[ 54.326681] audit: type=1800 audit(1539243296.371:27): pid=6135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 56.038159] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.092515] random: sshd: uninitialized urandom read (32 bytes read) [ 61.727040] random: sshd: uninitialized urandom read (32 bytes read) [ 63.620790] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. [ 69.388659] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 07:35:13 fuzzer started [ 73.785633] random: cc1: uninitialized urandom read (8 bytes read) [ 73.931163] cc1 (6290) used greatest stack depth: 53184 bytes left 2018/10/11 07:35:18 dialing manager at 10.128.0.26:39089 2018/10/11 07:35:18 syscalls: 1 2018/10/11 07:35:18 code coverage: enabled 2018/10/11 07:35:18 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 07:35:18 setuid sandbox: enabled 2018/10/11 07:35:18 namespace sandbox: enabled 2018/10/11 07:35:18 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 07:35:18 fault injection: enabled 2018/10/11 07:35:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 07:35:18 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 07:35:18 net device setup: enabled [ 79.138239] random: crng init done 07:36:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)='trusted\x00', 0xffffffffffffffff) [ 174.385987] IPVS: ftp: loaded support on port[0] = 21 [ 175.723118] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.729582] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.738145] device bridge_slave_0 entered promiscuous mode [ 175.881052] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.887638] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.896025] device bridge_slave_1 entered promiscuous mode [ 176.023513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.151409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.542191] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.673287] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:36:59 executing program 1: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8003, &(0x7f00000000c0)=0x344, 0x35, 0x0) [ 177.438205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.446378] team0: Port device team_slave_0 added [ 177.722668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.730662] team0: Port device team_slave_1 added [ 177.921772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 177.930450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.939121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.040942] IPVS: ftp: loaded support on port[0] = 21 [ 178.112701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.294732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.302450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.311378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.451198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.458885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.467998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.861373] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.867989] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.876483] device bridge_slave_0 entered promiscuous mode [ 180.117134] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.123680] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.132061] device bridge_slave_1 entered promiscuous mode [ 180.379953] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 180.652423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.668806] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.675398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.682457] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.688911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.697930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.182244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.349984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.575590] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.764795] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 181.772090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.908079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 181.916582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:37:04 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {}, [], {}, [], {0x10, 0x1}}, 0x24, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) [ 182.640922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.649830] team0: Port device team_slave_0 added [ 182.939429] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.947574] team0: Port device team_slave_1 added [ 183.276499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.284105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.292856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.544413] IPVS: ftp: loaded support on port[0] = 21 [ 183.605872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.613115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.622031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.911828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.919561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.929432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.219566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.227756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.236752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.062104] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.068564] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.077367] device bridge_slave_0 entered promiscuous mode [ 186.309729] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.316297] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.325031] device bridge_slave_1 entered promiscuous mode [ 186.620899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 186.928208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.248409] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.254958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.261825] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.268401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.277116] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.287792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.700379] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.959170] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 188.188837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 188.200338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.445008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 188.452268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.316386] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 189.324672] team0: Port device team_slave_0 added 07:37:11 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x1, 0x8, 0x8, {0x0, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x7, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380)={0x0, 0x8}, &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9, 0xfc, 0x1a85}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003500)={0x0, 0xff, 0x0, 0x8, 0xffff, 0x4}, &(0x7f0000003540)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003800)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x3e000, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @local, 0x2}, r1, 0x4de8a597}}, 0x48) [ 189.580507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.588953] team0: Port device team_slave_1 added [ 189.894314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 189.904019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.913533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.308544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 190.316440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.326025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.639643] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.647428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.656780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.738910] IPVS: ftp: loaded support on port[0] = 21 [ 190.933320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.940914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.950508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.998800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.243394] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.467676] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.474288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.482374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.781750] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.788418] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.796848] device bridge_slave_0 entered promiscuous mode [ 194.130036] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.136649] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.145203] device bridge_slave_1 entered promiscuous mode [ 194.439978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.605578] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.737840] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.744408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.751307] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.757896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.766382] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 194.791466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.044893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.762148] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.056206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.355096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 196.362518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.676437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.683803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.686152] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.694547] team0: Port device team_slave_0 added [ 197.989032] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.997113] team0: Port device team_slave_1 added 07:37:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getrandom(&(0x7f0000000680)=""/4096, 0x1000, 0x2) [ 198.402453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 198.409574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.418379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.771054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 