f29b3c0fbe40214bdc07aad12e68df329fc37b141556ae1b6c40d4", 0x1, 0x1}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video35\x00', 0x2, 0x0) write$input_event(r1, &(0x7f00000002c0)={{0x77359400}, 0x3, 0x7, 0xfffffffffffffffe}, 0x18) userfaultfd(0x800) [ 290.403602] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.680494] not chained 10000 origins [ 290.684393] CPU: 1 PID: 7544 Comm: ip Not tainted 4.20.0-rc2+ #87 [ 290.690636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.700040] Call Trace: [ 290.702703] dump_stack+0x32d/0x480 [ 290.706387] ? save_stack_trace+0xc6/0x110 [ 290.710665] kmsan_internal_chain_origin+0x222/0x240 [ 290.715834] ? kmsan_internal_chain_origin+0x136/0x240 [ 290.721155] ? __msan_chain_origin+0x6d/0xb0 [ 290.725593] ? __save_stack_trace+0x833/0xc60 [ 290.730116] ? save_stack_trace+0xc6/0x110 [ 290.734378] ? kmsan_internal_chain_origin+0x136/0x240 [ 290.739682] ? kmsan_memcpy_origins+0x13d/0x190 [ 290.744380] ? __msan_memcpy+0x6f/0x80 [ 290.748303] ? nla_put+0x20a/0x2d0 [ 290.751866] ? br_port_fill_attrs+0x42b/0x1ea0 [ 290.756471] ? br_port_fill_slave_info+0xff/0x120 [ 290.761356] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 290.765905] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 290.770434] ? netlink_dump+0xc79/0x1c90 [ 290.774534] ? netlink_recvmsg+0xec2/0x19d0 [ 290.778895] ? sock_recvmsg+0x1d1/0x230 [ 290.782905] ? ___sys_recvmsg+0x444/0xae0 [ 290.787089] ? __se_sys_recvmsg+0x2fa/0x450 [ 290.791436] ? __x64_sys_recvmsg+0x4a/0x70 [ 290.795705] ? do_syscall_64+0xcf/0x110 [ 290.799725] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.805201] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 290.810338] ? kmsan_internal_chain_origin+0x1e3/0x240 [ 290.815657] ? kmsan_internal_chain_origin+0x136/0x240 [ 290.820960] ? __msan_chain_origin+0x6d/0xb0 [ 290.825401] ? save_stack_trace+0xfa/0x110 [ 290.829663] ? kmsan_internal_chain_origin+0x136/0x240 [ 290.834971] ? kmsan_memcpy_origins+0x13d/0x190 [ 290.839679] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 290.845159] ? in_task_stack+0x12c/0x210 [ 290.849288] __msan_chain_origin+0x6d/0xb0 [ 290.853559] ? netlink_dump+0xc79/0x1c90 [ 290.857647] __save_stack_trace+0x8be/0xc60 [ 290.862004] ? get_page_from_freelist+0x1617/0x1c90 [ 290.867077] ? netlink_dump+0xc79/0x1c90 [ 290.871224] save_stack_trace+0xc6/0x110 [ 290.875329] kmsan_internal_chain_origin+0x136/0x240 [ 290.880500] ? kmsan_internal_chain_origin+0x136/0x240 [ 290.886067] ? kmsan_memcpy_origins+0x13d/0x190 [ 290.890768] ? __msan_memcpy+0x6f/0x80 [ 290.894692] ? nla_put+0x20a/0x2d0 [ 290.898284] ? br_port_fill_attrs+0x42b/0x1ea0 [ 290.902935] ? br_port_fill_slave_info+0xff/0x120 [ 290.907822] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 290.912346] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 290.916880] ? netlink_dump+0xc79/0x1c90 [ 290.920977] ? netlink_recvmsg+0xec2/0x19d0 [ 290.925343] ? sock_recvmsg+0x1d1/0x230 [ 290.929353] ? ___sys_recvmsg+0x444/0xae0 [ 290.933527] ? __se_sys_recvmsg+0x2fa/0x450 [ 290.937876] ? __x64_sys_recvmsg+0x4a/0x70 [ 290.942137] ? do_syscall_64+0xcf/0x110 [ 290.946160] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.951556] ? __msan_poison_alloca+0x1e0/0x270 [ 290.956276] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 290.961667] ? find_next_bit+0x25b/0x2a0 [ 290.965766] ? vmalloc_to_page+0x585/0x6c0 [ 290.970053] ? kmsan_set_origin+0x7f/0x100 [ 290.974333] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 290.979732] kmsan_memcpy_origins+0x13d/0x190 [ 290.984296] __msan_memcpy+0x6f/0x80 [ 290.988041] nla_put+0x20a/0x2d0 [ 290.991450] br_port_fill_attrs+0x42b/0x1ea0 [ 290.995920] br_port_fill_slave_info+0xff/0x120 [ 291.000646] ? br_port_get_slave_size+0x30/0x30 [ 291.005342] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.009764] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.014232] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 291.019661] ? rtnl_getlink+0xec0/0xec0 [ 291.023663] netlink_dump+0xc79/0x1c90 [ 291.027604] netlink_recvmsg+0xec2/0x19d0 [ 291.031853] sock_recvmsg+0x1d1/0x230 [ 291.035713] ? netlink_sendmsg+0x1440/0x1440 [ 291.040160] ___sys_recvmsg+0x444/0xae0 [ 291.044201] ? __msan_poison_alloca+0x1e0/0x270 [ 291.048909] ? __se_sys_recvmsg+0xca/0x450 [ 291.053218] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 291.058627] ? __fdget+0x23c/0x440 [ 291.062205] __se_sys_recvmsg+0x2fa/0x450 [ 291.066402] __x64_sys_recvmsg+0x4a/0x70 [ 291.070493] do_syscall_64+0xcf/0x110 [ 291.074343] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.079556] RIP: 0033:0x7f3646ce2210 [ 291.083295] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 291.102219] RSP: 002b:00007fff16708f78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 291.109956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3646ce2210 [ 291.117240] RDX: 0000000000000000 RSI: 00007fff16708fc0 RDI: 0000000000000003 [ 291.124532] RBP: 0000000000001fe4 R08: 00007f3646f8bec8 R09: 0000000000000000 [ 291.131834] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000006395c0 [ 291.139130] R13: 00007fff1670d050 R14: 0000000000001fe4 R15: 00007fff1670afe4 [ 291.146454] Uninit was stored to memory at: [ 291.150802] kmsan_internal_chain_origin+0x136/0x240 [ 291.155942] __msan_chain_origin+0x6d/0xb0 [ 291.160204] __save_stack_trace+0x8be/0xc60 [ 291.164550] save_stack_trace+0xc6/0x110 [ 291.168641] kmsan_internal_chain_origin+0x136/0x240 [ 291.173773] kmsan_memcpy_origins+0x13d/0x190 [ 291.178297] __msan_memcpy+0x6f/0x80 [ 291.182035] nla_put+0x20a/0x2d0 [ 291.185438] br_port_fill_attrs+0x366/0x1ea0 [ 291.189865] br_port_fill_slave_info+0xff/0x120 [ 291.194568] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.198913] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.203268] netlink_dump+0xc79/0x1c90 [ 291.207184] netlink_recvmsg+0xec2/0x19d0 [ 291.211354] sock_recvmsg+0x1d1/0x230 [ 291.215194] ___sys_recvmsg+0x444/0xae0 [ 291.219198] __se_sys_recvmsg+0x2fa/0x450 [ 291.223388] __x64_sys_recvmsg+0x4a/0x70 [ 291.227477] do_syscall_64+0xcf/0x110 [ 291.231309] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.236509] [ 291.238163] Uninit was stored to memory at: [ 291.242527] kmsan_internal_chain_origin+0x136/0x240 [ 291.247690] __msan_chain_origin+0x6d/0xb0 [ 291.251949] __save_stack_trace+0x8be/0xc60 [ 291.256297] save_stack_trace+0xc6/0x110 [ 291.260393] kmsan_internal_chain_origin+0x136/0x240 [ 291.265533] kmsan_memcpy_origins+0x13d/0x190 [ 291.270051] __msan_memcpy+0x6f/0x80 [ 291.273795] nla_put+0x20a/0x2d0 [ 291.277184] br_port_fill_attrs+0x366/0x1ea0 [ 291.281619] br_port_fill_slave_info+0xff/0x120 [ 291.286311] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.290653] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.295006] netlink_dump+0xc79/0x1c90 [ 291.298921] netlink_recvmsg+0xec2/0x19d0 [ 291.303092] sock_recvmsg+0x1d1/0x230 [ 291.306914] ___sys_recvmsg+0x444/0xae0 [ 291.310993] __se_sys_recvmsg+0x2fa/0x450 [ 291.315171] __x64_sys_recvmsg+0x4a/0x70 [ 291.319255] do_syscall_64+0xcf/0x110 [ 291.323107] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.328344] [ 291.329987] Uninit was stored to memory at: [ 291.334334] kmsan_internal_chain_origin+0x136/0x240 [ 291.339475] __msan_chain_origin+0x6d/0xb0 [ 291.343742] __save_stack_trace+0x8be/0xc60 [ 291.348098] save_stack_trace+0xc6/0x110 [ 291.352183] kmsan_internal_chain_origin+0x136/0x240 [ 291.357529] kmsan_memcpy_origins+0x13d/0x190 [ 291.362053] __msan_memcpy+0x6f/0x80 [ 291.365813] nla_put+0x20a/0x2d0 [ 291.369268] br_port_fill_attrs+0x366/0x1ea0 [ 291.373702] br_port_fill_slave_info+0xff/0x120 [ 291.378431] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.382804] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.387155] netlink_dump+0xc79/0x1c90 [ 291.391066] netlink_recvmsg+0xec2/0x19d0 [ 291.395240] sock_recvmsg+0x1d1/0x230 [ 291.399093] ___sys_recvmsg+0x444/0xae0 [ 291.403094] __se_sys_recvmsg+0x2fa/0x450 [ 291.407272] __x64_sys_recvmsg+0x4a/0x70 [ 291.411355] do_syscall_64+0xcf/0x110 [ 291.415182] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.420383] [ 291.422021] Uninit was stored to memory at: [ 291.426375] kmsan_internal_chain_origin+0x136/0x240 [ 291.431505] __msan_chain_origin+0x6d/0xb0 [ 291.435933] __save_stack_trace+0x8be/0xc60 [ 291.440295] save_stack_trace+0xc6/0x110 [ 291.444409] kmsan_internal_chain_origin+0x136/0x240 [ 291.449533] kmsan_memcpy_origins+0x13d/0x190 [ 291.454082] __msan_memcpy+0x6f/0x80 [ 291.457821] nla_put+0x20a/0x2d0 [ 291.461202] br_port_fill_attrs+0x366/0x1ea0 [ 291.465630] br_port_fill_slave_info+0xff/0x120 [ 291.470320] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.474663] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.479010] netlink_dump+0xc79/0x1c90 [ 291.482920] netlink_recvmsg+0xec2/0x19d0 [ 291.487106] sock_recvmsg+0x1d1/0x230 [ 291.490957] ___sys_recvmsg+0x444/0xae0 [ 291.494977] __se_sys_recvmsg+0x2fa/0x450 [ 291.499143] __x64_sys_recvmsg+0x4a/0x70 [ 291.503226] do_syscall_64+0xcf/0x110 [ 291.507057] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.512252] [ 291.513897] Uninit was stored to memory at: [ 291.518242] kmsan_internal_chain_origin+0x136/0x240 [ 291.523375] __msan_chain_origin+0x6d/0xb0 [ 291.527648] __save_stack_trace+0x8be/0xc60 [ 291.532077] save_stack_trace+0xc6/0x110 [ 291.536158] kmsan_internal_chain_origin+0x136/0x240 [ 291.541285] kmsan_memcpy_origins+0x13d/0x190 [ 291.545807] __msan_memcpy+0x6f/0x80 [ 291.549545] nla_put+0x20a/0x2d0 [ 291.552931] br_port_fill_attrs+0x366/0x1ea0 [ 291.557358] br_port_fill_slave_info+0xff/0x120 [ 291.562045] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.566389] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.570753] netlink_dump+0xc79/0x1c90 [ 291.574675] netlink_recvmsg+0xec2/0x19d0 [ 291.578858] sock_recvmsg+0x1d1/0x230 [ 291.582679] ___sys_recvmsg+0x444/0xae0 [ 291.586690] __se_sys_recvmsg+0x2fa/0x450 [ 291.590879] __x64_sys_recvmsg+0x4a/0x70 [ 291.594959] do_syscall_64+0xcf/0x110 [ 291.598790] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.604000] [ 291.605638] Uninit was stored to memory at: [ 291.609978] kmsan_internal_chain_origin+0x136/0x240 [ 291.615135] __msan_chain_origin+0x6d/0xb0 [ 291.619388] __save_stack_trace+0x8be/0xc60 [ 291.623757] save_stack_trace+0xc6/0x110 [ 291.627845] kmsan_internal_chain_origin+0x136/0x240 [ 291.633011] kmsan_memcpy_origins+0x13d/0x190 [ 291.637553] __msan_memcpy+0x6f/0x80 [ 291.641289] nla_put+0x20a/0x2d0 [ 291.644688] br_port_fill_attrs+0x366/0x1ea0 [ 291.649120] br_port_fill_slave_info+0xff/0x120 [ 291.653811] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.658192] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.662531] netlink_dump+0xc79/0x1c90 [ 291.666435] netlink_recvmsg+0xec2/0x19d0 [ 291.670601] sock_recvmsg+0x1d1/0x230 [ 291.674419] ___sys_recvmsg+0x444/0xae0 [ 291.678410] __se_sys_recvmsg+0x2fa/0x450 [ 291.682596] __x64_sys_recvmsg+0x4a/0x70 [ 291.686689] do_syscall_64+0xcf/0x110 [ 291.690513] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.695712] [ 291.697360] Uninit was stored to memory at: [ 291.701706] kmsan_internal_chain_origin+0x136/0x240 [ 291.706872] __msan_chain_origin+0x6d/0xb0 [ 291.711141] __save_stack_trace+0x8be/0xc60 [ 291.715481] save_stack_trace+0xc6/0x110 [ 291.719576] kmsan_internal_chain_origin+0x136/0x240 [ 291.724702] kmsan_memcpy_origins+0x13d/0x190 [ 291.729233] __msan_memcpy+0x6f/0x80 [ 291.732989] nla_put+0x20a/0x2d0 [ 291.736373] br_port_fill_attrs+0x366/0x1ea0 [ 291.740821] br_port_fill_slave_info+0xff/0x120 [ 291.745509] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 291.749874] rtnl_dump_ifinfo+0x18b5/0x2140 [ 291.754218] netlink_dump+0xc79/0x1c90 [ 291.758167] netlink_recvmsg+0xec2/0x19d0 [ 291.762339] sock_recvmsg+0x1d1/0x230 [ 291.766174] ___sys_recvmsg+0x444/0xae0 [ 291.770173] __se_sys_recvmsg+0x2fa/0x450 [ 291.774360] __x64_sys_recvmsg+0x4a/0x70 [ 291.778441] do_syscall_64+0xcf/0x110 21:27:50 executing program 0: sysfs$1(0x1, &(0x7f0000000480)='cpuset\x00') r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e21, @multicast2}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)={r1, 0xc, 0x8c, "3c339e0ec62c818591298e70ff961dda9849eafb6ebeb8c41ce77ffa5457f1ea0083f3393cee31597b221cf6b80d5e0592d79af8644a5d87813c5fa5cd94399562c7c5189c3c97517373bde9341972e2ab1e7e7853475a7ff4f28b40d2b58ffb513e1ea9a261c8ef6bfaf4b500c3a9cf4459637294e68bba731beec089bbac0cdb3e563fb1a74c2fa005a25b"}, 0x94) [ 291.782271] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.787475] [ 291.789114] Local variable description: ----v.addr.i.i108@update_curr [ 291.795718] Variable was created at: [ 291.799461] update_curr+0x62/0x2100 [ 291.803195] pick_next_task_fair+0x29c/0x3060 21:27:51 executing program 0: mkdir(&(0x7f0000000140)='./bus\x00', 0x32) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000440)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x42, 0x0) [ 294.376689] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.383302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.390196] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.396869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.405271] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 294.430607] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.437324] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.446002] device bridge_slave_0 entered promiscuous mode [ 294.771519] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.778178] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.786890] device bridge_slave_1 entered promiscuous mode [ 294.814238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.198179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 295.514474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.616779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.928362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.979657] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 297.298312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 297.305915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.637106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 297.644390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.146981] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 298.446298] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 298.454729] team0: Port device team_slave_0 added [ 298.727393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 298.735666] team0: Port device team_slave_1 added [ 298.998938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 299.006216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 299.015203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.233362] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 299.239701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.247789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.282267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 299.301854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 299.310773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.547942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 299.555721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.564939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:27:58 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000001c0)={r1, 