198.778388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.787436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.203877] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.211462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.220832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.614194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.621657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.630415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.004043] IPVS: ftp: loaded support on port[0] = 21 [ 201.330601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.802529] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 07:37:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {}, [], {}, [], {0x10, 0x1}}, 0x24, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) [ 203.738965] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.746614] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.755139] device bridge_slave_0 entered promiscuous mode 07:37:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {}, [], {}, [], {0x10, 0x1}}, 0x24, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) [ 204.006872] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.013446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.020467] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.027072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.035465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:37:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8911, &(0x7f0000000080)="8dd25d766070806ddb22a5a1c516d2345e4cf80f9ea42b59763e183ec093d13703681bbcdce567") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x340, [0x20000800, 0x0, 0x0, 0x20000830, 0x20000a68], 0x0, &(0x7f0000000000), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x3b8) [ 204.180513] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.187181] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.195691] device bridge_slave_1 entered promiscuous mode [ 204.542852] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.549270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.557271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:37:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') finit_module(r0, &(0x7f0000000040)='0group.subtree_control\x00', 0x1) openat$cgroup_subtree(r0, &(0x7f0000000480)='0group.subtree_control\x00', 0x2, 0x0) [ 204.664510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.862694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.991435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 07:37:27 executing program 0: timer_create(0x7, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)) r0 = socket$inet6(0xa, 0x7, 0x6) r1 = gettid() r2 = socket$inet(0x2, 0xb, 0x3) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000000)={0x3, 0x1}) dup2(r0, r2) tkill(r1, 0x1000000000016) 07:37:28 executing program 0: r0 = socket(0x11, 0x803, 0x3) recvfrom$inet(r0, &(0x7f0000001040)=""/4096, 0x1000, 0x0, 0x0, 0x0) [ 206.322746] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.358124] bond0: Enslaving bond_slave_0 as an active interface with an up link 07:37:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x4, 0x5, 0x2, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffffffa}, {r0, 0x0, 0xb93c}]}) getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)="636c64816e6481dc2e75b512792c29fe21f7f2db6765ee2b444197d65084cd8a3145f2f744e91d00fe8c56145cc3318f02d35567c4edbe0ffe9e8df7f7e9de4e5e3d62c17d057d000200000bc04e83a28dd68a219822f1dcf0c9e7f25f83068359103284ca2f1db5ca0f62e4abc88197c1a91d3e51e55125d39e72c42e38c34047bce6f0227f92b64f66b0d74f54ec0aacf4f427c8cafbc20063d970a5d62be82b2f2f3c984be6f92773df347e4c0f9464c69155378baa166ea2d96e4e62cdafbb0382206e") sendfile(r2, r0, &(0x7f0000000000)=0xb8, 0x1) 07:37:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) recvmmsg(r0, &(0x7f00000043c0)=[{{&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f0000000100)=""/139, 0x8b}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/161, 0xa1}, {&(0x7f0000001280)=""/91, 0x5b}], 0x5, &(0x7f0000001380)=""/135, 0x87, 0x2}, 0xfff}, {{&(0x7f0000001440)=@ipx, 0x80, &(0x7f0000001980)=[{&(0x7f00000014c0)=""/121, 0x79}, {&(0x7f0000001540)=""/26, 0x1a}, {&(0x7f0000001580)=""/80, 0x50}, {&(0x7f0000001600)=""/10, 0xa}, {&(0x7f0000001640)=""/198, 0xc6}, {&(0x7f0000001740)=""/218, 0xda}, {&(0x7f0000001840)=""/84, 0x54}, {&(0x7f00000018c0)=""/154, 0x9a}], 0x8, &(0x7f0000001a00)=""/174, 0xae, 0x446}, 0x4}, {{&(0x7f0000001ac0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001b40)=""/213, 0xd5}, {&(0x7f0000001c40)=""/83, 0x53}, {&(0x7f0000001cc0)=""/55, 0x37}, {&(0x7f0000001d00)=""/252, 0xfc}, {&(0x7f0000001e00)=""/127, 0x7f}], 0x5, &(0x7f0000001f00)=""/4096, 0x1000, 0x7}, 0xffffffffffffff9c}, {{&(0x7f0000002f00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000002f80)=""/187, 0xbb}], 0x1, 0x0, 0x0, 0x9}, 0x9}, {{&(0x7f0000003080)=@alg, 0x80, &(0x7f0000004300)=[{&(0x7f0000003100)=""/19, 0x13}, {&(0x7f0000003140)=""/201, 0xc9}, {&(0x7f0000003240)=""/99, 0x63}, {&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/42, 0x2a}], 0x5, &(0x7f0000004380)=""/62, 0x3e}, 0xec}], 0x5, 0x40000000, &(0x7f0000004500)={0x0, 0x989680}) getsockopt$inet6_int(r1, 0x29, 0x3f, &(0x7f0000004540), &(0x7f0000004580)=0x4) [ 206.819518] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.191255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.198660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.567325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.574623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.674861] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.683106] team0: Port device team_slave_0 added [ 209.023523] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.031551] team0: Port device team_slave_1 added [ 209.373295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.380435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.389244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.556163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.563482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.572244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.893344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.900941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.909881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.146481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.154262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.163157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.402735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.450496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.409864] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.416455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.424402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.084459] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.090941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.097946] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.104443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.112741] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.422857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:37:35 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000036c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xae, &(0x7f0000000400)=""/174}, &(0x7f0000000240)="000000000691", &(0x7f0000000280)=""/115, 0x0, 0x0, 0x0, &(0x7f0000000200)}) [ 213.588357] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.946082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.817069] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 217.666206] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 217.672707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.680485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:37:40 executing program 2: [ 218.411818] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.450788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.954105] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.425947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.432469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.440245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.602796] hrtimer: interrupt took 95264 ns 07:37:43 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x1, 0x8, 0x8, {0x0, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x7, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380)={0x0, 0x8}, &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9, 0xfc, 0x1a85}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003500)={0x0, 0xff, 0x0, 0x8, 0xffff, 0x4}, &(0x7f0000003540)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003800)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x3e000, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @local, 0x2}, r1, 0x4de8a597}}, 0x48) [ 221.943600] 8021q: adding VLAN 0 to HW filter on device team0 07:37:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8}, 0x10) 07:37:47 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1) r1 = gettid() ioprio_get$pid(0x2, r1) tkill(r1, 0x2b) 07:37:47 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x400, 0x418880) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x79af, 0x3, 0x3f, 0x1, 0x0, 0xfdb, 0x1, 0x80000000, 0xffffffffffffffff, 0x6, 0x9, 0xfffffff000000000}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000140)={0x7, 0x3, 0x8001, 0x4, 0x800, 0x4, 0x0, 0x7e0, 0x53, 0x101, 0xb7e, 0x3ff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'eql\x00', r1}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) r2 = userfaultfd(0x800) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000200)) ioctl$TCSBRK(r0, 0x5409, 0x6) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x80000000, 0x100, 0x6}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x1ff, 0x6, 0x202, 0x4, 0x20, 0x1, 0x0, 0x6, r3}, 0x20) prctl$seccomp(0x16, 0x3, &(0x7f0000000340)={0x4, &(0x7f0000000300)=[{0x7, 0x80, 0x20, 0x4}, {0xfffffffffffffff9, 0xb5d, 0x3, 0x1ff}, {0x100000001, 0x7, 0x6, 0x100000001}, {0x2b, 0x9, 0x10001, 0x8001}]}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000003c0)=@get={0x1, &(0x7f0000000380)=""/5, 0xffffffffffffffff}) ioctl$KDENABIO(r0, 0x4b36) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000400)) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000440)={0x3f, 0x18}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000480)={0x157, 0x6, 0x8000}, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000004c0)=0x1, 