0x1}) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000340)) unshare(0x24020400) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x0, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="8579a9dc26cbe667a57136d2bb3aca30d22c5564d8552a8a601b6b4f87289b5d0072aeb5a582369adaa01c225e6050ef7ff312b3d24adab4484274ea6e6a8a75c1785bd3d4e6a286b0cac9cecdd1971d22193edd1fd51b1150e1b15c64969c0c346f3f18ca0392b6403175c9c5afe06cb8ac22f6e7c3061a99688804337c09ed1e17faca79fc23f6a35f88ed4fdb5806e1741c8e9928389831c9d0d68076cc4d12910a52ce", 0xa5}], 0x1) semget$private(0x0, 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000300)={0x7, 0x4, 0x6}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000400)) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000180)) [ 299.856622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 299.864906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.874100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.233539] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.207178] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.213863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.220796] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.227445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.236148] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.242949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.542387] 8021q: adding VLAN 0 to HW filter on device bond0 21:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000ff1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 305.246377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.364625] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 305.876007] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.882578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.890415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.481997] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.176715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.665067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 21:28:08 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) syncfs(0xffffffffffffffff) [ 309.903263] kauditd_printk_skb: 3 callbacks suppressed [ 309.903321] audit: type=1326 audit(1542317288.941:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8079 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 310.118083] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 310.124410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.132466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.464131] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.672589] audit: type=1326 audit(1542317289.711:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8079 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:11 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000680)) 21:28:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x4, 0x0, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)}, &(0x7f0000000100)=0x78) socketpair(0x1, 0x80006, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000180)={{0x7, 0xffffffff, 0xfffffffffffffffb, 0x200, 0x400, 0x40}, 0x9}) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000240)='-\x00', 0x2, 0x3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000280)={0x0, 0xf004}) clock_gettime(0x3, &(0x7f00000002c0)) write$vnet(r2, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/236, 0xec, &(0x7f0000000400)=""/141, 0x3, 0x3}}, 0x68) fsetxattr$security_evm(r0, &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x5, 0x3, 0x4, 0x2, 0x2b, "49989ac9f8db827f30fdcf0283a6fc67a431e0a54f8f9b617bb7bd07da6a5dd746fa42f980c843049cb88e"}, 0x35, 0x1) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f00000005c0)={@rand_addr, @dev}, &(0x7f0000000600)=0x8) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000640)=0x49) rmdir(&(0x7f0000000680)='./file0\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000006c0)=@sack_info={0x0, 0x0, 0x9}, &(0x7f0000000700)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000740)={r3, 0x591a}, 0x8) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) futimesat(r2, &(0x7f0000000780)='./file0\x00', &(0x7f0000000800)={{0x77359400}, {r4, r5/1000+30000}}) r6 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r6, r7) write$P9_RREADLINK(r2, &(0x7f0000000940)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "c8ab5b37161f9fbc4e531e875e31e3fd1da5d28f19208ebd55589be278ce8514d1708bfca8c4d27caccce94022aefce7e87c4fd74796fe6f94d3721dd985a8b6ddc1bc4b1ba563695a04c4568f6a3727b13def69ae7f26a6e6521c6ee2ecdd30551b8ee06511c37d597b99583d533dc605781662aec1565afc27958b671bde79702742ddd9be011d7eb278efc1ede428adf4487d43f9422f15e47412976c7954450bcca04a9228e26cfc8f927eb6c2538eaf117b683da6d2c31178700c451db4ec31f5068632935527f6acdb6fb81bc69a874f9f887373b0e866a83105b320ec877afb514c2341ace7621bfc3c5842739479770e1c3a97832e9b9b1f5b18a54936a4a91a2ff72db599c0b4f7a93ec9ca3fccd48b689d8902233f273beef149b2e7e35dba2d80edff0f322f24d1d700831417ecfc9a3d1e415f4ddc1fbb70da8cf966d9ec93d203c3aee354693f1d964132fa6bbb5007602cf6235cd08d78835809f7ec2d3e9f40cbb3e392950e87b6f5dea19ea892b483b8e20b0dbdccd4eaaff502a45ffb488b4f357ea7c589371d621f6c8ee70eba6451ac1a14f4a67ef4be930bcc8e7885f3c2f758e910ca26593414761279892c9aea39b5c57ac48cd30b98d7d867af70961bd0aa1520cac9c7785423caea835feca527f97369c9662502b53b6ae8c47a8967cb4bc11a673df2bf6cc4b18189d6aea12e6754cde91a42c94f92f07f8825740e792c39f5d7a56134f3a1bc1046eb861fb4756ebe3706bb920c60f5e0a47012ef79f14cdb9014b5d961faf363609f8bba78b139ba340376fda5bf0d3cb8d24f15c12ff811d253aa117a15b6f6ded166a71fbfe9d5ed83ee5eec8e3281daefc4ae7f15abbb027175a1fddc87064dcc5c95234fc60a63949b87656a9d476d64313085cc4c2f6cc8bcd32b45d9ecf5fab82022a89c804b32eefb24dcb7a98c7224be567170a45edea6a5fc82757a0e9e2cd91513c7cbfca857ae4fa357778b4da9f466d20d03cd0253d984af3a872805ca924265367d3ba842379f9600a4a8847d6a58a0e83457ad8ed2f7fdb9ade206a99e4b3f5e5887e09238ca3864fb14b1b91a9ebdf9d383ab6ed078610d58bc2ef73820f19d453af5594d65e9a84343da41ae156051de7653cc551a5b007d541821fb562122528eb0003c535c4b4086a24c731c94ae751376770b761ccd2a7650557db15d4e5429779ce0b5232fe5ee0c86ff68d3b79314b64d2e2ac11a9a1e63f1e7eda75199ac4b235d845b96b5863acc6bc8527397e26418b09f526738848ba6917e61eb079f4654b63905316dbef9bd66037712dc9ee17320f68f9707b1ec9f1be2b241fe1ce237af9de8b0b3194e69e0bca7a8d552b39d3650ee4ce92c0e068bff7390d9d8b7b149db290e35d0b4540011ea2bc0b5590a62a42e7e0e5e0cd62a856d948fb24b6b22ddc38c3133d6c9a1f7354f287fe015a7aedcb2ee27ae9cf2d06438be5f57b707a851c8bcc95249c7e23611670f026dae702fd42ba32f8068a788ca1a449c5681918444c4f8dd7fec47173c8a90816f6d0104ddd41735437bda71629790553fc69d679b564feb5fcfaaea5226f98bab8f82723476d1742b3b75d692ef9acf48598e1fa1bf0b31536bd93a82e1ae6224845778bef65512f5451d010ca89a5861bd6fac8e1f0bd4a167c07673be5a4957cfcbeffb103e25a0dc26ed4cff5f8d3f60af281171f7759b1e308d6d446f9184358b25eefe7f76e48c2f82b20c6aee3a03a0ee36b94d5d3f8c574ba2fca2948bdd8eb515042f88d477a9ad6a76f2a3542e3e5cd80a8182cb2c9cf511f36e58f167a5523e9acf5fafdfb4be004cd1d68f644a05543e3cd1a203c5de6705c0b2313cb6e3d9f1c294e58c2d19b34d10523a0d4471d37db0219ad90890bd21c7d36e4d7f4a3227cba17ccb2ba570c46a22b939a56600f286d04fe239d444e543fe26b827aabf588547237fc047308d1b52d911792ab577501223419bc6b40842662562b58f9df6d72d2daa8dfb8c1191af9f78e0a3b94598a18612d9cb77201e1263d8da3dd60570615253c40fca9d35f72a0df2fad5e91cc52408b0dd8160b5acbb6921c9c330d5e95d88c682261a8f92ef099021db75384ce2acdea3199470829ed9550726ba45f3eebded43534242f74ac4e2c022d4fdedeed7efbb89095765c34abed56489f7209daddfdef42ed6a5078f50550558e9383f6c865d9353ff6f0cdf5397ee804d435ca27655b73fbd72fc0d65c518a9a51794f67758d968a61ab4de3cc380328a864b1f479d1f6f6d33f54c110b7b65fd954373007bceefa47fc96815585528a023c220467192a43dfa05cf0aef6789aacf0f06b5d2af408f89004a404d5658a7d17bcbca66e1f8a498e8b6e7f95395d3561974c1ca861c92001ca07dbd78d07adc1c61833c6207755ed8013f769426f0cf30fc3e1736c328e187ac7f2770a75e47019adf42cc1b30fd064a89c388cf62285436c24963d57cb41646814e1830872e91ffaeeb4bb4edd23f0e86e427328fe75baf346101ae8c9ac716b4ded061f99eca15c53bbbe89696c67273cf475bff933fce3b4d2263c05ada93b53f5385cecdc56eee386afe413a72accd89513cde8ccfb4ee19515ad4484f8ac27bc94831798f3ea3e1cecc0cfb49f33b14cd01b455b3e81459908dc85e9b9a9f4fa64ac4ac74f73101c79fc634e4146e6a9691f9432688feae7753576e36bbb2e3e12a1d8f5c3c20691fbf92ca9745bc14cb067941aa845b8788a8cb13e6670019211e374f224519328ef13e4c3ac2067eaffea1cabe5535c722a5059c1700abffce196d144ef1446fa4521602f200d7349ec1b982899d61934b0f815560bbd926b95ffc8fd3e2324f5af4841b2cf6ea3b93b1d20e406bca250b6ac751aa1a4b5ce99793e13b20befefe37a5b6a7ba108ac8ed271ea77bf2469c70955200e83c37001c455d1b05506267b2f5af636ab590b48cd1b07aa41108cdda80e013c8b4f4449630cd49bdf8415c94521e0d324ae54fc63620517efa2dea2531cf4608c99f9ec522520392c708876632d0eeebf0a5a78f830418fa55c554c70ed21337ab5ceae3d556e69dddb6ed35c5537c9c81cb8d8642b286d395fad2c6da47a8d3083c46558dc560f1217af7f5dcc05ff7727b7e1eb37ac322c0e822337108b5501b5ba6502263ea05c7c76b5fa00a6b21f0138878e87d1a04c3f3af34db164d324e2d8d4592354d5303428bf0a76a0c47b52cbc8db6160395acb86cedf5a0bcaab4620c0d8eef6fc3a72d2c81c89f52ea90df83d966c3dd7937f4c227182c6327e18131273528b986bdbf61cd6e9c9c8aabc40662459a94de4fb437e4660cf6e5b8cdc13cba62b0288f5dbdbbacc0ef99acdc27d37e8b7c7d1ef9f0e82e1935c2101b464965013516bab51681bcf842bad811fb9e5861213edfea6c47c10d63a32b432a765d48730733bfc39601817fe1c1fc99c970a40bd4b72e10c17e15dd3e174a14be00d1f02ab563c6dec2243be4e8d63efbaa40ae754ab107bf54775bff4719c643cb2872f5238888e867551c23bab1eda09448ebe8b33e1ac2ced7c61e05d13da50845b93b6ee3b242fe735c0946193406873cb9a8db8bea57048ed10c60d74bf3ddd85b1dc73aaaaa3a2f63c2286461add74d45a48bc9d3321ddfa0fee95ef9f1eeb5b421e9dc46d9290a2d3b5c8042eaa9bec51a1909cee323cf5875b0652403f1187cc62da9a9bbff9303e0214c7f944afbce7a4e9bc7840c57da3bf69573bab4b9ac3a7c1c31959fd6d3454cd9086e680c7c285c5726acd3bde07ff1d82d40fb746772a0479c62f624781834dfd0fb27d8ec8410019a4476144a33d60593c996b961041613c263e08b47282467114adf5150eb57a089f8ae092c0583869c604daed3757ed2183a8f42634ba4efa94947e423c8ba784f97bb7b8dc880a595c2f77ae6c99fa173e0154a7348e992577f578e184f3540aa8d8aa74765458d6ec1cce72eda22d281c71864854488dff5ff6ea0fa1b05ea6e1bb3ef807e1ecfb58311c2520c6cf729733d8901901172d7e26e08ba7715981022f0763d7b68e9c5d41ff612c95ca5f9764d2f160ea26df2da19f4ad287f99979e5cbc3eb8422d5a0d83b9be75a77a1d8f245f416a1a796fda7d9233e32f3f4349c203feb4c67d003d9621923ae8bd2495486f478c43f83a73da8f52b626d72b036eec0a31e6f51c8a5ed7017ce2cebc460466aef60ffdd81255123780fd06fcf17c154d58436bb0764b15680aa16d2146f0f1c304167e24f4c16fecb35fea1ad948f3e68e8fce650792baec56877e0e50183a5c4ec4196e0566034e9df8af62f1f5f3898a92fd51585148b8cdb2fb1e6cb1c58b2f3b838819027a5c798b2a92d53e7463cc5e4e22c128e1951ea38ed3d571cf133a300b7049cbfdab054b86b9f84a04a706614f17e0272844285bc7db0e964c7f84959cf04c11d89eed5447fdfd041f3c77e5ee61cfb2741275632a44d1cebf7e661ca3db315ac95e4a3f7bad3a6fc55d2ac8146a5d9031b41cbf76186d54ef3e5a340968a9fb5c3cac43b6a14764a0e5f8f167fb2c8c56568060cf932b9772cd2c7d658a66852c514f17a953c99ddea1a48c83b78dcb014db39c2e9c9bc7505b9a324bd91982c73dc562c71af503d070b4dd44bf206929e28dfafb4c10fec00c1a6e5fca8cdf7e3ffc5821c28565626e335458e304bfc80765b1ba13437d3c1baef1a34730aaa133106e3cf3cd76ddca0eb6d7e4d6c7d5efdb4ba4652218a2bf07bb07986aa54ba95096f3258e50fe9794dfc5cd68c4b1c64aa6bf67cf43be4c9199b9cf6f6e40777969055565b5ddb1c511045ebc343fb3c1c0d60e15618a64c556dbeed070ad8f1760d145f8c14e3e9c36d226ecf4acd6ca4168eeeac470556e9d9ff6d9664aa9c9b5d09808e4916ba744fadd889f0e2598513d2dee777baf8765e34214203a7fd61af76ef0e7d52a0f59d7730e2044a2f9ca34387728de48bc1efb5e351fffe57cf3e0785f9ec505221732896f3a15012583875c62654b5cb4ad17b79ab0bcdf086526ffbbfd09f1f2108bea2963e1fa21ca1568c7eb14597e312c6a3917f648056badac9058cb955f19a21a934512acd47e9082e4be39e2e08ddacca546b4894fc5657dad15fe314ed6210e2a2491a231cfa5443ec8ad4d5cae4dcb346b134fbef909b15cc3cc48de8eeb1220b7270e2a748772062b410dec489a1d603691b93feb52ab4d89c556c214789c16b106cb33a633a6b6c7d4896ea8a61cf2e99fb22251fb6039ee6c77b7beb47f1e01aa73059190df2e55631601443447ef613efb79e04e3b310db3f29475c7b3f48833afe2005fc83db0663c47b33509cdd77e8fe174776fa73c850911d08959ee67d41ba5f20b4ecc4fdd20392b80dc84cb76c145dc24cec1034a444e1ca84344f1063c3fd8f951962dcb356f589af27055b53112ca1dde06a58cb9e501e9ba363a64aae534084974e0b465c7abf2bb9d5b83d70e9c988586b52eeebf244dfa35cf2841844a12767c6e2218a0aea0adeda9648dfa52922aaaa037e1a1b591528bfc737800790d4c2f99df7b3a82d61bbcc2eb387c666854e8e4f550c3c42c70e536266c04e35175c3f049cc12c9ace241615b566227cbc1f7b55f686833750ee0a4b0e959e1b8cba3f73afd10718d24ee5e7823dc0ae6f6950c06292705a2f17c2f14ffbc50ef649dbb7178486f639724a1184a0fb44657898cee037219da21fd7aae48d0496362341892f4a6", 0x1000}, 0x1006) lsetxattr$trusted_overlay_origin(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='trusted.overlay.origin\x00', &(0x7f0000001a40)='y\x00', 0x2, 0x1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001a80)=0x0) ptrace$peekuser(0x3, r8, 0x9) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000001ac0), &(0x7f0000001b00)=0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/ashmem\x00', 0x8000, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000001b80)=""/54) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000001bc0), &(0x7f0000001c00)=0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000001c40)={0x102, @time={0x77359400}, 0x2, {0x4, 0x8}, 0x0, 0x2, 0x1}) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000001cc0)) 21:28:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="05000a004e0e689896bcd6e4290eec317629fb09fd2880051afd4c1568e67a8d69d2a2648a14c2b51d8bb07686e4c4a4b962b23c1702803da84251b3d20f8a964133928dc09965bea87a4d13436d9f57a699e9e7d53b588dfea87107b8e8e14b9e871e1563d2caf3c1a0e765e8a406fd79015f7975d8f8633cda4a97600760a95392dd7f3228d11051586ce5f838e0de2b0473a6458468932f006c7f3ffc9b9299e660fba9b1f8683f8bdfa36e381356833b765135a6c618c9ffa1d32bcc219de6d4066113dd3e2c394d845208ca47f302d0627ff1d60aab267f18f125a386b601d07f5707b460c04661a5f51f0d8da6d72690d5040af0f87dd4901aa6f28fe893e0207a81ee36216db95d45ec9b519c11d968c59dd6bc28b52b02ba467e2279c62177768c4da1b89b6902abde8b8379a3a00b5ce9e3147a2ab4716bf3e47ff9df"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000340)='\x00', 0x0) 21:28:11 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000080)) 21:28:11 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) syncfs(0xffffffffffffffff) [ 312.337716] device lo entered promiscuous mode [ 312.344413] device lo left promiscuous mode [ 312.352104] device lo entered promiscuous mode [ 312.359598] device lo left promiscuous mode [ 312.503185] audit: type=1326 audit(1542317291.541:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8153 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 312.644076] device lo entered promiscuous mode 21:28:11 executing program 1: mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./control\x00', 0x0) unlinkat(r0, &(0x7f0000000080)='./control\x00', 0x200) [ 312.685090] device lo left promiscuous mode 21:28:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:12 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000340)='\x00', 0x0) [ 313.117101] device lo entered promiscuous mode [ 313.174557] device lo left promiscuous mode 21:28:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:12 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) [ 313.515474] device lo entered promiscuous mode 21:28:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000d00)=[{{&(0x7f0000000940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000c00), 