0x4) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000500)=0xa6, 0x2) write$P9_RSTAT(r0, &(0x7f0000000540)={0x4f, 0x7d, 0x2, {0x0, 0x48, 0x0, 0x3a9, {0x42, 0x1, 0x3}, 0x1000000, 0x8001, 0x5, 0x5, 0x0, "", 0x1, '}', 0xa, '/dev/vcs#\x00', 0xa, '/dev/vcs#\x00'}}, 0x4f) syz_open_dev$sg(&(0x7f00000005c0)='/dev/sg#\x00', 0x2, 0x20000) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000600)={0x0, 0x0, @ioapic}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000800)={0x1c, 0x0, &(0x7f0000000700)=[@exit_looper, @exit_looper, @increfs={0x40046304, 0x3}, @decrefs={0x40046307, 0x1}, @enter_looper], 0xa8, 0x0, &(0x7f0000000740)="c1ca842587db90e274281d09c7378780afa7272562dd5eb760c70523735a1b5a5c11e38bccc0a00c4a25316a49a5e9e972ba947469b7f2079a9f0ab8939224318041c8b685ee0a6653c7b638e422fb4e497ea5f97242ffcf538a1b652d605ee9558b19cceb8fc2dfdaa3f31e4a1fb7340b1e6f6b7d8b0d20bfa662d379616cedaa7b0076442c1dbe8236df3124311406876b0e6606f821ac1a90621fa20a7206c2930b0d96818c21"}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000840)={{{@in=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000980)={0x7876, 0x18, [0x6, 0x6, 0x100, 0x2, 0x6, 0x48b1]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000009c0)=0x0) ptrace$getregs(0xe, r4, 0x9, &(0x7f0000000a00)=""/187) 07:37:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000100)={0x2}) 07:37:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000036c0)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0xae, &(0x7f0000000400)=""/174}, &(0x7f0000000240)="000000000691", &(0x7f0000000280)=""/115, 0x0, 0x0, 0x0, &(0x7f0000000200)}) 07:37:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000036c0)={0x53, 0x0, 0x6, 0x0, @buffer={0x900, 0xae, &(0x7f0000000400)=""/174}, &(0x7f0000000240)="000000000691", &(0x7f0000000280)=""/115, 0x0, 0x0, 0x0, &(0x7f0000000200)}) 07:37:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 07:37:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x14, 0x12, 0x1, 0x0, 0xe02f, 0x5}) 07:37:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x800) read(r0, &(0x7f0000000040)=""/147, 0x93) 07:37:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8}, 0x10) 07:37:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstatfs(0xffffffffffffffff, &(0x7f0000000700)=""/57) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) mlockall(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, &(0x7f0000000240)=0xe, 0x20000102000007) fsync(0xffffffffffffffff) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="627472312e2d00e34b724995aaf379599a6203b153ce3502d6f0cd100e5e4277db7f9957b72219f91b4e8a4f54db7122b2085aec3d597a1768023b7ca52e3cf9efd7d047a45da4f2590b424ea93dc64a51ddff91b24d44926e7e749cfab934774639692d708f635c00611eced2af21336dab0c36246f46cc8c4e82b0a0c26b5de03c53b4be661ea27224b10d7e09d296b9e7b3e2bc650dc1b3"]) 07:37:48 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe981, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd], [0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xf971, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x89ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) 07:37:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "5424ad6dc6944ba4a22378a8089b0b5a7249a53339d83971f51c165f29494de0d2d48a11eb473643266ebb2198be5eea7ac7115283ce8eefebf0324cdbb53dd96028b2a0db34ec4a5e5f4ab01ffb58c1ab248e6f9c7a189756906ed1828d3972453f8d0c57c43f117bc50fe87d289823e79a7420724659caedaa2f7b06f2a40236443e9d3df6508bc6068273f0c23afceb47283adb6d8ff178fc90abb5d4fa7d048b3508933ef5d8fb3667bd4c90e9df829c672bd3e3b0d9ae5465596225bcff06b3b948054d2370dbb60f1b5413fa4e5e91b8988a5e733182e2d8163d5a611458859a02d2684bcda30b51f4c0d9a16f0ae6b8e95fce49a11621e22ecd1d2ff0", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 07:37:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8}, 0x10) [ 226.924605] IPVS: ftp: loaded support on port[0] = 21 [ 227.642673] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.649071] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.657107] device bridge_slave_0 entered promiscuous mode [ 227.736125] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.742641] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.750505] device bridge_slave_1 entered promiscuous mode [ 227.828524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.905526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.141467] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.222971] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.375996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.383100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.617081] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.624777] team0: Port device team_slave_0 added [ 228.702873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.710477] team0: Port device team_slave_1 added [ 228.789010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.871044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.948989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.956516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.965615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.042546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.050063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.059423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.929298] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.935791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.942774] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.949189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.957321] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.322230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.128060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.419843] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.711378] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.717776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.725840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.013927] 8021q: adding VLAN 0 to HW filter on device team0 07:37:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 07:37:58 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f00000036c0)=[r1, r4]) setresuid(0x0, r3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) 07:37:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x1b3, 0x0) 07:37:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstatfs(0xffffffffffffffff, &(0x7f0000000700)=""/57) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) mlockall(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, &(0x7f0000000240)=0xe, 0x20000102000007) fsync(0xffffffffffffffff) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="627472312e2d00e34b724995aaf379599a6203b153ce3502d6f0cd100e5e4277db7f9957b72219f91b4e8a4f54db7122b2085aec3d597a1768023b7ca52e3cf9efd7d047a45da4f2590b424ea93dc64a51ddff91b24d44926e7e749cfab934774639692d708f635c00611eced2af21336dab0c36246f46cc8c4e82b0a0c26b5de03c53b4be661ea27224b10d7e09d296b9e7b3e2bc650dc1b3"]) 07:37:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) 07:37:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 07:37:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup(r0) connect$inet6(r0, &(0x7f0000000080), 0x1a) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x43}, 0x90) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) 07:37:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r2, r0}}, 0x18) 07:37:58 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x258, 0x0, 0x110, 0x0, 0x0, 0x0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000080), {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'teql0\x00', 'veth1_to_bridge\x00', {}, {0xff}}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0x98, 0x100}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b8) 07:37:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00100000000000000a00010000000000ff010000000000000000000000000001000000000000000000000000000000f632cc4f0cfb13000000000000000000000000000000000000000000f9ffffff000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000772ec1e068572154d586314166da7c01042438cacb7575cfff6e5dfc9ca5925035eb52174a9a2aa6d161198d0a367549d968a2fdc70e12ae9cb46b8b5aede2763926eab09fdc111fda5a6a20455342ad74457103db7125591254ccab3cd57b452654411ef96eabed40e9555885027ab922994cc9486774fa207fa2ea064d566defe78c796f5393004cc5c744ff3312b86326ac2d0fb26ab849f29243589be6f2278d571bca89e15ddec69f8fa51671929f5b63c46ca1"], 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 07:37:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstatfs(0xffffffffffffffff, &(0x7f0000000700)=""/57) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) mlockall(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, &(0x7f0000000240)=0xe, 0x20000102000007) fsync(0xffffffffffffffff) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="627472312e2d00e34b724995aaf379599a6203b153ce3502d6f0cd100e5e4277db7f9957b72219f91b4e8a4f54db7122b2085aec3d597a1768023b7ca52e3cf9efd7d047a45da4f2590b424ea93dc64a51ddff91b24d44926e7e749cfab934774639692d708f635c00611eced2af21336dab0c36246f46cc8c4e82b0a0c26b5de03c53b4be661ea27224b10d7e09d296b9e7b3e2bc650dc1b3"]) 07:37:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x1b3, 0x0) 07:37:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r2, r0}}, 0x18) 07:37:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5385, &(0x7f00000036c0)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0xae, &(0x7f0000000400)=""/174}, &(0x7f0000000240), &(0x7f0000000280)=""/115, 0x0, 0x0, 0x0, &(0x7f0000000200)}) 07:37:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstatfs(0xffffffffffffffff, &(0x7f0000000700)=""/57) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) mlockall(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, &(0x7f0000000240)=0xe, 0x20000102000007) fsync(0xffffffffffffffff) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="627472312e2d00e34b724995aaf379599a6203b153ce3502d6f0cd100e5e4277db7f9957b72219f91b4e8a4f54db7122b2085aec3d597a1768023b7ca52e3cf9efd7d047a45da4f2590b424ea93dc64a51ddff91b24d44926e7e749cfab934774639692d708f635c00611eced2af21336dab0c36246f46cc8c4e82b0a0c26b5de03c53b4be661ea27224b10d7e09d296b9e7b3e2bc650dc1b3"]) 07:37:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000340), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 07:37:59 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x1b3, 0x20000380) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @rand_addr}}, 0x1e) 