0x0, &(0x7f0000000c40)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000000dc0)={0x77359400}) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f00000003c0)) futex(&(0x7f00000001c0)=0x1, 0x0, 0x1, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0), 0x0) [ 313.556861] device lo left promiscuous mode 21:28:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c4c2290c670866bad004b00feef2afc744240049e3aaf0c7442402910d1643c7442406000000000f011c24c4e1dc5c6f290f05c4e1fd593488d070a76666f2f20f20540f30", 0x45}], 0x1, 0x0, &(0x7f0000000180), 0x0) [ 314.021335] IPVS: ftp: loaded support on port[0] = 21 [ 315.568542] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.575051] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.582936] device bridge_slave_0 entered promiscuous mode [ 315.664336] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.670791] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.678976] device bridge_slave_1 entered promiscuous mode [ 315.753099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 315.824458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 316.052613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 316.130579] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 316.279064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 316.286164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.509143] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 316.516816] team0: Port device team_slave_0 added [ 316.607382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 316.615572] team0: Port device team_slave_1 added [ 316.744361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.857524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.934985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 316.942559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.951761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.023376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 317.030732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.039891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.319159] ip (8300) used greatest stack depth: 53408 bytes left [ 317.870155] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.876699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.883805] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.890208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.898268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 318.222933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.922609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.199310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 321.478186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 321.484551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.492523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.771642] 8021q: adding VLAN 0 to HW filter on device team0 21:28:22 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000000)="0f01c866b80f0000000f23c80f21f86635040020000f23f80f015f80b840000f00d00fc7a914003e0f01cb3e0fc7aa00202e2e660f6547b4ba410066ed0f1fd9", 0x40}], 0x1, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:28:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:22 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:22 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x46800, 0x0) 21:28:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000340)='\x00', 0x0) 21:28:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x100e}, {&(0x7f0000000240)=""/147, 0xe}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a00000005, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000005180)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=""/47, 0x2f, 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000200)=""/31, 0x1f}, {&(0x7f0000002480)=""/168, 0xa8}], 0x3, &(0x7f0000002540)=""/120, 0x78, 0x3}, 0x7d7}, {{&(0x7f00000025c0)=@alg, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/20, 0x14}, {&(0x7f0000001440)=""/52, 0x34}, {&(0x7f0000002640)=""/195, 0xc3}, {&(0x7f0000002840)=""/209, 0xd1}, {&(0x7f0000002940)=""/58, 0x3a}, {&(0x7f0000002980)=""/163, 0xa3}], 0x7, 0x0, 0x0, 0x7}, 0x7}, {{&(0x7f0000002ac0)=@hci, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002b40)=""/16, 0x10}], 0x1, &(0x7f0000002bc0)=""/51, 0x33, 0x8000}, 0x3}], 0x4, 0x40, &(0x7f00000052c0)) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 21:28:22 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:23 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000000c0), 0x4) 21:28:23 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) 21:28:23 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000140)=""/106, 0x6a}], 0x1) 21:28:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000340)='\x00', 0x0) [ 324.357097] audit: type=1326 audit(1542317303.401:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8514 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:23 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5}, 0x2c) 21:28:23 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000000800)=[{0x10}], 0x10}}], 0x1, 0x0) 21:28:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@setlink={0x20, 0x13, 0xf2f}, 0x20}}, 0x0) 21:28:24 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:24 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:24 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000000800)=[{0x10}], 0x10}}], 0x1, 0x0) [ 325.126135] audit: type=1326 audit(1542317304.171:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8514 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:24 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) getegid() 21:28:24 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc4c85512, &(0x7f0000000080)) 21:28:24 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) [ 325.407818] audit: type=1326 audit(1542317304.451:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8559 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:24 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) [ 325.719193] audit: type=1326 audit(1542317304.761:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8573 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) 21:28:25 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:25 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:25 executing program 0: mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r0, &(0x7f0000000080)='./control\x00', 0x200) rmdir(&(0x7f0000000040)='./control\x00') [ 326.195676] audit: type=1326 audit(1542317305.241:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8559 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:25 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) [ 326.437276] audit: type=1326 audit(1542317305.481:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8573 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:25 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)={0x3, 0x0, [{0x0, 0x0, &(0x7f00000000c0)}, {0xd000, 0x31, &(0x7f0000000100)=""/49}, {0x100001, 0xf, &(0x7f0000000200)=""/15}]}) 21:28:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200ff54762498d97f00000000000000000001000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff170000000000000000000000000117000000000000000043919087a09091e5bded087d57a151254799565a489fc0d56fb45f"], 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000000000000000eaffac1414aa0000100040000000113c04a23743f008499547b5"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xa2503f7693ebc8, 0x0) 21:28:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:25 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x80000) ioctl$RTC_AIE_ON(r0, 0x7001) 21:28:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:28:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) 21:28:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:26 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB]}}, 0x0) socketpair(0xb, 0x80006, 0xde, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/228) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) r2 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000580)={{0x2, 0x4e24}, {0x6, @remote}, 0x42, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, 'syzkaller1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @remote}, &(0x7f0000000080)=0xc) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x804, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x40000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='veth1\x00', 0x10) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_ifreq(r2, 0x80008956, &(0x7f00000001c0)={'veth0_to_bond\x00', @ifru_addrs=@nfc={0x27, 0x0, 0x0, 0x7}}) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sync_file_range(r2, 0x6, 0x5, 0x2) sendmmsg(r5, &(0x7f00000092c0), 0x40000a9, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x800000000000286, 0x0) munlockall() sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x4, 0x4, 0x2, 0x3, {0xa, 0x4e20, 0x20, @remote, 0x4}}}, 0x80, &(0x7f0000000480)}, 0x0) ioctl$KDENABIO(r6, 0x4b36) 21:28:26 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x1038d) 21:28:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) [ 327.524487] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:28:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:26 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x200000a9) 21:28:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) 21:28:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)={0x0, 0x4, 0x9, 0x100}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000007c0)=""/255) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000080)={0x74, &(0x7f00000002c0)=""/116}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team_slave_0\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x100c1) read(r1, &(0x7f0000000bc0)=""/93, 0xfffffd12) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) [ 329.152434] hrtimer: interrupt took 252909 ns 21:28:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) [ 330.127028] audit: type=1326 audit(1542317309.161:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 330.332723] audit: type=1326 audit(1542317309.261:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 330.354232] audit: type=1326 audit(1542317309.301:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 330.375637] audit: type=1326 audit(1542317309.301:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 330.396902] audit: type=1326 audit(1542317309.301:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 330.418230] audit: type=1326 audit(1542317309.301:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 330.440515] audit: type=1326 audit(1542317309.341:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 330.461846] audit: type=1326 audit(1542317309.341:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x457569 code=0x50000 [ 330.483154] audit: type=1326 audit(1542317309.341:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 330.504713] audit: type=1326 audit(1542317309.351:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8702 comm="syz-executor3" exe="/root/syz-executor3" sig=0 arch=c000003e syscall=298 compat=0 ip=0x457569 code=0x50000 21:28:30 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB]}}, 0x0) socketpair(0xb, 0x80006, 0xde, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/228) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) r2 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000580)={{0x2, 0x4e24}, {0x6, @remote}, 0x42, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, 'syzkaller1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @remote}, &(0x7f0000000080)=0xc) r5 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x804, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x40000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='veth1\x00', 0x10) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_ifreq(r2, 0x80008956, &(0x7f00000001c0)={'veth0_to_bond\x00', @ifru_addrs=@nfc={0x27, 0x0, 0x0, 0x7}}) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sync_file_range(r2, 0x6, 0x5, 0x2) sendmmsg(r5, &(0x7f00000092c0), 0x40000a9, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) read$eventfd(r3, &(0x7f0000000180), 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x800000000000286, 0x0) munlockall() sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x4, 0x4, 0x2, 0x3, {0xa, 0x4e20, 0x20, @remote, 0x4}}}, 0x80, &(0x7f0000000480)}, 0x0) ioctl$KDENABIO(r6, 0x4b36) 21:28:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:30 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 21:28:30 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 21:28:30 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0x1, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x8a) r1 = socket$inet6(0xa, 0x43, 0x6) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000001c0)=0x2) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) unshare(0x40000000) 21:28:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) 21:28:31 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) [ 332.023677] IPVS: ftp: loaded support on port[0] = 21 [ 332.036172] device lo entered promiscuous mode [ 332.236992] IPVS: ftp: loaded support on port[0] = 21 21:28:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000002fc0)) ioctl$int_in(r0, 0x0, &(0x7f0000000000)) 21:28:31 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r0}, 0x2c) 21:28:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="05000a004e0e689896bcd6e4290eec317629fb09fd2880051afd4c1568e67a8d69d2a2648a14c2b51d8bb07686e4c4a4b962b23c1702803da84251b3d20f8a964133928dc09965bea87a4d13436d9f57a699e9e7d53b588dfea87107b8e8e14b9e871e1563d2caf3c1a0e765e8a406fd79015f7975d8f8633cda4a97600760a95392dd7f3228d11051586ce5f838e0de2b0473a6458468932f006c7f3ffc9b9299e660fba9b1f8683f8bdfa36e381356833b765135a6c618c9ffa1d32bcc219de6d4066113dd3e2c394d845208ca47f302d0627ff1d60aab267f18f125a386b601d07f5707b460c04661a5f51f0d8da6d72690d5040af0f87dd4901aa6f28fe893e0207a81ee36216db95d45ec9b519c11d968c59dd6bc28b52b02ba467e2279c62177768c4da1b89b6902abde8b8379a3a00b5ce9e3147a2ab4716bf3e47ff9df"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) 21:28:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) getsockname$inet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) 21:28:32 executing program 5: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) 21:28:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 21:28:32 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:32 executing program 3: mkdir(&(0x7f0000000000)='./control\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./control\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) 21:28:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) 21:28:32 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)) [ 334.274118] not chained 20000 origins [ 334.278010] CPU: 0 PID: 8818 Comm: syz-executor5 Not tainted 4.20.0-rc2+ #87 [ 334.285214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.294606] Call Trace: [ 334.297254] dump_stack+0x32d/0x480 [ 334.300939] ? save_stack_trace+0xc6/0x110 [ 334.305222] kmsan_internal_chain_origin+0x222/0x240 [ 334.310371] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 334.315843] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.321239] ? __module_address+0x6a/0x5f0 [ 334.325498] ? is_bpf_text_address+0x3e5/0x4d0 [ 334.330108] ? is_bpf_text_address+0x3e5/0x4d0 [ 334.334734] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.340147] ? __module_address+0x6a/0x5f0 [ 334.344419] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 334.349815] ? is_bpf_text_address+0x49e/0x4d0 [ 334.354434] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 334.360437] ? in_task_stack+0x12c/0x210 [ 334.364541] __msan_chain_origin+0x6d/0xb0 [ 334.368860] ? syscall_trace_enter+0x962/0x12b0 [ 334.373567] __save_stack_trace+0x8be/0xc60 [ 334.377957] ? syscall_trace_enter+0x962/0x12b0 [ 334.382667] save_stack_trace+0xc6/0x110 [ 334.386787] kmsan_internal_chain_origin+0x136/0x240 [ 334.391938] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 334.397090] ? kmsan_internal_chain_origin+0x136/0x240 [ 334.402413] ? kmsan_memcpy_origins+0x13d/0x190 [ 334.407114] ? __msan_memcpy+0x6f/0x80 [ 334.411067] ? audit_log_n_string+0x537/0x720 [ 334.415590] ? audit_log_d_path+0x4dd/0x510 [ 334.419998] ? audit_log_d_path_exe+0xd7/0x160 [ 334.424633] ? audit_log_task+0x3c1/0x400 [ 334.428808] ? audit_seccomp+0x11f/0x3b0 [ 334.432934] ? __seccomp_filter+0x1480/0x19d0 [ 334.437462] ? __secure_computing+0x20b/0x3a0 [ 334.441994] ? syscall_trace_enter+0x962/0x12b0 [ 334.446697] ? do_syscall_64+0x64/0x110 [ 334.450735] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.456161] ? audit_log_d_path_exe+0xd7/0x160 [ 334.460819] ? audit_log_task+0x3c1/0x400 [ 334.465005] ? audit_seccomp+0x11f/0x3b0 [ 334.469099] ? __seccomp_filter+0x1480/0x19d0 [ 334.473655] ? __secure_computing+0x20b/0x3a0 [ 334.478190] ? syscall_trace_enter+0x962/0x12b0 [ 334.482884] ? do_syscall_64+0x64/0x110 [ 334.487000] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.492412] ? __msan_poison_alloca+0x1e0/0x270 [ 334.497126] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 334.502601] ? prepend_path+0xd23/0xe50 [ 334.506634] kmsan_memcpy_origins+0x13d/0x190 [ 334.511171] __msan_memcpy+0x6f/0x80 [ 334.514948] audit_log_n_string+0x537/0x720 [ 334.519330] audit_log_d_path+0x4dd/0x510 [ 334.523522] audit_log_d_path_exe+0xd7/0x160 [ 334.527978] audit_log_task+0x3c1/0x400 [ 334.532018] audit_seccomp+0x11f/0x3b0 [ 334.535954] ? kmsan_get_shadow_origin_ptr+0x142/0x410 [ 334.541274] __seccomp_filter+0x1480/0x19d0 [ 334.545662] ? __msan_poison_alloca+0x1e0/0x270 [ 334.550370] __secure_computing+0x20b/0x3a0 [ 334.554735] syscall_trace_enter+0x962/0x12b0 [ 334.559321] do_syscall_64+0x64/0x110 [ 334.563162] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.568373] RIP: 0033:0x4573d7 [ 334.571587] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.590509] RSP: 002b:00007f2a5ee8c098 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 334.598238] RAX: 0000000000000000 RBX: 00007f2a5ee8c830 RCX: 00000000004573d7 [ 334.605529] RDX: 00007f2a5ee8c830 RSI: 00000000c008ae05 RDI: 0000000000000000 [ 334.612818] RBP: 0000000000000000 R08: 0000000000000090 R09: 00000000000000a8 [ 334.620105] R10: 00000000000000b3 R11: 0000000000000217 R12: 0000000000000000 [ 334.627391] R13: 0000000020fe8000 R14: 00000000004d83b8 R15: 00000000ffffffff [ 334.634695] Uninit was stored to memory at: [ 334.639059] kmsan_internal_chain_origin+0x136/0x240 [ 334.644184] __msan_chain_origin+0x6d/0xb0 [ 334.648447] __save_stack_trace+0x8be/0xc60 [ 334.652792] save_stack_trace+0xc6/0x110 [ 334.656873] kmsan_internal_chain_origin+0x136/0x240 [ 334.662029] kmsan_memcpy_origins+0x13d/0x190 [ 334.666547] __msan_memcpy+0x6f/0x80 [ 334.670275] audit_log_n_string+0x537/0x720 [ 334.674613] audit_log_d_path+0x4dd/0x510 [ 334.678793] audit_log_d_path_exe+0xd7/0x160 [ 334.683226] audit_log_task+0x3c1/0x400 [ 334.687224] audit_seccomp+0x11f/0x3b0 [ 334.691150] __seccomp_filter+0x1480/0x19d0 [ 334.695492] __secure_computing+0x20b/0x3a0 [ 334.700028] syscall_trace_enter+0x962/0x12b0 [ 334.704544] do_syscall_64+0x64/0x110 [ 334.708372] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.713573] [ 334.715241] Uninit was stored to memory at: [ 334.719585] kmsan_internal_chain_origin+0x136/0x240 [ 334.724726] __msan_chain_origin+0x6d/0xb0 [ 334.729033] __save_stack_trace+0x8be/0xc60 [ 334.733373] save_stack_trace+0xc6/0x110 [ 334.737469] kmsan_internal_chain_origin+0x136/0x240 [ 334.742597] kmsan_memcpy_origins+0x13d/0x190 [ 334.747114] __msan_memcpy+0x6f/0x80 [ 334.750851] audit_log_n_string+0x537/0x720 [ 334.755194] audit_log_d_path+0x4dd/0x510 [ 334.759363] audit_log_d_path_exe+0xd7/0x160 [ 334.763812] audit_log_task+0x3c1/0x400 [ 334.767802] audit_seccomp+0x11f/0x3b0 [ 334.771726] __seccomp_filter+0x1480/0x19d0 [ 334.776099] __secure_computing+0x20b/0x3a0 [ 334.780436] syscall_trace_enter+0x962/0x12b0 [ 334.784946] do_syscall_64+0x64/0x110 [ 334.788942] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.794144] [ 334.795793] Uninit was stored to memory at: [ 334.800131] kmsan_internal_chain_origin+0x136/0x240 [ 334.805285] __msan_chain_origin+0x6d/0xb0 [ 334.809535] __save_stack_trace+0x8be/0xc60 [ 334.813876] save_stack_trace+0xc6/0x110 [ 334.817955] kmsan_internal_chain_origin+0x136/0x240 [ 334.823078] kmsan_memcpy_origins+0x13d/0x190 [ 334.827590] __msan_memcpy+0x6f/0x80 [ 334.831321] audit_log_n_string+0x537/0x720 [ 334.835656] audit_log_d_path+0x4dd/0x510 [ 334.839817] audit_log_d_path_exe+0xd7/0x160 [ 334.844259] audit_log_task+0x3c1/0x400 [ 334.848252] audit_seccomp+0x11f/0x3b0 [ 334.852153] __seccomp_filter+0x1480/0x19d0 [ 334.856486] __secure_computing+0x20b/0x3a0 [ 334.860841] syscall_trace_enter+0x962/0x12b0 [ 334.865354] do_syscall_64+0x64/0x110 [ 334.869177] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.874368] [ 334.876000] Uninit was stored to memory at: [ 334.880337] kmsan_internal_chain_origin+0x136/0x240 [ 334.885456] __msan_chain_origin+0x6d/0xb0 [ 334.889709] __save_stack_trace+0x8be/0xc60 [ 334.894079] save_stack_trace+0xc6/0x110 [ 334.898157] kmsan_internal_chain_origin+0x136/0x240 [ 334.903276] kmsan_memcpy_origins+0x13d/0x190 [ 334.907811] __msan_memcpy+0x6f/0x80 [ 334.911538] audit_log_n_string+0x537/0x720 [ 334.915878] audit_log_d_path+0x4dd/0x510 [ 334.920062] audit_log_d_path_exe+0xd7/0x160 [ 334.924492] audit_log_task+0x3c1/0x400 [ 334.928495] audit_seccomp+0x11f/0x3b0 [ 334.932401] __seccomp_filter+0x1480/0x19d0 [ 334.936825] __secure_computing+0x20b/0x3a0 [ 334.941159] syscall_trace_enter+0x962/0x12b0 [ 334.945671] do_syscall_64+0x64/0x110 [ 334.949505] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.954697] [ 334.956330] Uninit was stored to memory at: [ 334.960667] kmsan_internal_chain_origin+0x136/0x240 [ 334.965792] __msan_chain_origin+0x6d/0xb0 [ 334.970042] __save_stack_trace+0x8be/0xc60 [ 334.974397] save_stack_trace+0xc6/0x110 [ 334.978488] kmsan_internal_chain_origin+0x136/0x240 [ 334.983651] kmsan_memcpy_origins+0x13d/0x190 [ 334.988159] __msan_memcpy+0x6f/0x80 [ 334.991885] audit_log_n_string+0x537/0x720 [ 334.996217] audit_log_d_path+0x4dd/0x510 [ 335.000382] audit_log_d_path_exe+0xd7/0x160 [ 335.004805] audit_log_task+0x3c1/0x400 [ 335.008797] audit_seccomp+0x11f/0x3b0 [ 335.012706] __seccomp_filter+0x1480/0x19d0 [ 335.017060] __secure_computing+0x20b/0x3a0 [ 335.021397] syscall_trace_enter+0x962/0x12b0 [ 335.025909] do_syscall_64+0x64/0x110 [ 335.029728] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.034955] [ 335.036587] Uninit was stored to memory at: [ 335.040941] kmsan_internal_chain_origin+0x136/0x240 [ 335.046079] __msan_chain_origin+0x6d/0xb0 [ 335.050347] __save_stack_trace+0x8be/0xc60 [ 335.054681] save_stack_trace+0xc6/0x110 [ 335.058770] kmsan_internal_chain_origin+0x136/0x240 [ 335.063930] kmsan_memcpy_origins+0x13d/0x190 [ 335.068442] __msan_memcpy+0x6f/0x80 [ 335.072192] audit_log_n_string+0x537/0x720 [ 335.076529] audit_log_d_path+0x4dd/0x510 [ 335.080689] audit_log_d_path_exe+0xd7/0x160 [ 335.085115] audit_log_task+0x3c1/0x400 [ 335.089108] audit_seccomp+0x11f/0x3b0 [ 335.093014] __seccomp_filter+0x1480/0x19d0 [ 335.097356] __secure_computing+0x20b/0x3a0 [ 335.101693] syscall_trace_enter+0x962/0x12b0 [ 335.106219] do_syscall_64+0x64/0x110 [ 335.110059] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.115252] [ 335.116883] Uninit was stored to memory at: [ 335.121220] kmsan_internal_chain_origin+0x136/0x240 [ 335.126348] __msan_chain_origin+0x6d/0xb0 [ 335.130593] __save_stack_trace+0x8be/0xc60 [ 335.134930] save_stack_trace+0xc6/0x110 [ 335.139007] kmsan_internal_chain_origin+0x136/0x240 [ 335.144125] kmsan_memcpy_origins+0x13d/0x190 [ 335.148637] __msan_memcpy+0x6f/0x80 [ 335.152365] audit_log_n_string+0x537/0x720 [ 335.156699] audit_log_d_path+0x4dd/0x510 [ 335.160864] audit_log_d_path_exe+0xd7/0x160 [ 335.165289] audit_log_task+0x3c1/0x400 [ 335.169287] audit_seccomp+0x11f/0x3b0 [ 335.173193] __seccomp_filter+0x1480/0x19d0 [ 335.177548] __secure_computing+0x20b/0x3a0 [ 335.181888] syscall_trace_enter+0x962/0x12b0 [ 335.186400] do_syscall_64+0x64/0x110 [ 335.190221] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.195426] [ 335.197083] Local variable description: ----alias_cpa.i@__change_page_attr_set_clr [ 335.204808] Variable was created at: [ 335.208536] __change_page_attr_set_clr+0x6f/0x5080 [ 335.213566] __change_page_attr_set_clr+0x4b70/0x5080 21:28:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x80000) ioctl$RTC_AIE_ON(r0, 0x7001) 21:28:34 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) [ 335.227647] kauditd_printk_skb: 64 callbacks suppressed [ 335.227686] audit: type=1326 audit(1542317313.321:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4573d7 code=0x50000 [ 335.256146] audit: type=1326 audit(1542317314.311:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8805 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:34 executing program 4: socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc4c85512, &(0x7f0000000080)) [ 335.432530] audit: type=1326 audit(1542317314.381:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4573d7 code=0x50000 [ 335.453904] audit: type=1326 audit(1542317314.381:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=3 compat=0 ip=0x411021 code=0x50000 [ 335.475141] audit: type=1326 audit(1542317314.421:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4573d7 code=0x50000 [ 335.496451] audit: type=1326 audit(1542317314.421:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4573d7 code=0x50000 [ 335.517831] audit: type=1326 audit(1542317314.421:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 335.539186] audit: type=1326 audit(1542317314.471:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 335.560847] audit: type=1326 audit(1542317314.471:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 335.582173] audit: type=1326 audit(1542317314.471:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8816 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 21:28:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x1100, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:34 executing program 3: pipe(&(0x7f0000002300)) r0 = socket$inet6(0xa, 0x803, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a581f023c126285719070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @loopback}}]}, 0x190) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:28:35 executing program 5: pipe(&(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x981, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000001c0), 0x5, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x25000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffff22) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:28:35 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:35 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 21:28:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'team0\x00'}) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) 21:28:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000004440)={&(0x7f0000004300)=@getpolicy={0x50, 0x15, 0x0, 0x0, 0x0, {{@in=@dev, @in=@loopback}}}, 0x50}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000bc0)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 336.479713] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) 21:28:35 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='erspan0\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) 21:28:36 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000000780)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x1, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 21:28:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="05000a004e0e689896bcd6e4290eec317629fb09fd2880051afd4c1568e67a8d69d2a2648a14c2b51d8bb07686e4c4a4b962b23c1702803da84251b3d20f8a964133928dc09965bea87a4d13436d9f57a699e9e7d53b588dfea87107b8e8e14b9e871e1563d2caf3c1a0e765e8a406fd79015f7975d8f8633cda4a97600760a95392dd7f3228d11051586ce5f838e0de2b0473a6458468932f006c7f3ffc9b9299e660fba9b1f8683f8bdfa36e381356833b765135a6c618c9ffa1d32bcc219de6d4066113dd3e2c394d845208ca47f302d0627ff1d60aab267f18f125a386b601d07f5707b460c04661a5f51f0d8da6d72690d5040af0f87dd4901aa6f28fe893e0207a81ee36216db95d45ec9b519c11d968c59dd6bc28b52b02ba467e2279c62177768c4da1b89b6902abde8b8379a3a00b5ce9e3147a2ab4716bf3e47ff9df"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) 21:28:36 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x0, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:36 executing program 3: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc", 0x7) read(0xffffffffffffffff, &(0x7f0000000bc0)=""/93, 0xfffffd12) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) 21:28:36 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000000c0)) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:28:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000440) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100), 0x88) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 21:28:36 executing program 4: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x185, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1fd) 21:28:37 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x0, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) [ 338.288851] kernel msg: ebtables bug: please report to author: entries_size too small [ 338.416243] kernel msg: ebtables bug: please report to author: entries_size too small 21:28:37 executing program 3: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc", 0x7) read(0xffffffffffffffff, &(0x7f0000000bc0)=""/93, 0xfffffd12) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) 21:28:37 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:28:37 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) setpriority(0x0, 0x0, 0x0) 21:28:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x981, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffff22) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:28:38 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000340)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x77359400}}) 21:28:38 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'ip6gre0\x00', {0x2, 0x0, @rand_addr}}) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000280)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 21:28:38 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x20}}, 0xc) 21:28:38 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:38 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) dup(r0) 