07:37:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:37:59 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) write$P9_RCREATE(r0, &(0x7f00000003c0)={0x18}, 0x18) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00z', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 07:37:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup(r0) connect$inet6(r0, &(0x7f0000000080), 0x1a) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x43}, 0x90) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) 07:37:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/72, 0x48}], 0x1, 0x0) 07:37:59 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 07:37:59 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe981], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x3], [0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf86, 0x0, 0x0, 0x0, 0x2637, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) 07:37:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:00 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x1, 0x8, 0x8, {0x0, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x0, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380)={0x0, 0x8}, &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9, 0xfc, 0x1a85}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003500)={0x0, 0xff, 0x0, 0x8, 0xffff, 0x4}, &(0x7f0000003540)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003800)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x5) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x3e000, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @local, 0x2}, r1, 0x4de8a597}}, 0x48) 07:38:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 07:38:00 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe981], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf86, 0x0, 0x0, 0x0, 0x2637, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000]}, 0x45c) 07:38:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) 07:38:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) r1 = gettid() r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="a9", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x0) r3 = creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) dup2(r3, r0) 07:38:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000400)=""/4096, 0xfef8}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1b3, 0x0) 07:38:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x705000) 07:38:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:00 executing program 4: 07:38:00 executing program 3: 07:38:00 executing program 1: 07:38:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:01 executing program 0: 07:38:01 executing program 4: 07:38:01 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [{}], {0x10, 0x4}}, 0x34, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x3}, 0x28, 0x0) 07:38:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:01 executing program 1: 07:38:01 executing program 0: 07:38:01 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x705000) 07:38:01 executing program 4: 07:38:01 executing program 1: 07:38:01 executing program 3: 07:38:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:01 executing program 0: 07:38:02 executing program 1: 07:38:02 executing program 3: 07:38:02 executing program 4: 07:38:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:02 executing program 0: 07:38:02 executing program 1: 07:38:02 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x705000) 07:38:02 executing program 4: 07:38:02 executing program 3: 07:38:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:02 executing program 0: 07:38:02 executing program 1: 07:38:02 executing program 1: 07:38:03 executing program 0: 07:38:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:03 executing program 3: 07:38:03 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 07:38:03 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000dfdff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = epoll_create(0x5) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000f9dff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 241.365933] binder: 8089:8093 ioctl 40087602 20000080 returned -22 [ 241.414896] binder: 8089:8095 ioctl 40087602 20000080 returned -22 07:38:03 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x705000) 07:38:03 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[], 0x0, 0x21001, 0x40000000003a9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, "", [[]]}, 0x120) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 07:38:03 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000fc3ff6)='./control\x00', 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) 07:38:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:03 executing program 0: 07:38:04 executing program 0: 07:38:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x0, @dev}, 0x0, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) 07:38:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:04 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:04 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[], 0x0, 0x21001, 0x40000000003a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 07:38:04 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020a0000020000000000000000000800"], 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xfd, 0x0) 07:38:05 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:05 executing program 5: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) [ 243.535307] kauditd_printk_skb: 3 callbacks suppressed [ 243.535341] audit: type=1326 audit(1539243485.501:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8118 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 [ 243.745547] audit: type=1326 audit(1539243485.801:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8118 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:08 executing program 1: 07:38:08 executing program 5: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) 07:38:08 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:08 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") unshare(0x28020400) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 07:38:08 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000000c0), 0x1000001d1) tee(r2, r1, 0xfffffffffffffffd, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x4ba09e13) 07:38:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:09 executing program 5: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) 07:38:09 executing program 1: 07:38:10 executing program 3: 07:38:10 executing program 0: 07:38:10 executing program 5: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) 07:38:10 executing program 1: 07:38:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:10 executing program 0: 07:38:10 executing program 4: 07:38:10 executing program 3: 07:38:10 executing program 1: 07:38:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:10 executing program 5: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) 07:38:10 executing program 0: 07:38:10 executing program 4: 07:38:10 executing program 1: 07:38:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:10 executing program 3: 07:38:11 executing program 5: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0x705000) 07:38:11 executing program 0: 07:38:11 executing program 1: 07:38:11 executing program 4: 07:38:11 executing program 3: 07:38:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:11 executing program 0: 07:38:11 executing program 1: 07:38:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 07:38:11 executing program 4: 07:38:11 executing program 3: 07:38:11 executing program 0: 07:38:11 executing program 1: 07:38:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:12 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 07:38:12 executing program 0: 07:38:12 executing program 3: 07:38:12 executing program 4: 07:38:12 executing program 0: 07:38:12 executing program 1: 07:38:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:12 executing program 4: 07:38:12 executing program 3: 07:38:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x3, 0x10000000003) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev, r1}, 0x14) 07:38:12 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 07:38:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@bridge_getlink={0x34, 0x12, 0x9, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syzkaller0\x00'}]}, 0x34}}, 0x0) 07:38:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') readv(r0, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0x1000}], 0x1) 07:38:13 executing program 3: getitimer(0x0, &(0x7f0000000080)) 07:38:13 executing program 0: 07:38:13 executing program 5: 07:38:13 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x4) sendmsg$kcm(r0, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002a00)=ANY=[]}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x0, @dev}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000002bc0)}, 0x0) 07:38:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') readv(r0, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0x1000}], 0x1) 07:38:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@bridge_getlink={0x34, 0x12, 0x9, 0x0, 0x25dfdbfd, {}, [@IFLA_IFNAME={0x14, 0x3, 'syzkaller0\x00'}]}, 0x34}}, 0x0) 07:38:13 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000001000008912, &(0x7f0000000040)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:13 executing program 4: r0 = socket$packet(0x11, 0x80000000003, 0x300) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000140)=0x200) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000300)="45dc0517304ba1daec5cfe4ea83655c8c0045cbb1cfae97cffacbf59c763fbcb96c7e380866822672c570e49392cd830351e12b4dcf46b1f4c8165832500379279019ef565d68f60787e184d30d1e00942f8b68ee246ae59add254a89fe4b5a526e01f85", 0x64}], 0x1, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000001600)={0xb, 0xc9b, {0x57, 0x5, 0x0, {0x0, 0x81}, {0x0, 0x66f}, @cond=[{0xfffffffffffffff9, 0xffffffffffffe555, 0x1, 0x0, 0x7}, {0x8, 0x80000001, 0x0, 0x9, 0x80, 0x8}]}, {0x51, 0x800, 0x23a73c44, {0x20, 0xc424}, {0x6, 0x9}, @cond=[{0x1, 0xfff, 0x0, 0xc00000000000000, 0x10001, 0x3}, {0x1f, 0x3, 0xc4d, 0x80000001, 0x7f, 0x88}]}}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000017c0)) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000180)={0xff, @empty, 0x0, 0x2, 'lblcr\x00', 0x8, 0xff}, 0x2c) [ 251.892254] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.899325] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:14 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 252.002721] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.009272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.016481] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.023076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.030184] device bridge0 entered promiscuous mode [ 252.036654] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:38:14 executing program 3: socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x4) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000340)=""/148, 0x94}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 252.205135] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.211998] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.219257] device bridge0 left promiscuous mode 07:38:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") [ 252.302662] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.309320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.316397] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.323009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.330013] device bridge0 entered promiscuous mode [ 252.336526] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:38:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000080025001900f2ff0f001200080001007674690004000200"], 0x1}}, 0x0) 07:38:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000001000008912, &(0x7f0000000040)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:14 executing program 4: r0 = socket$packet(0x11, 0x80000000003, 0x300) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000140)=0x200) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pwritev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000300)="45dc0517304ba1daec5cfe4ea83655c8c0045cbb1cfae97cffacbf59c763fbcb96c7e380866822672c570e49392cd830351e12b4dcf46b1f4c8165832500379279019ef565d68f60787e184d30d1e00942f8b68ee246ae59add254a89fe4b5a526e01f85", 0x64}], 0x1, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000001600)={0xb, 0xc9b, {0x57, 0x5, 0x0, {0x0, 0x81}, {0x0, 0x66f}, @cond=[{0xfffffffffffffff9, 0xffffffffffffe555, 0x1, 0x0, 0x7}, {0x8, 0x80000001, 0x0, 0x9, 0x80, 0x8}]}, {0x51, 0x800, 0x23a73c44, {0x20, 0xc424}, {0x6, 0x9}, @cond=[{0x1, 0xfff, 0x0, 0xc00000000000000, 0x10001, 0x3}, {0x1f, 0x3, 0xc4d, 0x80000001, 0x7f, 0x88}]}}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000017c0)) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000180)={0xff, @empty, 0x0, 0x2, 'lblcr\x00', 0x8, 0xff}, 0x2c) 07:38:14 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x4ba09e13) 07:38:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000500)="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") 07:38:14 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:14 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 252.913902] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.920785] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.927631] device bridge0 left promiscuous mode 07:38:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) [ 253.016334] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.023554] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.042452] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.048925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.055983] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.062540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.069635] device bridge0 entered promiscuous mode [ 253.076202] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.084018] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.090900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.097928] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.104529] bridge0: port 1(bridge_slave_0) entered forwarding state 07:38:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000001000008912, &(0x7f0000000040)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 253.112174] device bridge0 entered promiscuous mode 07:38:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") [ 253.260381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:38:15 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000001000008912, &(0x7f0000000040)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)="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") [ 253.662453] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.669387] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.676683] device bridge0 left promiscuous mode 07:38:15 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 253.793405] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.800589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.807735] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.815387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.822534] device bridge0 entered promiscuous mode 07:38:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 253.948388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:38:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)="6377642f2e000000d873115ab98f27504ff8831a5962a6008b5a598657b4334b8816acebdff1900645e02940054107cb228974d54c2982dd2a3802b0449d6f051ac1220500477c834d8e3cb8ed3b46af12e4524b615d258b5dba8747daf1dff5196a137e398b46090c30d052ea44b80600d018c57dc503dd98b80824dff5d66a212ea1c9a31ce9f13627248946b0c9a41dae96b712b886934e6276329d48f1423d79fa17d08514d213b336b9a53de3cde0d552e0fe8e28ce8a73bae952451a37448fc200000000a3d4004368f3e1a597f53b2c9823c73b6d53348350628feb40603071479f084602ce962db50f95f979eaef0cc7d3b89d62c2bc83721437f1e2ed367e6c71eac4e3adf72878b6b95fa45eb20f0144599a156aed5b2cb9dc15587df6fa63671e7383cb6e75e0744a578c46b9953f6657200d294bcd1683a6c271f9cb892e94b53d6fd4ed6a7be103c66f3ec6f4fe353ee050e4eb6a4db05a7456be69796b082a5cbbfb23b46c09ac") 07:38:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) socket$inet6(0xa, 0x3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) [ 254.116602] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.123422] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.130155] device bridge0 left promiscuous mode [ 254.174513] audit: type=1326 audit(1539243496.231:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8373 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:16 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 254.234033] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.240651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.248294] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.254818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.262252] device bridge0 entered promiscuous mode [ 254.343671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:38:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 254.452927] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.459712] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.466525] device bridge0 left promiscuous mode 07:38:16 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 254.557594] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.564241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.571201] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.577856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.585202] device bridge0 entered promiscuous mode 07:38:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=@newlink={0x34, 0x10, 0x425, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 07:38:16 executing program 4: [ 254.765336] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.772214] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.779520] device bridge0 left promiscuous mode [ 254.844146] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.850697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.857792] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.864364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.871505] device bridge0 entered promiscuous mode 07:38:17 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:17 executing program 2: [ 254.953785] audit: type=1326 audit(1539243497.011:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8373 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 255.167010] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.174042] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.180798] device bridge0 left promiscuous mode 07:38:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:17 executing program 4: 07:38:17 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:17 executing program 2: 07:38:17 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 255.562502] audit: type=1326 audit(1539243497.621:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8414 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:17 executing program 2: 07:38:17 executing program 4: 07:38:17 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:17 executing program 1: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:18 executing program 2: 07:38:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:18 executing program 4: 07:38:18 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:18 executing program 1: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:18 executing program 2: 07:38:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 07:38:18 executing program 4: 07:38:18 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 256.675564] audit: type=1326 audit(1539243498.731:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8453 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:18 executing program 2: 07:38:18 executing program 4: 07:38:19 executing program 1: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:19 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780), 0x2954e149538753cf}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x395b}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x3) 07:38:19 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x1, r1}]) 07:38:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:19 executing program 1: socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) 07:38:19 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) [ 257.690629] audit: type=1326 audit(1539243499.741:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8492 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x0, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:19 