21:28:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) accept4$alg(r0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0xffffffffffffff50, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1, 0x1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r0}}, 0x18) 21:28:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200), 0x4) pipe2(&(0x7f00000000c0), 0x80000) ioctl$RTC_AIE_ON(r1, 0x7001) 21:28:39 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x81, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) 21:28:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6e65742f6465765f736e6d70360076de5dbd89c5cb2c082ab17973ec1cb877a7ca0d95cb209dab0857b9a9d900eeeac527d2c20858976a81c6f217e7b623b6d3be441a22fec13c4f838be2058df88f2a5d16a19b57102c") getdents(r0, &(0x7f0000000180)=""/36, 0x24) getdents(r0, &(0x7f00000002c0)=""/193, 0xe7) 21:28:39 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000000)={{}, "7304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003fd37f75000000000000001f00"}) read(r0, &(0x7f0000000d00)=""/107, 0x6b) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 340.689614] input: syz1 as /devices/virtual/input/input5 [ 340.783985] input: syz1 as /devices/virtual/input/input6 21:28:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 340.849981] kauditd_printk_skb: 24 callbacks suppressed [ 340.850017] audit: type=1326 audit(1542317319.891:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8985 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) syz_execute_func(&(0x7f0000000880)="3666440f50f564ff0941c3470f29fa660f383dffc42221b888010000003e0f1110c442019dccd3f71919") sendmsg$unix(r1, &(0x7f0000000840)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000040), 0x10000000000000c6, &(0x7f0000000100), 0x37c}, 0x0) 21:28:40 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x100000004) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x0) 21:28:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000100)=0x200000, 0xffff) 21:28:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sendto$unix(r2, &(0x7f0000000040), 0x32c, 0x20003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_group_source_req(r2, 0x0, 0x0, &(0x7f00000002c0)={0x0, {}, {{0x2, 0x0, @multicast2}}}, 0x108) 21:28:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:40 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) 21:28:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000601000/0x600000)=nil, 0x600000, &(0x7f0000000080)=""/144) 21:28:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:41 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x4, 0x4, 0x5, r1}, 0x2c) 21:28:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") fstat(r0, &(0x7f0000000440)) 21:28:41 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc008551c, &(0x7f0000000080)) 21:28:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:41 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x0, 0x4, 0x5, r1}, 0x2c) 21:28:42 executing program 3: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0x0) 21:28:42 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:42 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 21:28:42 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x0, 0x4, 0x5, r1}, 0x2c) 21:28:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000280)=0x400, 0x1fb) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80000000002, 0x4) recvmmsg(r0, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) 21:28:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) 21:28:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r0}}, 0x18) 21:28:42 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:42 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x0, 0x4, 0x5, r1}, 0x2c) 21:28:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={"69705f76746930001e00", 0x800201e}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@dev, 0x0, r3}) sendto(r1, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000200)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) 21:28:43 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:43 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000800), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="92a199e2440000998b2ac0f54f70a51500"], 0x1}}, 0x0) 21:28:43 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x0, 0x5, r1}, 0x2c) 21:28:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 21:28:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d0000d3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) write$binfmt_misc(r1, &(0x7f0000000200)={'syz0'}, 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 21:28:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) 21:28:44 executing program 4: socket$pppoe(0x18, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000580), 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 21:28:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:44 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x0, 0x5, r1}, 0x2c) 21:28:45 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 21:28:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 346.145778] audit: type=1326 audit(1542317325.191:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9347 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:45 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000800), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="92a199e2440000998b2ac0f54f70a51500"], 0x1}}, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x54) 21:28:45 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x0, 0x5, r1}, 0x2c) 21:28:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) 21:28:45 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r1}, 0x2c) 21:28:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='wchan\x00') syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") fcntl$setstatus(r0, 0x5, 0x0) [ 346.891621] audit: type=1326 audit(1542317325.931:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9347 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:46 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 347.135957] audit: type=1326 audit(1542317326.181:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9381 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:46 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r1}, 0x2c) 21:28:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0x30}}, 0x0) 21:28:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 21:28:46 executing program 4: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001200), 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000251000/0x1000)=nil, 0x1000) [ 347.533247] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 21:28:46 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 347.595504] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 21:28:46 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r1}, 0x2c) 21:28:46 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc4c85512, &(0x7f0000000080)) [ 347.924894] audit: type=1326 audit(1542317326.971:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9381 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) 21:28:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:47 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x5}, 0x2c) 21:28:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 348.434541] audit: type=1326 audit(1542317327.481:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9430 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:47 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x3, 0x1}) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/31, 0x1f) ioctl(r2, 0x0, &(0x7f0000000280)) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8, 0x0, 0x0, 0x9e1f}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:28:47 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) [ 348.801367] binder: 9448:9449 ioctl 0 20000280 returned -22 [ 348.867033] audit: type=1326 audit(1542317327.911:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9450 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() 21:28:48 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 349.597581] binder: 9448:9469 ioctl 0 20000280 returned -22 [ 349.651220] audit: type=1326 audit(1542317328.691:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9450 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:49 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040)=0x100, 0x100f3) sendto$inet6(r1, &(0x7f0000000140)="0303000007005b0000000000fff55b4202938207d9fb3780398d5375000000007929309ee616d5c01843e06590080053c0e385472da7222a2bb401000000c3b50035110f11010000005dc62600009b000000faffffff00000000aeb46245004bad2a66c9c1cfdf567c88046a18", 0x6d, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x3, @local}, 0x1c) 21:28:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:49 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 21:28:49 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc4c85513, &(0x7f0000000080)) 21:28:49 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:49 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 350.274402] audit: type=1326 audit(1542317329.321:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:49 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 350.354646] audit: type=1326 audit(1542317329.371:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9477 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:49 executing program 4: syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00082c00fe8000000000000000dc00000000009618f606e7d9bbfe8000007d042dda00000100000000aa0000f94fad012580f522d8881fc857847ace4bc4652431cdea2235e1d98ed0ea81a1f83eae4241babca14a7b852df10a3403546df7e9bfb303bf1ef041fb1ac21be8e940504727ba02166e061a935b5dc72b3c7ba0f337400707caf3eb1841af29a39f10659776d6628505ce4ff3067c7e61fffae927ec7b7cd1eaf727dd9abba2fed747e7f21a85a7897ae65a783444e063fb0f9efbed088414b4d1c3562ccc4b26daf5141fd0ec5d1119bdefd93ad059e83de74d3c89a3e0d540f632"], &(0x7f0000000040)) 21:28:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x548, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, &(0x7f0000000080), &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x5c0) [ 351.037611] audit: type=1326 audit(1542317330.081:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:50 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)={0x0, 0x4, 0x9, 0x100}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000080)={0x74, &(0x7f00000002c0)=""/116}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team_slave_0\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc", 0x7) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x100c1) read(r1, &(0x7f0000000bc0)=""/93, 0xfffffd12) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) 21:28:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x1fe, &(0x7f0000000680)="7162d06ad73bb20926a80860bfa78e9a5e844f552006805b48372366a8a7b04ac46d417cec20162f8a9bdabd669870f90cb209645a4576d02e33ee6c081bde8cc549e37494ccbe3fd2d63ada758d3a3e9c96bb657b32e80a142adbe85bf3e88a28feb0eb394920b34313ac633cb8d790f047e4d076e99d98dd83b86bb32ae778616bb6e315b374b98ba2e70cee1a9c8d9c5f77a1d35de494c8eaabf09dff3bb3a6fea75d7d09147138c7b09a80cd3ba19763") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.eventw\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0xf, 0x6) ioctl(r2, 0x4000002, &(0x7f00000005c0)="025c76408d8fe4f85370") ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$inet(0x2, 0x10, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e21}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0x35, @ipv4, 0x9}, @in={0x2, 0x4e20, @remote}], 0x5c) mmap(&(0x7f00009c4000/0x4000)=nil, 0x4000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000200)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r3, 0x9, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00^\x00\x00\x00\x00') bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0xfffffffffffffeb3) connect$inet(r3, &(0x7f00009322c4)={0x2, 0xfffffffffffffffe}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0xfffffffffffffd5d) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000580)=0x8, 0x4) r5 = socket$inet6(0xa, 0x2, 0x80000001) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x1f}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000003c0)={r6, 0x40, 0x3, 0xffffffffffffffff, 0xf68, 0xd3}, &(0x7f0000000400)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000f40)=ANY=[@ANYBLOB="36adb3ddbb04407049dc65f34d716efb47db17462ece4235e0801961a159ce41d1cb5d502dd5c3995b06ff4f460a251587b1c601689e86cb66a9e948c062afffaacccb1f910705f9e9de5e6779901a8849c195c286bea4d845db51efcad4132a57a49ada947133849dafd0dbe195aea476f699bd0bd97b841cbb2e46dee147870a4efe793c0fa9accb9d259c545c3a4c3b31801c018f43ce30aa9a8028b98a1cbdfa0abf359b14014e897232fa0ce7f220945246cb634fa22c5a6428770e310e2577da206a2e04e3b91e452b855320793c6ebae5f0e81938eb2ca65e878bcceca0dfb3747dadebd03bb07dec7d46c2b0c6f3073bdf9870b001faa8fb3af390c5d78e2e15c5e417642233d709a2594bacd1a4122772a389b18956da6fa95142b76a50f7ded567a47d0a86938fabad55d70f2344698d8bab2b8a30aef52892d15c4c1a638eb3d01b8a91303f1af72f1c49bc020fa9fae183bcfb7e535d904287eae8ac05d8539b80f4553250ee1fdf5420b89be477c942c8a4e9de0100000000000000055b01040000000000009f8dceac554dee5bbdeb49c71d33367896278d67e9854387fd33a6554c0494fa63b9c5170d0000000000007ab307dfd819737d14ad353c379b6439efbc0d9f397cb6e99efaa45a1e16500112154105f4fdecb5c77bd61fabd4c43bff8cb18929d8aba70b27cafebdbb505a4cb00ef8cd9098bbfe93c953bfd3bfe4cfbd7185b4a7e797f0345f576f4a3ad5ff2000000000000000a18dcfc9137b38b79c4f471ef729702e801a0fae168d9ea6841a89b06cef7f6b38d30210cc8d49c5aa82309dd1e8951a990641be3d68080a1f0b4debb5cb9259155a6576b73d7d8e20e17631a53f3ee112000000347f8aeba5b445d123c2f73621caadbbec97c81c287f98fc37f9911fdf9a471c54efdda51fc5e86fa386c8adbbd9fd5c888064ea25d99bc47323c623e3d0616ac4e4b2461b4c15e8c3a4f67be1af739e138133062ec104d91ec4b0e472bc477e3cbbbc67a24e9f17d49b04469cc8c47d20cdb5bd9587b1156e29de8a409833182acabfc0b1cf57ae6ff573dead5959295f422dd41e653e2d7de0d77f06f9f80da48998719d00000000000000000000000000000036e1122e6128cb8d16c7fd25c8483089630a2d8f85bc23945b59bf6910048ee42c7c0b67678356223db548362ab79394becd5a1ca2d064d40760bc96f57365054af002e078310c45a3deb33963b08d19b1f3c5f1161bb4cf477e35f27f2db3a98df7efd071dd", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000440)=0xa) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={r6, 0xfffffffffffff03e}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000480)={r7, @in6={{0xa, 0x4e23, 0x8, @local, 0x5}}, 0x3, 0x4, 0xed0, 0xaf6e, 0xb}, &(0x7f0000000540)=0x98) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x8, [0xfffffffffffffe00, 0x4009, 0x7, 0x7a1, 0x20, 0x3, 0xffffffffffffffff, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x100000, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x2}, 0xffffffffffffffff}, 0x5c) 21:28:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x22b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) futex(&(0x7f0000000040)=0x1, 0x0, 0x1, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180), 0x0) r1 = dup2(r0, r0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) [ 351.692971] audit: type=1326 audit(1542317330.731:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9526 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 351.831305] audit: type=1326 audit(1542317330.801:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 351.853159] audit: type=1326 audit(1542317330.821:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.874585] audit: type=1326 audit(1542317330.821:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.895960] audit: type=1326 audit(1542317330.831:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.917383] audit: type=1326 audit(1542317330.871:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.938772] audit: type=1326 audit(1542317330.871:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.960208] audit: type=1326 audit(1542317330.901:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 351.981623] audit: type=1326 audit(1542317330.901:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 352.003227] audit: type=1326 audit(1542317330.931:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9521 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 21:28:51 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) prctl$setname(0xf, &(0x7f0000000000)=']m#(,\x00\x00\x00\x00\x00\x00\x00') 21:28:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp, &(0x7f0000000bc0)=0xffed) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x44, &(0x7f0000000180)) 21:28:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:51 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:51 executing program 1: 21:28:52 executing program 4: 21:28:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) socket$inet6(0xa, 0x1000000000002, 0xa) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:52 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) ptrace$peekuser(0x3, 0x0, 0x0) 21:28:52 executing program 4: socket$inet(0x2, 0x6, 0x2) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 21:28:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 353.565403] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:28:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 353.736172] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 21:28:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 353.937941] input: syz1 as /devices/virtual/input/input7 21:28:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 354.060023] input: syz1 as /devices/virtual/input/input8 21:28:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 21:28:53 executing program 1: 21:28:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}]}, 0x2c}}, 0x0) 21:28:53 executing program 3: 21:28:53 executing program 4: 21:28:53 executing program 1: 21:28:54 executing program 3: 21:28:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}]}, 0x2c}}, 0x0) 21:28:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:54 executing program 1: 21:28:54 executing program 4: 21:28:54 executing program 3: 21:28:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}]}, 0x2c}}, 0x0) 21:28:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:54 executing program 1: 21:28:54 executing program 4: 21:28:54 executing program 3: 21:28:55 executing program 1: 21:28:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 21:28:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:55 executing program 4: 21:28:55 executing program 3: 21:28:55 executing program 1: 21:28:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 21:28:55 executing program 3: 21:28:55 executing program 1: 21:28:55 executing program 4: 21:28:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 21:28:56 executing program 3: 21:28:56 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:56 executing program 4: 21:28:56 executing program 1: 21:28:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:56 executing program 3: [ 357.728766] kauditd_printk_skb: 52 callbacks suppressed [ 357.728823] audit: type=1326 audit(1542317336.771:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9713 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:56 executing program 1: 21:28:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:56 executing program 4: 21:28:56 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:57 executing program 3: 21:28:57 executing program 4: 21:28:57 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:57 executing program 1: 21:28:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0xfffff000}, 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) 21:28:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:57 executing program 3: 21:28:57 executing program 4: [ 358.750472] audit: type=1326 audit(1542317337.791:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9743 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:57 executing program 0: 21:28:57 executing program 3: 21:28:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:58 executing program 4: 21:28:58 executing program 1: 21:28:58 executing program 0: 21:28:58 executing program 1: 21:28:58 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="00f04e3ab9b39a717b121ce28e0146b9cfa624465222e195af75e17ecb82c8cb268c24a2b3b97af80558f1e474405774832ef88640cbf81f7c55c1805d37109169c3437898909adabadc8b6d1220e27dee45c964a0d671bbe1e3b46d"], &(0x7f00000002c0)={0x0, 0xffffffffffffffff, [0x0, 0xcc2]}) 21:28:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:58 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:28:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x38}}, 0x0) 21:28:58 executing program 4: 21:28:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x100000000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0xf0ffff}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [0x6000000]}}]}, 0x2c}}, 0x0) [ 359.762513] audit: type=1326 audit(1542317338.801:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9772 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:28:58 executing program 1: r0 = socket(0x1000100000010, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="2800030000408ecf9e0a8a9dea02eb003c5e78"], &(0x7f00000003c0)=0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)=0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000005e00)={&(0x7f0000005a00), 0xc, &(0x7f0000005dc0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1e6323ab93c8a3404bee14791f8715832b716b42a71ab2a30c0000000000003a20ea7d3f384a0aadca21423c41116003b9531c80c77ea004d19c1fa6567244cd56be5e5e137fc7be806b2de4b1558396c4951701cda7675d1bf5025f6a44bbbaa98564fbe5a7e224bb347de3454939a8c7c9c4b3868784d5c1c2cac9c3de0667e15d1469"], 0x1}}, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000800)={'vlan0\x00', 0x15}) write(r2, &(0x7f0000000380)="1f0000001e0007f1fff5ff0200000000", 0x10) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000000c0)={'team_slave_1\x00'}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000680)={0x0, 0x6}, &(0x7f0000000600)=0x8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000540)={0x0, 0x0}) preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000700)=""/136, 0x88}], 0x1, 0x0) close(r5) recvmmsg(r4, &(0x7f0000005b80)=[{{&(0x7f0000005440)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005600)=[{&(0x7f0000005540)=""/163, 0xa3}], 0x1, &(0x7f0000005640)=""/190, 0xbe}}], 0x1, 0x41, &(0x7f0000005d00)={0x0, 0x989680}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x7, &(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000a40)={'veth1_to_bridge\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000a80)={@empty, 0x6e}) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r6, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f0000000ac0)={0x34, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000100), 0x4) bind(0xffffffffffffffff, &(0x7f0000000980)=@pppoe={0x18, 0x0, {0x0, @empty, 'ipddp0\x00'}}, 0x80) recvmsg(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:58 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:28:59 executing program 3: socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="00f04e3ab9b39a717b121ce28e0146b9cfa624465222e195af75e17ecb82c8cb268c24a2b3b97af80558f1e474405774832ef88640cbf81f7c55c1805d37109169c3437898909adabadc8b6d1220e27dee45c964a0d671bbe1e3b46d"], &(0x7f00000002c0)={0x0, 0xffffffffffffffff, [0x0, 0xcc2]}) 21:28:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000000)=0x50b0beea, 0x4) 21:28:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d0000d3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000140)={0x77359400}, 0x10) write$binfmt_misc(r1, &(0x7f0000000200)={'syz0'}, 0x4) 21:28:59 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'rose0\x00', @broadcast}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 360.492025] not chained 30000 origins [ 360.495909] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 4.20.0-rc2+ #87 [ 360.502779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.512149] Call Trace: [ 360.514784] dump_stack+0x32d/0x480 [ 360.518473] kmsan_internal_chain_origin+0x222/0x240 [ 360.523636] ? kmsan_set_origin+0x7f/0x100 [ 360.527912] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 360.533348] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 360.538846] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 360.544344] ? in_task_stack+0x12c/0x210 [ 360.548528] ? task_kmsan_context_state+0x51/0x90 [ 360.553400] ? __msan_get_context_state+0x9/0x20 [ 360.558191] ? __kernel_text_address+0x19/0x350 [ 360.562890] ? ret_from_fork+0x35/0x40 [ 360.566816] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 360.572306] ? in_task_stack+0x12c/0x210 [ 360.576417] __msan_chain_origin+0x6d/0xb0 [ 360.580685] ? tcp_v4_rcv+0x5a13/0x6520 [ 360.584689] __save_stack_trace+0x8be/0xc60 [ 360.589080] ? tcp_v4_rcv+0x5a13/0x6520 [ 360.593098] save_stack_trace+0xc6/0x110 [ 360.597195] kmsan_internal_chain_origin+0x136/0x240 [ 360.602321] ? run_ksoftirqd+0x37/0x60 [ 360.606257] ? kmsan_internal_chain_origin+0x136/0x240 [ 360.611556] ? kmsan_memcpy_origins+0x13d/0x190 [ 360.616261] ? __msan_memcpy+0x6f/0x80 [ 360.620181] ? pskb_expand_head+0x436/0x1d20 [ 360.624621] ? skb_shift+0xce2/0x2d10 [ 360.628448] ? tcp_sacktag_walk+0x2156/0x29d0 [ 360.632986] ? tcp_sacktag_write_queue+0x2805/0x4630 [ 360.638117] ? tcp_ack+0x2888/0xa010 [ 360.641857] ? tcp_rcv_established+0xf7e/0x2940 [ 360.646555] ? tcp_v4_do_rcv+0x686/0xd80 [ 360.650679] ? tcp_v4_rcv+0x5a13/0x6520 [ 360.654678] ? ip_local_deliver_finish+0x8d8/0xff0 [ 360.659632] ? ip_local_deliver+0x44b/0x510 [ 360.664006] ? ip_rcv+0x6b6/0x740 [ 360.667491] ? process_backlog+0x82b/0x11e0 [ 360.671842] ? net_rx_action+0x98f/0x1d50 [ 360.676020] ? __do_softirq+0x721/0xc7f [ 360.680047] ? run_ksoftirqd+0x37/0x60 [ 360.683969] ? smpboot_thread_fn+0x69c/0xb30 [ 360.688409] ? kthread+0x5e7/0x620 [ 360.691973] ? ret_from_fork+0x35/0x40 [ 360.695897] ? memcg_kmem_put_cache+0x73/0x460 [ 360.700547] ? __kmalloc_node_track_caller+0x1010/0x14e0 [ 360.706050] ? __msan_get_context_state+0x9/0x20 [ 360.710834] ? INIT_INT+0xc/0x30 [ 360.714253] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 360.719670] kmsan_memcpy_origins+0x13d/0x190 [ 360.724238] __msan_memcpy+0x6f/0x80 [ 360.728001] pskb_expand_head+0x436/0x1d20 [ 360.732324] skb_shift+0xce2/0x2d10 [ 360.736028] tcp_sacktag_walk+0x2156/0x29d0 [ 360.740428] tcp_sacktag_write_queue+0x2805/0x4630 [ 360.745458] tcp_ack+0x2888/0xa010 [ 360.749039] ? tcp_parse_options+0xbe/0x1cf0 [ 360.753486] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 360.758976] ? tcp_parse_options+0x1c55/0x1cf0 [ 360.763684] tcp_rcv_established+0xf7e/0x2940 [ 360.768253] ? __msan_get_context_state+0x9/0x20 [ 360.773067] tcp_v4_do_rcv+0x686/0xd80 [ 360.776999] tcp_v4_rcv+0x5a13/0x6520 [ 360.780952] ? tcp_filter+0x260/0x260 [ 360.784858] ip_local_deliver_finish+0x8d8/0xff0 [ 360.789652] ? nf_hook_slow+0x36f/0x3d0 [ 360.793679] ip_local_deliver+0x44b/0x510 [ 360.797871] ? ip_local_deliver+0x510/0x510 [ 360.802230] ? ip_call_ra_chain+0x7a0/0x7a0 [ 360.806588] ip_rcv+0x6b6/0x740 [ 360.809919] ? ip_rcv_core+0x1370/0x1370 [ 360.814039] process_backlog+0x82b/0x11e0 [ 360.818221] ? ip_local_deliver_finish+0xff0/0xff0 [ 360.823220] ? rps_trigger_softirq+0x2e0/0x2e0 [ 360.827838] net_rx_action+0x98f/0x1d50 [ 360.831872] ? net_tx_action+0xf20/0xf20 [ 360.835962] __do_softirq+0x721/0xc7f [ 360.839815] ? ksoftirqd_should_run+0x50/0x50 [ 360.844332] run_ksoftirqd+0x37/0x60 [ 360.848072] smpboot_thread_fn+0x69c/0xb30 [ 360.852352] kthread+0x5e7/0x620 [ 360.855754] ? cpu_report_death+0x4a0/0x4a0 [ 360.860139] ? INIT_BOOL+0x30/0x30 [ 360.863745] ret_from_fork+0x35/0x40 [ 360.867493] Uninit was stored to memory at: [ 360.871837] kmsan_internal_chain_origin+0x136/0x240 [ 360.876976] __msan_chain_origin+0x6d/0xb0 [ 360.881234] __save_stack_trace+0x8be/0xc60 [ 360.885590] save_stack_trace+0xc6/0x110 [ 360.889691] kmsan_internal_chain_origin+0x136/0x240 [ 360.894841] kmsan_memcpy_origins+0x13d/0x190 [ 360.899403] __msan_memcpy+0x6f/0x80 [ 360.903157] pskb_expand_head+0x436/0x1d20 [ 360.907414] skb_shift+0xce2/0x2d10 [ 360.911095] tcp_sacktag_walk+0x2156/0x29d0 [ 360.915449] tcp_sacktag_write_queue+0x2805/0x4630 [ 360.920393] tcp_ack+0x2888/0xa010 [ 360.923952] tcp_rcv_established+0xf7e/0x2940 [ 360.928470] tcp_v4_do_rcv+0x686/0xd80 [ 360.932372] tcp_v4_rcv+0x5a13/0x6520 [ 360.936228] ip_local_deliver_finish+0x8d8/0xff0 [ 360.941017] ip_local_deliver+0x44b/0x510 [ 360.945182] ip_rcv+0x6b6/0x740 [ 360.948488] process_backlog+0x82b/0x11e0 [ 360.952673] net_rx_action+0x98f/0x1d50 [ 360.956674] __do_softirq+0x721/0xc7f [ 360.960481] [ 360.962122] Uninit was stored to memory at: [ 360.966472] kmsan_internal_chain_origin+0x136/0x240 [ 360.971605] __msan_chain_origin+0x6d/0xb0 [ 360.975868] __save_stack_trace+0x8be/0xc60 [ 360.980229] save_stack_trace+0xc6/0x110 [ 360.984327] kmsan_internal_chain_origin+0x136/0x240 [ 360.989460] kmsan_memcpy_origins+0x13d/0x190 [ 360.993997] __msan_memcpy+0x6f/0x80 [ 360.997996] pskb_expand_head+0x436/0x1d20 [ 361.002292] skb_shift+0xce2/0x2d10 [ 361.005976] tcp_sacktag_walk+0x2156/0x29d0 [ 361.010334] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.015288] tcp_ack+0x2888/0xa010 [ 361.018853] tcp_rcv_established+0xf7e/0x2940 [ 361.023374] tcp_v4_do_rcv+0x686/0xd80 [ 361.027299] tcp_v4_rcv+0x5a13/0x6520 [ 361.031135] ip_local_deliver_finish+0x8d8/0xff0 [ 361.035927] ip_local_deliver+0x44b/0x510 [ 361.040095] ip_rcv+0x6b6/0x740 [ 361.043400] process_backlog+0x82b/0x11e0 [ 361.047591] net_rx_action+0x98f/0x1d50 [ 361.051589] __do_softirq+0x721/0xc7f [ 361.055419] [ 361.057091] Uninit was stored to memory at: [ 361.061546] kmsan_internal_chain_origin+0x136/0x240 [ 361.066689] __msan_chain_origin+0x6d/0xb0 [ 361.070964] __save_stack_trace+0x8be/0xc60 [ 361.075324] save_stack_trace+0xc6/0x110 [ 361.079405] kmsan_internal_chain_origin+0x136/0x240 [ 361.084530] kmsan_memcpy_origins+0x13d/0x190 [ 361.089052] __msan_memcpy+0x6f/0x80 [ 361.092790] pskb_expand_head+0x436/0x1d20 [ 361.097028] skb_shift+0xce2/0x2d10 [ 361.100648] tcp_sacktag_walk+0x2156/0x29d0 [ 361.104982] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.109940] tcp_ack+0x2888/0xa010 [ 361.113506] tcp_rcv_established+0xf7e/0x2940 [ 361.118019] tcp_v4_do_rcv+0x686/0xd80 [ 361.121903] tcp_v4_rcv+0x5a13/0x6520 [ 361.125698] ip_local_deliver_finish+0x8d8/0xff0 [ 361.130466] ip_local_deliver+0x44b/0x510 [ 361.134610] ip_rcv+0x6b6/0x740 [ 361.137988] process_backlog+0x82b/0x11e0 [ 361.142160] net_rx_action+0x98f/0x1d50 [ 361.146160] __do_softirq+0x721/0xc7f [ 361.149944] [ 361.151577] Uninit was stored to memory at: [ 361.155898] kmsan_internal_chain_origin+0x136/0x240 [ 361.161019] __msan_chain_origin+0x6d/0xb0 [ 361.165275] __save_stack_trace+0x8be/0xc60 [ 361.169628] save_stack_trace+0xc6/0x110 [ 361.173684] kmsan_internal_chain_origin+0x136/0x240 [ 361.178808] kmsan_memcpy_origins+0x13d/0x190 [ 361.183315] __msan_memcpy+0x6f/0x80 [ 361.187057] pskb_expand_head+0x436/0x1d20 [ 361.191308] skb_shift+0xce2/0x2d10 [ 361.194939] tcp_sacktag_walk+0x2156/0x29d0 [ 361.199267] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.204191] tcp_ack+0x2888/0xa010 [ 361.207788] tcp_rcv_established+0xf7e/0x2940 [ 361.212330] tcp_v4_do_rcv+0x686/0xd80 [ 361.216234] tcp_v4_rcv+0x5a13/0x6520 [ 361.220042] ip_local_deliver_finish+0x8d8/0xff0 [ 361.224801] ip_local_deliver+0x44b/0x510 [ 361.228952] ip_rcv+0x6b6/0x740 [ 361.232228] process_backlog+0x82b/0x11e0 [ 361.236390] net_rx_action+0x98f/0x1d50 [ 361.240374] __do_softirq+0x721/0xc7f [ 361.244214] [ 361.245839] Uninit was stored to memory at: [ 361.250170] kmsan_internal_chain_origin+0x136/0x240 [ 361.255288] __msan_chain_origin+0x6d/0xb0 [ 361.259518] __save_stack_trace+0x8be/0xc60 [ 361.263835] save_stack_trace+0xc6/0x110 [ 361.267896] kmsan_internal_chain_origin+0x136/0x240 [ 361.273020] kmsan_memcpy_origins+0x13d/0x190 [ 361.277512] __msan_memcpy+0x6f/0x80 [ 361.281226] pskb_expand_head+0x436/0x1d20 [ 361.285476] skb_shift+0xce2/0x2d10 [ 361.289125] tcp_sacktag_walk+0x2156/0x29d0 [ 361.293472] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.298412] tcp_ack+0x2888/0xa010 [ 361.301962] tcp_rcv_established+0xf7e/0x2940 [ 361.306454] tcp_v4_do_rcv+0x686/0xd80 [ 361.310353] tcp_v4_rcv+0x5a13/0x6520 [ 361.314152] ip_local_deliver_finish+0x8d8/0xff0 [ 361.318903] ip_local_deliver+0x44b/0x510 [ 361.323062] ip_rcv+0x6b6/0x740 [ 361.326350] process_backlog+0x82b/0x11e0 [ 361.330511] net_rx_action+0x98f/0x1d50 [ 361.334498] __do_softirq+0x721/0xc7f [ 361.338306] [ 361.339923] Uninit was stored to memory at: [ 361.344277] kmsan_internal_chain_origin+0x136/0x240 [ 361.349395] __msan_chain_origin+0x6d/0xb0 [ 361.353640] __save_stack_trace+0x8be/0xc60 [ 361.358259] save_stack_trace+0xc6/0x110 [ 361.362337] kmsan_internal_chain_origin+0x136/0x240 [ 361.367456] kmsan_memcpy_origins+0x13d/0x190 [ 361.371949] __msan_memcpy+0x6f/0x80 [ 361.375682] pskb_expand_head+0x436/0x1d20 [ 361.379951] skb_shift+0xce2/0x2d10 [ 361.383605] tcp_sacktag_walk+0x2156/0x29d0 [ 361.387955] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.392911] tcp_ack+0x2888/0xa010 [ 361.396468] tcp_rcv_established+0xf7e/0x2940 [ 361.400975] tcp_v4_do_rcv+0x686/0xd80 [ 361.404868] tcp_v4_rcv+0x5a13/0x6520 [ 361.408691] ip_local_deliver_finish+0x8d8/0xff0 [ 361.413480] ip_local_deliver+0x44b/0x510 [ 361.417636] ip_rcv+0x6b6/0x740 [ 361.420925] process_backlog+0x82b/0x11e0 [ 361.425088] net_rx_action+0x98f/0x1d50 [ 361.429060] __do_softirq+0x721/0xc7f [ 361.432867] [ 361.434500] Uninit was stored to memory at: [ 361.438844] kmsan_internal_chain_origin+0x136/0x240 [ 361.443961] __msan_chain_origin+0x6d/0xb0 [ 361.448224] __save_stack_trace+0x8be/0xc60 [ 361.452566] save_stack_trace+0xc6/0x110 [ 361.456664] kmsan_internal_chain_origin+0x136/0x240 [ 361.461774] kmsan_memcpy_origins+0x13d/0x190 [ 361.466289] __msan_memcpy+0x6f/0x80 [ 361.470002] pskb_expand_head+0x436/0x1d20 [ 361.474233] skb_shift+0xce2/0x2d10 [ 361.477903] tcp_sacktag_walk+0x2156/0x29d0 [ 361.482265] tcp_sacktag_write_queue+0x2805/0x4630 [ 361.487381] tcp_ack+0x2888/0xa010 [ 361.490940] tcp_rcv_established+0xf7e/0x2940 [ 361.495469] tcp_v4_do_rcv+0x686/0xd80 [ 361.499410] tcp_v4_rcv+0x5a13/0x6520 [ 361.503234] ip_local_deliver_finish+0x8d8/0xff0 [ 361.508021] ip_local_deliver+0x44b/0x510 [ 361.512169] ip_rcv+0x6b6/0x740 [ 361.515511] process_backlog+0x82b/0x11e0 [ 361.519656] net_rx_action+0x98f/0x1d50 [ 361.523642] __do_softirq+0x721/0xc7f [ 361.527447] [ 361.529069] Local variable description: ----v.addr.i.i.i@ipv4_conntrack_local [ 361.536368] Variable was created at: [ 361.540081] ipv4_conntrack_local+0x75/0x470 [ 361.544507] nf_hook_slow+0x15c/0x3d0 21:29:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000780), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf1f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979843b3355236be93426485f99f87998f48ad7ffa29bda080d701b70d252407218fad612e074583416711ec1053ba40f26809a95171a9") fsetxattr(r2, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0xfe9, 0x0) accept4$packet(r1, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14, 0x0) 21:29:00 executing program 4: open$dir(&(0x7f0000000080)='./file0\x00', 0xfffd, 0x200000000004101) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000000c0)) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)) 21:29:00 executing program 3: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) 21:29:00 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) [ 361.990900] audit: type=1326 audit(1542317341.031:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9823 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:01 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:01 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="030000000000000008001b0000000000"], 0x1}}, 0x0) dup2(r0, 0xffffffffffffffff) 21:29:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)="88", 0x1}]) io_destroy(r2) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x0, 0x2}}, 0x59) 21:29:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x1dd, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 21:29:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 21:29:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:01 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffb}]}, 0x60}}, 0x0) 21:29:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:01 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000100)) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 21:29:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) [ 363.124335] audit: type=1326 audit(1542317342.161:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9869 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="02074015020000000000000000000000ece3b94edb71a7c57a872c381164595b68"], 0x21}}, 0x0) 21:29:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:02 executing program 3: capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000240)='setgroups\x00') 21:29:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) rt_sigpending(&(0x7f0000000040), 0x8) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000180)={'dummy0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f0000000840)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xe, 0xe6, 0x0, 0x0, 0x7f, 0x0, 0x7ff, 0x3, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) lchown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\']:vboxnet1\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000001780)=ANY=[@ANYBLOB="7f"], 0x1) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/38) [ 363.411498] capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure 21:29:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x1dd, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 21:29:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000ff000a000200fefffffb0080566ff2e8e384c96e97a0ac87b3e24c183425f0ecddff6d46b5861c27abcf212932d08c789e6be34dd5613e99ca4a6b463c2441d43392c54bd0382082162a5c356e296b603abd99e6ded35d52f2bdfbf42866e96085040f428295c4412623e6b1d9d210df837033a7bf59c0e6224646fb112719361cf9e235b678a9f014d551f985eab1e6e5204fd44fc088ce14d4e6"], 0x1}}, 0x0) 21:29:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:03 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:03 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbbf40) unlink(&(0x7f0000000600)='./file0\x00') rmdir(&(0x7f0000000040)='./file1\x00') 21:29:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x8000400) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000080)) 21:29:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:03 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000080)) [ 364.216613] audit: type=1326 audit(1542317343.261:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9908 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xf, r0, 0x0, 0x0) 21:29:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x3, 0xffffffffffffffff, 0x1}) 21:29:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:29:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x1dd, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 21:29:04 executing program 3: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7, 0x40601) 21:29:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)) 21:29:04 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 365.450848] audit: type=1326 audit(1542317344.491:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9949 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a45322, &(0x7f00000003c0)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000280), 0x102002700) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) 21:29:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:29:04 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000080)={0x2000000}) 21:29:04 executing program 4: syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0xc203) [ 365.730937] usb usb1: usbfs: interface 0 claimed by hub while 'syz-executor3' sets config #33554432 21:29:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:29:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$video4linux(&(0x7f00000004c0)='/dev/v4l-subdev#\x00', 0x6, 0x8000) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000500)={0x0, 0x4, 0x9, 0x100}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000007c0)=""/255) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000080)={0x74, &(0x7f00000002c0)=""/116}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team_slave_0\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0fc7f43e650f01c80f060fae8600000f01eeba410066ed66b9b70900000f320fc76cf6b876028ed8b84e0c8ed0"}], 0x0, 0x0, &(0x7f00000001c0), 0x100000000000023e) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f00000000c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc", 0x7) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x100c1) read(r3, &(0x7f0000000bc0)=""/93, 0xfffffd12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f0000000100)=0x10) 21:29:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x79, 0x0, [0x20000000]}) 21:29:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)=@mpls_getnetconf={0x14, 0x52, 0xd11}, 0x14}}, 0x0) [ 366.421584] audit: type=1326 audit(1542317345.451:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 366.497580] audit: type=1326 audit(1542317345.491:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 366.519043] audit: type=1326 audit(1542317345.521:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 21:29:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 366.540466] audit: type=1326 audit(1542317345.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 366.561807] audit: type=1326 audit(1542317345.531:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 366.583257] audit: type=1326 audit(1542317345.581:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 366.604598] audit: type=1326 audit(1542317345.601:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9965 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 21:29:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a45322, &(0x7f00000003c0)) sendfile(0xffffffffffffffff, r1, &(0x7f0000000280), 0x102002700) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) 21:29:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2201, 0x70f000) 21:29:06 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") flock(r0, 0x8) 21:29:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) 21:29:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) accept(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000140)=0x80) 21:29:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)) 21:29:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)) 21:29:06 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 21:29:07 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 21:29:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)) [ 368.553758] kauditd_printk_skb: 75 callbacks suppressed [ 368.553798] audit: type=1326 audit(1542317347.601:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10037 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) accept(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000140)=0x80) [ 368.656931] input: syz1 as /devices/virtual/input/input9 21:29:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) [ 368.788024] input: syz1 as /devices/virtual/input/input10 [ 368.891620] audit: type=1326 audit(1542317347.931:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10022 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:08 executing program 3: socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x200}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010002100000000000060000000000080012000000ecf2e7cbb358e5bcffff00000000000000000006002a00000000000000800000000000e00000010000000002fdff00000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000003000500000000000200423b000001000012b478407f8604c0dda11ae515ad49cbaa535db5269d77a91e8cdb4a30a3aa56d63ae7a14ede0c379215b828d660e488bec9f7258ae544aefa5aae8539adf5154c1c71748e701800000000dd3f2fb44c2f9ea9bc31d3cd05b860eccd045e58e6"], 0xe2}}, 0x1000000000000000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000003, 0x0) 21:29:08 executing program 1: socket$pppoe(0x18, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000580), 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0)=0x7, 0x80000002) 21:29:08 executing program 2: socket$pppoe(0x18, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000580), 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0)=0xf000, 0x80000002) 21:29:08 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) accept(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000140)=0x80) 21:29:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) [ 369.715763] audit: type=1326 audit(1542317348.761:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10075 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x400000000000007, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 21:29:09 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r0) 21:29:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) 21:29:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) accept(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000140)=0x80) [ 370.461992] audit: type=1326 audit(1542317349.501:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10100 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:09 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) ioprio_get$uid(0x3, 0x0) 21:29:09 executing program 2: socket$pppoe(0x18, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000580), 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0)=0xf000, 0x80000002) 21:29:09 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 370.798145] audit: type=1326 audit(1542317349.841:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10114 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 370.962947] audit: type=1326 audit(1542317350.001:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10121 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:10 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/224, 0xe0) 21:29:10 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) setrlimit(0x0, &(0x7f0000000000)) [ 371.197323] audit: type=1326 audit(1542317350.231:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10125 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 371.219395] audit: type=1326 audit(1542317350.241:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10100 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 371.284216] audit: type=1326 audit(1542317350.321:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tgkill(0x0, 0x0, 0x0) [ 371.579911] audit: type=1326 audit(1542317350.621:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10114 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:10 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 21:29:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f000039a000)=[{0x24}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x8aae4f1483aad4, 0x0) 21:29:11 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) pause() 21:29:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000004500), 0x8aae4f1483aad4, 0x0) 21:29:11 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 21:29:11 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000040)=""/137, 0x89) 21:29:12 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) 21:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="36424f6433ffc4427d786d0167f2440f34ffc4a2ebf717c4dc7518fff30fbcbb0000000096c4e3156d93efb298c2f8a5a563ad489efe7fd464664f0f3a60145eda006151ddb52ba38a4d381cb9ae66400fde76035dc422c5aa717a5c6736d1b2") 21:29:12 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) [ 373.620553] kauditd_printk_skb: 12 callbacks suppressed [ 373.620592] audit: type=1326 audit(1542317352.661:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10183 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 373.818953] audit: type=1326 audit(1542317352.861:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10166 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 373.885455] audit: type=1326 audit(1542317352.921:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10168 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="05000a004e0e689896bcd6e4290eec317629fb09fd2880051afd4c1568e67a8d69d2a2648a14c2b51d8bb07686e4c4a4b962b23c1702803da84251b3d20f8a964133928dc09965bea87a4d13436d9f57a699e9e7d53b588dfea87107b8e8e14b9e871e1563d2caf3c1a0e765e8a406fd79015f7975d8f8633cda4a97600760a95392dd7f3228d11051586ce5f838e0de2b0473a6458468932f006c7f3ffc9b9299e660fba9b1f8683f8bdfa36e381356833b765135a6c618c9ffa1d32bcc219de6d4066113dd3e2c394d845208ca47f302d0627ff1d60aab267f18f125a386b601d07f5707b460c04661a5f51f0d8da6d72690d5040af0f87dd4901aa6f28fe893e0207a81ee36216db95d45ec9b519c11d968c59dd6bc28b52b02ba467e2279c62177768c4da1b89b6902abde8b8379a3a00b5ce9e314"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0x0) 21:29:13 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 21:29:13 executing program 3: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') unlink(&(0x7f0000000280)='./file0\x00') [ 374.198280] audit: type=1326 audit(1542317353.241:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10190 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:13 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 374.401467] audit: type=1326 audit(1542317353.441:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10183 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0x0) [ 374.595571] audit: type=1326 audit(1542317353.641:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10208 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="36424f6433ffc4427d786d0167f2440f34ffc4a2ebf717c4dc7518fff30fbcbb0000000096c4e3156d93efb298c2f8a5a563ad489efe7fd464664f0f3a60145eda006151ddb52ba38a4d381cb9ae66400fde76035dc422c5aa717a5c6736d1b2") 21:29:13 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) [ 374.901235] audit: type=1326 audit(1542317353.941:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10220 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 374.958641] audit: type=1326 audit(1542317354.001:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10190 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:14 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000500)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffc}]}) eventfd2(0x0, 0x0) [ 375.408457] audit: type=1326 audit(1542317354.451:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10236 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 21:29:14 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 375.746242] input: syz1 as /devices/virtual/input/input11 [ 375.782439] audit: type=1326 audit(1542317354.821:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10247 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 21:29:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="36424f6433ffc4427d786d0167f2440f34ffc4a2ebf717c4dc7518fff30fbcbb0000000096c4e3156d93efb298c2f8a5a563ad489efe7fd464664f0f3a60145eda006151ddb52ba38a4d381cb9ae66400fde76035dc422c5aa717a5c6736d1b2") [ 375.838834] input: syz1 as /devices/virtual/input/input12 21:29:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r3 = socket$inet6(0xa, 0x1000000000002, 0xa) getsockname(r3, &(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000bc0)=0xffed) setsockopt$packet_buf(r4, 0x107, 0x17, &(0x7f0000000780)="8a4f224a4710b6ef94ab417be050d04cd18158a9f16bd51857e21867a15e54c4b0b53ffef94a818a58f185c3a7c19fc7b3f35b2d59f5b71a2e081c8195062f22d9b72695835b647126038cefc19a96e5bf8533f147ff68e41c6f4e01c15e8a3a7f69baa264f969b355e73b9c0f31abb2e65910b577cadb13738ecfeb40c88c1f77c64ca72ec9da00d12a2675f8ab1aca3da9d707124e1acdd5789288ded56c4a74b25ca495fe0c4ee11f3db5e6492537e58926412c46bf7e7afc6f6ab0ee1843b60e81128a5b", 0xc6) ioctl(r3, 0x8912, &(0x7f00000004c0)="0000000044e3bd0012373aa1d2006f347bc00000db0f4ba724bbb6e8a01516555c1432fabfc7002b70b7db118b6efedb40ba60e9a3cd7aed1a0c3e0be19bd31b7d7b799548afb717799b162750451abe3f3072d3895f3d68f3e550a4e48c2585094477ef5c5d0ae1341a600700000000000000b005e1660bc8d4e6cfc44521a337d0b5f489ca5e556a03076215fdd81eaaa573b1c34f9c5a9113a0b371d300000000000000") perf_event_open(&(0x7f0000001440)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000280)='security.evm\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x1) clone(0x208000, &(0x7f0000000580)="b114b11277a110bc1c24193f45200d", &(0x7f00000005c0), &(0x7f00000008c0), &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000240)) lseek(0xffffffffffffffff, 0x0, 0x0) clone(0x4000, &(0x7f0000000700)="f4a554fda6dddf1ad168be19dac6a5222bebd9fc402ba24fb7b323088ccb1667574b8a", &(0x7f0000000880), &(0x7f0000000900), &(0x7f0000000940)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xcce1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x114a, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@rand_addr, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f00000002c0)=0x80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0x0) 21:29:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:inetd_child_exec_t:s0\x00', 0x28, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff00000000030014000600008b5732810ff6850cfb00000000000000000000000000080008000500ac14141a"], 0x1}}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:29:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) read(r1, &(0x7f0000000340)=""/101, 0x65) 21:29:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000540)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000a00)="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", &(0x7f0000000200)=""/125}, 0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x0, 0x4, 0x1, 0xfffffffffffffffc, 0x0, 0x4, 0xb2, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r4, @in={{0x2, 0x0, @broadcast}}}, &(0x7f00000001c0)=0x84) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f00000004c0)={0x10001, 0x37, 0x7b15, 0xc0, 0x100000000, 0x5}) r5 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000640)=@assoc_value={r4, 0x7fff}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000580)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000003c0)={'team0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000600)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000280)={0xffffffffffffffc1}, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) inotify_init() r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x64000, 0x0) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000380)={{0x0, 0x3000, 0xa, 0x3, 0x7, 0x2, 0x0, 0x5b, 0x5, 0x23, 0x8, 0x9}, {0xd001, 0xf000, 0x8, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x4, 0x3, 0x5, 0x5}, {0x10000, 0x102000, 0x0, 0x7, 0x2, 0x7, 0x5, 0xff, 0x1ed3, 0x2, 0x1, 0x2}, {0x0, 0x100000, 0xc, 0x100000001, 0x2, 0x6, 0x4, 0x40, 0x6, 0x8e, 0x4, 0x1}, {0x6000, 0x6000, 0x0, 0x20, 0x100000001, 0x8001, 0x6, 0x8, 0x6, 0x2, 0x10001, 0x2}, {0x7004, 0xd000, 0xf, 0x401, 0x0, 0x100, 0xa0, 0x1, 0x4, 0x7fffffff, 0x80, 0xfe}, {0x4, 0x10000, 0x8, 0x4, 0x7fffffff, 0x4, 0x20000, 0x3, 0x3ff, 0x401, 0x4, 0x6}, {0xf004, 0xd001, 0xf, 0x7, 0x1, 0x0, 0x4, 0x7fff, 0xffff, 0x7, 0x2, 0x100000000}, {0x4000, 0x4000}, {0x7001, 0x3001}, 0x40000, 0x0, 0xf000, 0x430400, 0x3, 0x400, 0x0, [0x5, 0x9, 0xfffffffffffffffd, 0x8]}) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000018001200080001007369744f0c0002000800090029000000"], 0x1}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x80, 0x0) [ 376.559249] ================================================================== [ 376.566688] BUG: KMSAN: kernel-infoleak in kvm_write_guest_page+0x373/0x500 [ 376.573843] CPU: 0 PID: 10265 Comm: syz-executor4 Not tainted 4.20.0-rc2+ #87 [ 376.581134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.590502] Call Trace: [ 376.593126] dump_stack+0x32d/0x480 [ 376.596792] ? kvm_write_guest_page+0x373/0x500 [ 376.601508] kmsan_report+0x19f/0x300 [ 376.605416] kmsan_internal_check_memory+0x9dc/0xa60 [ 376.610596] kmsan_copy_to_user+0x7c/0xe0 [ 376.614789] kvm_write_guest_page+0x373/0x500 [ 376.619330] kvm_write_guest+0x1e1/0x360 [ 376.623463] kvm_emulate_hypercall+0x19c9/0x1ac0 [ 376.628292] handle_vmcall+0x41/0x50 [ 376.632040] ? handle_rdpmc+0x80/0x80 [ 376.635884] vmx_handle_exit+0x21bd/0xb980 [ 376.640159] ? vmalloc_to_page+0x585/0x6c0 [ 376.644434] ? kmsan_get_shadow_origin_ptr+0x142/0x410 [ 376.649767] ? vmx_flush_tlb_gva+0x480/0x480 [ 376.654206] kvm_arch_vcpu_ioctl_run+0xaeee/0x12040 [ 376.659284] ? __msan_poison_alloca+0x1e0/0x270 [ 376.664105] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 376.669491] ? __list_del_entry_valid+0x123/0x450 [ 376.674375] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 376.679895] ? wait_for_common+0x7a7/0x980 [ 376.684178] ? arch_local_irq_disable+0x10/0x10 [ 376.688893] ? kmsan_set_origin+0x7f/0x100 [ 376.693166] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 376.698566] ? __msan_get_context_state+0x9/0x20 [ 376.703350] ? INIT_BOOL+0x17/0x30 [ 376.706931] ? put_pid+0x319/0x410 [ 376.710523] kvm_vcpu_ioctl+0xfb1/0x1f90 [ 376.714644] ? do_vfs_ioctl+0x184/0x2f70 [ 376.718730] ? __se_sys_ioctl+0x1da/0x270 [ 376.722928] ? kvm_vm_release+0x90/0x90 [ 376.726927] do_vfs_ioctl+0xfbc/0x2f70 [ 376.730932] ? security_file_ioctl+0x92/0x200 [ 376.735533] __se_sys_ioctl+0x1da/0x270 [ 376.739547] __x64_sys_ioctl+0x4a/0x70 [ 376.743467] do_syscall_64+0xcf/0x110 [ 376.747313] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 376.752523] RIP: 0033:0x457569 [ 376.755760] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.774869] RSP: 002b:00007fec6809ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 376.782684] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 376.789979] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000b [ 376.797275] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 376.804571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec6809f6d4 [ 376.812384] R13: 00000000004c028e R14: 00000000004d06d8 R15: 00000000ffffffff [ 376.819696] [ 376.821359] Local variable description: ----clock_pairing.i@kvm_emulate_hypercall [ 376.828990] Variable was created at: [ 376.832771] kvm_emulate_hypercall+0x62/0x1ac0 [ 376.837383] handle_vmcall+0x41/0x50 [ 376.841116] [ 376.842778] Bytes 28-63 of 64 are uninitialized [ 376.847460] Memory access of size 64 starts at ffff88816ca7f3d0 [ 376.853531] Data copied to user address 0000000020000000 [ 376.858992] ================================================================== [ 376.866374] Disabling lock debugging due to kernel taint [ 376.871857] Kernel panic - not syncing: panic_on_warn set ... [ 376.877792] CPU: 0 PID: 10265 Comm: syz-executor4 Tainted: G B 4.20.0-rc2+ #87 [ 376.886478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.895848] Call Trace: [ 376.898482] dump_stack+0x32d/0x480 [ 376.902165] panic+0x624/0xc08 [ 376.905439] kmsan_report+0x300/0x300 [ 376.909282] kmsan_internal_check_memory+0x9dc/0xa60 [ 376.914444] kmsan_copy_to_user+0x7c/0xe0 [ 376.918645] kvm_write_guest_page+0x373/0x500 [ 376.923183] kvm_write_guest+0x1e1/0x360 [ 376.927320] kvm_emulate_hypercall+0x19c9/0x1ac0 [ 376.932157] handle_vmcall+0x41/0x50 [ 376.935900] ? handle_rdpmc+0x80/0x80 [ 376.939780] vmx_handle_exit+0x21bd/0xb980 [ 376.944100] ? vmalloc_to_page+0x585/0x6c0 [ 376.948394] ? kmsan_get_shadow_origin_ptr+0x142/0x410 [ 376.953717] ? vmx_flush_tlb_gva+0x480/0x480 21:29:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="36424f6433ffc4427d786d0167f2440f34ffc4a2ebf717c4dc7518fff30fbcbb0000000096c4e3156d93efb298c2f8a5a563ad489efe7fd464664f0f3a60145eda006151ddb52ba38a4d381cb9ae66400fde76035dc422c5aa717a5c6736d1b2") [ 376.958177] kvm_arch_vcpu_ioctl_run+0xaeee/0x12040 [ 376.963264] ? __msan_poison_alloca+0x1e0/0x270 [ 376.968077] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 376.973467] ? __list_del_entry_valid+0x123/0x450 [ 376.978345] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 376.983833] ? wait_for_common+0x7a7/0x980 [ 376.988118] ? arch_local_irq_disable+0x10/0x10 [ 376.992835] ? kmsan_set_origin+0x7f/0x100 [ 376.997119] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 377.002536] ? __msan_get_context_state+0x9/0x20 [ 377.007320] ? INIT_BOOL+0x17/0x30 [ 377.010888] ? put_pid+0x319/0x410 [ 377.014491] kvm_vcpu_ioctl+0xfb1/0x1f90 [ 377.018591] ? do_vfs_ioctl+0x184/0x2f70 [ 377.022672] ? __se_sys_ioctl+0x1da/0x270 [ 377.026852] ? kvm_vm_release+0x90/0x90 [ 377.030847] do_vfs_ioctl+0xfbc/0x2f70 [ 377.034794] ? security_file_ioctl+0x92/0x200 [ 377.039328] __se_sys_ioctl+0x1da/0x270 [ 377.043348] __x64_sys_ioctl+0x4a/0x70 [ 377.047272] do_syscall_64+0xcf/0x110 [ 377.051282] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 377.056533] RIP: 0033:0x457569 21:29:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) [ 377.059770] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.078697] RSP: 002b:00007fec6809ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 377.086457] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 377.093759] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000b [ 377.101104] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 377.108429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec6809f6d4 [ 377.115722] R13: 00000000004c028e R14: 00000000004d06d8 R15: 00000000ffffffff [ 377.124152] Kernel Offset: disabled [ 377.127801] Rebooting in 86400 seconds..