executing program 1: 07:38:20 executing program 4: 07:38:20 executing program 2: 07:38:20 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 07:38:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:20 executing program 1: 07:38:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x40000000000000, 0x0, 0x0, 0x5, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 07:38:20 executing program 4: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) 07:38:20 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) [ 258.764000] audit: type=1326 audit(1539243500.821:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8532 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:20 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x1) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x14) 07:38:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x89e2, 0x707080) 07:38:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:21 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x2, 0x361) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) 07:38:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 07:38:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:21 executing program 2: 07:38:21 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 07:38:21 executing program 1: 07:38:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x200, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x2, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) [ 259.832273] audit: type=1326 audit(1539243501.881:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8577 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:22 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:22 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x800001000008912, &(0x7f00000001c0)="0a5c2d023c126285718070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 07:38:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000000000005d00020009000000000000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 07:38:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0x4e) [ 260.416982] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:38:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 07:38:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:22 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:22 executing program 1: 07:38:22 executing program 5: 07:38:22 executing program 2: 07:38:23 executing program 1: 07:38:23 executing program 5: 07:38:23 executing program 2: [ 261.139530] audit: type=1326 audit(1539243503.191:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8621 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) 07:38:23 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:23 executing program 5: 07:38:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:23 executing program 1: 07:38:23 executing program 2: 07:38:23 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) 07:38:23 executing program 5: 07:38:24 executing program 1: 07:38:24 executing program 2: 07:38:24 executing program 5: [ 262.174229] audit: type=1326 audit(1539243504.231:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8657 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:24 executing program 1: 07:38:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) 07:38:24 executing program 2: 07:38:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:24 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:24 executing program 1: 07:38:24 executing program 5: 07:38:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:24 executing program 2: 07:38:25 executing program 1: 07:38:25 executing program 5: [ 263.075387] audit: type=1326 audit(1539243505.131:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8689 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:25 executing program 2: 07:38:25 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:25 executing program 5: 07:38:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:25 executing program 1: 07:38:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:25 executing program 2: 07:38:25 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:25 executing program 5: 07:38:26 executing program 2: 07:38:26 executing program 1: 07:38:26 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:26 executing program 5: [ 264.170324] audit: type=1326 audit(1539243506.221:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8719 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0xffff0000 07:38:26 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:26 executing program 2: 07:38:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:26 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0xfffffffffffffffd}) 07:38:26 executing program 1: 07:38:26 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:26 executing program 5: 07:38:26 executing program 2: [ 264.885024] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.891837] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.898669] device bridge0 left promiscuous mode 07:38:27 executing program 5: 07:38:27 executing program 1: 07:38:27 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:27 executing program 2: 07:38:27 executing program 5: 07:38:27 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00'}) 07:38:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:27 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:27 executing program 5: 07:38:27 executing program 2: 07:38:27 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00'}) 07:38:27 executing program 1: 07:38:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:28 executing program 5: 07:38:28 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000001100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00'}) 07:38:28 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:28 executing program 2: 07:38:28 executing program 1: 07:38:28 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="24000000220007031dfffd946f610500000000000500000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@hci, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/86, 0x56}, 0x122) 07:38:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0xc}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r3 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x2, 0x7000, 0xd, 0x7f, 0x3, 0x9, 0x8a, 0x2, 0x400, 0x0, 0x9, 0x101}, {0x0, 0xf000, 0xd, 0x4, 0x1000, 0x3, 0xffff, 0xd8e9, 0x5, 0x5, 0x100000000, 0x5}, {0x10f000, 0x100000, 0x0, 0x401, 0x8f, 0x5, 0x7, 0x1f77, 0x7fff, 0x9, 0x0, 0x1}, {0x6000, 0x3006, 0x1f, 0x7, 0x6bf5, 0x100000001, 0x1, 0x1, 0x7b, 0x401, 0x1, 0x6}, {0x4000, 0xd000, 0xf, 0xffffffffffffffff, 0x412c, 0x0, 0x5, 0x8000, 0x1, 0xfffffffffffffff8, 0x3, 0x760a7a91}, {0xf000, 0xf002, 0xc, 0x1, 0x4, 0x2, 0x9, 0x6, 0x7, 0x6, 0x2, 0x9}, {0x1002, 0xf000, 0xc, 0x8, 0x3, 0x8, 0x100000000, 0x63, 0xffffffffffffffff, 0x8, 0xb32, 0xffffffff}, {0x7000, 0x106003, 0x10, 0x7, 0x5, 0x44, 0x2, 0x438, 0x7, 0xfffffffffffffffd, 0xc2, 0x8000}, {0x2000}, {0xf004, 0x2}, 0x10000, 0x0, 0x7006, 0x0, 0x2, 0x6800, 0xf000, [0xa2f, 0x6, 0x9, 0x70a]}) 07:38:28 executing program 2: 07:38:28 executing program 1: 07:38:28 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0xc}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:29 executing program 5: 07:38:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r3 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x2, 0x7000, 0xd, 0x7f, 0x3, 0x9, 0x8a, 0x2, 0x400, 0x0, 0x9, 0x101}, {0x0, 0xf000, 0xd, 0x4, 0x1000, 0x3, 0xffff, 0xd8e9, 0x5, 0x5, 0x100000000, 0x5}, {0x10f000, 0x100000, 0x0, 0x401, 0x8f, 0x5, 0x7, 0x1f77, 0x7fff, 0x9, 0x0, 0x1}, {0x6000, 0x3006, 0x1f, 0x7, 0x6bf5, 0x100000001, 0x1, 0x1, 0x7b, 0x401, 0x1, 0x6}, {0x4000, 0xd000, 0xf, 0xffffffffffffffff, 0x412c, 0x0, 0x5, 0x8000, 0x1, 0xfffffffffffffff8, 0x3, 0x760a7a91}, {0xf000, 0xf002, 0xc, 0x1, 0x4, 0x2, 0x9, 0x6, 0x7, 0x6, 0x2, 0x9}, {0x1002, 0xf000, 0xc, 0x8, 0x3, 0x8, 0x100000000, 0x63, 0xffffffffffffffff, 0x8, 0xb32, 0xffffffff}, {0x7000, 0x106003, 0x10, 0x7, 0x5, 0x44, 0x2, 0x438, 0x7, 0xfffffffffffffffd, 0xc2, 0x8000}, {0x2000}, {0xf004, 0x2}, 0x10000, 0x0, 0x7006, 0x0, 0x2, 0x6800, 0xf000, [0xa2f, 0x6, 0x9, 0x70a]}) 07:38:29 executing program 1: 07:38:29 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="6e65742f72745f6163637400f47616598bebd6d42e40f694ec6fe99f16a230c0eba649b0c083c60cf3a2075443fd3e0d48ce25703dd510593f1f008adeab797cbab8") perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x80000003) 07:38:29 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="9ee491010d37957e7e1f1d248c44fb2f4d203a3860102ae982de2e69c7290a29c67e447acb5f35c93d88d7f1e07fc0455e0d1a898b87fb2efcd7f7820671e4cc51", 0x41) 07:38:29 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xfffffffffffffffc, &(0x7f00000000c0), 0xc112) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff536ee5c014b1"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x800) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0xc}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r3 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x2, 0x7000, 0xd, 0x7f, 0x3, 0x9, 0x8a, 0x2, 0x400, 0x0, 0x9, 0x101}, {0x0, 0xf000, 0xd, 0x4, 0x1000, 0x3, 0xffff, 0xd8e9, 0x5, 0x5, 0x100000000, 0x5}, {0x10f000, 0x100000, 0x0, 0x401, 0x8f, 0x5, 0x7, 0x1f77, 0x7fff, 0x9, 0x0, 0x1}, {0x6000, 0x3006, 0x1f, 0x7, 0x6bf5, 0x100000001, 0x1, 0x1, 0x7b, 0x401, 0x1, 0x6}, {0x4000, 0xd000, 0xf, 0xffffffffffffffff, 0x412c, 0x0, 0x5, 0x8000, 0x1, 0xfffffffffffffff8, 0x3, 0x760a7a91}, {0xf000, 0xf002, 0xc, 0x1, 0x4, 0x2, 0x9, 0x6, 0x7, 0x6, 0x2, 0x9}, {0x1002, 0xf000, 0xc, 0x8, 0x3, 0x8, 0x100000000, 0x63, 0xffffffffffffffff, 0x8, 0xb32, 0xffffffff}, {0x7000, 0x106003, 0x10, 0x7, 0x5, 0x44, 0x2, 0x438, 0x7, 0xfffffffffffffffd, 0xc2, 0x8000}, {0x2000}, {0xf004, 0x2}, 0x10000, 0x0, 0x7006, 0x0, 0x2, 0x6800, 0xf000, [0xa2f, 0x6, 0x9, 0x70a]}) 07:38:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000180), &(0x7f0000000100)=""/25}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) 07:38:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000020000000000000000000850000002a00000017000000000000009500000000000000"], &(0x7f00000002c0)="73797a6b616c6c65722c493d6c2b78db01beb8234b8301e2918b8b33e703f173263d15127d1c5309a0593d0f6dbe9cd5434619dfff6e61ba74ed3776315503f2d22b3ecd7a62eab9627caaa8819bc2345afd348344bed224a114267fd4cd1e55f8cf69c16cfffd3ac7721aacdfb55e39d507f86531752d2affc30318f5da65004d3c13dcfe537276272ab1cfa4e14be518a7f4121f1b7f8762090524f59b9ceba4a1901fe9993d678692d072b99ea68c9474d84d3684479e52e8de6ff2fbb4ac5cecfd10a01c62035e13b1bc3aa235bcbda7750c758fcef17f65a0739140c05cbfe37dd975e1a12503b7b869a52795139928c39f8e2a105dcc511f2e94545939d9d66fda1413d881e0bac95b83839609390285f053", 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000000), 0xfeb3, &(0x7f0000000100)={&(0x7f0000000080)=@gettaction={0x14, 0x32, 0x605}, 0x3e3}}, 0x0) 07:38:29 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r3 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x2, 0x7000, 0xd, 0x7f, 0x3, 0x9, 0x8a, 0x2, 0x400, 0x0, 0x9, 0x101}, {0x0, 0xf000, 0xd, 0x4, 0x1000, 0x3, 0xffff, 0xd8e9, 0x5, 0x5, 0x100000000, 0x5}, {0x10f000, 0x100000, 0x0, 0x401, 0x8f, 0x5, 0x7, 0x1f77, 0x7fff, 0x9, 0x0, 0x1}, {0x6000, 0x3006, 0x1f, 0x7, 0x6bf5, 0x100000001, 0x1, 0x1, 0x7b, 0x401, 0x1, 0x6}, {0x4000, 0xd000, 0xf, 0xffffffffffffffff, 0x412c, 0x0, 0x5, 0x8000, 0x1, 0xfffffffffffffff8, 0x3, 0x760a7a91}, {0xf000, 0xf002, 0xc, 0x1, 0x4, 0x2, 0x9, 0x6, 0x7, 0x6, 0x2, 0x9}, {0x1002, 0xf000, 0xc, 0x8, 0x3, 0x8, 0x100000000, 0x63, 0xffffffffffffffff, 0x8, 0xb32, 0xffffffff}, {0x7000, 0x106003, 0x10, 0x7, 0x5, 0x44, 0x2, 0x438, 0x7, 0xfffffffffffffffd, 0xc2, 0x8000}, {0x2000}, {0xf004, 0x2}, 0x10000, 0x0, 0x7006, 0x0, 0x2, 0x6800, 0xf000, [0xa2f, 0x6, 0x9, 0x70a]}) [ 268.081030] tc_dump_action: action bad kind 07:38:30 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xfffffffffffffffc, &(0x7f00000000c0), 0xc112) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff536ee5c014b1"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x800) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:30 executing program 2: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) r0 = socket$inet6(0xa, 0x80002, 0x1000000000000088) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f00000006c0), 0x361, &(0x7f0000000140)}}], 0x4000280, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005700)={&(0x7f0000000100), 0xc, &(0x7f00000056c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) 07:38:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:30 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:30 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r1, &(0x7f0000000100)={0x7}, 0x7) splice(r0, &(0x7f0000001280), r1, 0x0, 0x800000a, 0x0) 07:38:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@dev}, 0x14) 07:38:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:30 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff536ee5c014b1"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x0) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x0, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000480)={0x80000001, 0x0, 0xfffffffffffffff9, 0x0, 0x5}) 07:38:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:31 executing program 1: creat(&(0x7f00000005c0)='./file0\x00', 0x0) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 07:38:31 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:31 executing program 2: mmap(&(0x7f00004c3000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) mmap(&(0x7f0000782000/0x3000)=nil, 0x3000, 0x0, 0x2000000011, r0, 0x0) mmap(&(0x7f0000187000/0x600000)=nil, 0x600000, 0x0, 0x71, 0xffffffffffffffff, 0x0) 07:38:31 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x0) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:31 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:31 executing program 5: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0xfffffffffffffd) 07:38:31 executing program 2: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000788000), 0xffffffffffffffac) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff536ee5c014b1"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x800) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:32 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x0) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:32 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) [ 270.064303] audit: type=1326 audit(1539243512.121:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8944 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:32 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x0) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:32 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835650306c29affff"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100)={0x64c9}, 0x8, 0x0) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x8, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:32 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)='V', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:38:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:32 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) 07:38:33 executing program 2: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000788000), 0xffffffffffffffac) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast1}, {0x1, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @broadcast}, 'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="d009b4e32200000001421be72521fe0600000000000000c35f800bd87a93bf90e62652e8fe7835"], 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) signalfd4(r0, &(0x7f0000000100), 0x8, 0x0) getpgid(0x0) r1 = memfd_create(&(0x7f0000000540)="00eb0c432d0174df5f00000000", 0x3) fcntl$setstatus(r0, 0x4, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000380)={0x0, 0x0, 0x50bb}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 07:38:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000280)=0x3, 0x4) 07:38:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:33 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) [ 271.378172] audit: type=1326 audit(1539243513.431:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8987 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:33 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r0, 0x15, r1) pipe(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000019c0)=0xa0) clock_gettime(0x0, &(0x7f00000001c0)) r4 = socket$inet6(0xa, 0x3, 0x6) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x4c46) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x10000000008, 0x40010, r3, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840), 0x4) pread64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000480)={@local, 0x3, 0x0, 0x1, 0x3, 0xfffffffffffffff9, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) dup(r3) clock_nanosleep(0x7, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e23, 0x3fe, @loopback}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") sendfile(r4, r5, &(0x7f00000000c0), 0x401) 07:38:33 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) 07:38:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7ff) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x3, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r2}) socket$kcm(0x29, 0x5, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r3) 07:38:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:34 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) 07:38:34 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000100), 0x4) sendto$unix(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 07:38:34 executing program 1: close(0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000080)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) [ 272.527789] audit: type=1326 audit(1539243514.581:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9030 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) [ 272.609223] raw_sendmsg: syz-executor2 forgot to set AF_INET. Fix it! 07:38:34 executing program 5: epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) 07:38:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000000c0), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001900810500000000000000000a00000000000000001600000c000900b6c226d3", @ANYRES32=0x0], 0x2}}, 0x0) 07:38:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 07:38:35 executing program 5: epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x114, 0x0, 0x0, 0x0) 07:38:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x9d3, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x18) 07:38:35 executing program 1: close(0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000080)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 07:38:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:35 executing program 5: 07:38:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 273.522264] audit: type=1326 audit(1539243515.571:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9075 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:35 executing program 2: 07:38:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:35 executing program 1: 07:38:35 executing program 5: 07:38:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 07:38:36 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000000301ffff0000000000000000000000000800080000000000"], 0x1c}}, 0x0) 07:38:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000100029080000000000000000030000000800010048a4863721674bc453572055c8190dcbe1dda2b90eed195e2380e0bf38a086896dddf0a4742f7c2e6521a924972e3763224c0a052993e7d232cf26b34e52d146170359add32c7ada8d47c63660ec5492ea9c65a5883c147193ce36d2edf18c7f7265a78260a993a6638dec189be1bc879e771be912a0ae8b4e89ad717addee393f92e73a5cd41da0b7a83d3a557020de6d072a756a745fa675a0eab19aa751bc52b6b50930436f3652c55630fb71a8740dfab2a117f65d851c70215ce885da5f30d933e476233e2d98489b19a6eb13223fa8338a3da269d2f6c50aafba36bb2eb720d25dc7cdc69f94479bcd7b096e97ff028196", @ANYRES32=0x0], 0x2}}, 0x0) 07:38:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:36 executing program 1: 07:38:36 executing program 5: [ 274.667068] audit: type=1326 audit(1539243516.721:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9115 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:36 executing program 1: 07:38:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:36 executing program 2: 07:38:37 executing program 5: 07:38:37 executing program 1: 07:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:37 executing program 2: 07:38:37 executing program 1: 07:38:37 executing program 5: 07:38:37 executing program 2: [ 275.724807] audit: type=1326 audit(1539243517.781:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9146 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:37 executing program 1: 07:38:38 executing program 5: 07:38:38 executing program 2: 07:38:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:38 executing program 1: 07:38:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r2 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 07:38:38 executing program 5: 07:38:38 executing program 2: 07:38:38 executing program 2: 07:38:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:38 executing program 1: 07:38:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:38 executing program 5: 07:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:39 executing program 2: 07:38:39 executing program 1: 07:38:39 executing program 5: 07:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 07:38:39 executing program 2: 07:38:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:39 executing program 5: 07:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:39 executing program 2: 07:38:39 executing program 1: 07:38:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") keyctl$join(0x1, &(0x7f0000000000)={'syz'}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) [ 277.952864] audit: type=1326 audit(1539243520.011:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9216 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:40 executing program 5: 07:38:40 executing program 2: 07:38:40 executing program 1: 07:38:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:40 executing program 4: 07:38:40 executing program 2: 07:38:40 executing program 5: 07:38:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:40 executing program 1: 07:38:40 executing program 2: 07:38:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:40 executing program 5: 07:38:40 executing program 4: 07:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:41 executing program 1: [ 279.096281] audit: type=1326 audit(1539243521.151:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9255 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:41 executing program 5: 07:38:41 executing program 4: 07:38:41 executing program 2: 07:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:41 executing program 5: 07:38:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:41 executing program 1: 07:38:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 07:38:41 executing program 4: 07:38:41 executing program 2: 07:38:42 executing program 1: 07:38:42 executing program 4: [ 280.050364] audit: type=1326 audit(1539243522.101:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9285 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:42 executing program 5: 07:38:42 executing program 2: 07:38:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x2000000000000d1, &(0x7f00000000c0)=0x46fd, 0x4) 07:38:42 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 07:38:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:42 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount(&(0x7f0000000300)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file1\x00', &(0x7f00000004c0)='hfs\x00', 0x3f00, &(0x7f0000000000)) 07:38:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000000), 0x0, 0x0, 0x106}}], 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountstats\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 07:38:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:42 executing program 2: 07:38:42 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) [ 281.106217] audit: type=1326 audit(1539243523.161:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9318 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:43 executing program 5: 07:38:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x1278, &(0x7f0000000080)) 07:38:43 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) 07:38:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x125f, &(0x7f0000000080)) 07:38:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 07:38:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x125d, &(0x7f0000000080)) 07:38:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_adj\x00') write$cgroup_int(r0, &(0x7f00000017c0), 0x12) 07:38:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x125e, &(0x7f0000000080)) 07:38:43 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 07:38:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000005c0)='./file0\x00', 0x71) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @multicast2}}, 0xffff, 0x5}, &(0x7f0000000380)=0x98) creat(&(0x7f0000000140)='./file0\x00', 0x0) 07:38:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 282.155285] audit: type=1326 audit(1539243524.211:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9367 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:44 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) 07:38:44 executing program 1: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000fc8000)}, 0x0) 07:38:44 executing program 4: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40000007c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000040)=',(/em0({}security+\x00'}, 0x30) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)={0x0, 0x0}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) close(r1) 07:38:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000019c0)}, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:38:45 executing program 5: creat(&(0x7f00000005c0)='./file0\x00', 0x71) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value, &(0x7f0000000280)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x13f}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="00ff00000000000000"], &(0x7f0000000300)='GPL\x00', 0x1f, 0x7c, &(0x7f0000000340)=""/124, 0x0, 0x0, [], 0x0, 0x4}, 0x48) 07:38:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000000), 0x0, 0x0, 0x106}}], 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x19b, 0x0) 07:38:45 executing program 1: 07:38:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:45 executing program 4: 07:38:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000005c0)='./file0\x00', 0x71) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') [ 283.223325] audit: type=1326 audit(1539243525.281:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9415 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:45 executing program 5: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) creat(&(0x7f00000005c0)='./file0\x00', 0x0) io_submit(0x0, 0x0, &(0x7f0000000980)) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 07:38:45 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0xc0101282, &(0x7f0000000080)) 07:38:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000005c0)='./file0\x00', 0x71) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') 07:38:45 executing program 4: r0 = socket(0x400000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000008c0)="2400000021002551071c0165ff00fc020200000000100f8dad31000c08000c0000000000", 0x24) 07:38:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 07:38:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000005c0)='./file0\x00', 0x71) clone(0x802102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') 07:38:46 executing program 2: 07:38:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 07:38:46 executing program 5: 07:38:46 executing program 4: 07:38:46 executing program 1: 07:38:46 executing program 2: 07:38:46 executing program 5: 07:38:46 executing program 4: [ 284.245905] audit: type=1326 audit(1539243526.291:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9460 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r0 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 07:38:46 executing program 1: 07:38:47 executing program 4: 07:38:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 07:38:47 executing program 2: 07:38:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r0 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 07:38:47 executing program 5: 07:38:47 executing program 1: 07:38:47 executing program 4: 07:38:47 executing program 5: 07:38:47 executing program 2: 07:38:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) r0 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 07:38:47 executing program 1: [ 285.329529] audit: type=1326 audit(1539243527.381:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9488 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:47 executing program 5: 07:38:47 executing program 4: 07:38:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 07:38:48 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/149, 0x95) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000300)={0x100, {0xaf, 0x6, 0x5b, 0x8, 0x5, 0x1}}) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x0) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x5) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)=0x3) 07:38:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, r3, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) 07:38:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) 07:38:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, r3) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) 07:38:48 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 286.167469] audit: type=1326 audit(1539243528.221:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9522 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a37a code=0x0 07:38:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 07:38:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_names\x00') 07:38:48 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/149, 0x95) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000300)={0x100, {0xaf, 0x6, 0x5b, 0x8, 0x5, 0x1}}) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x0) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x5) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)=0x3) 07:38:48 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x1, 0x8, 0x8, {0x0, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9, 0x0, 0x1a85}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003500)={0x0, 0xff, 0x0, 0x8, 0xffff, 0x4}, &(0x7f0000003540)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003800)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x3e000, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @local, 0x2}, r1, 0x4de8a597}}, 0x48) 07:38:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) 07:38:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00z', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 07:38:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x2, &(0x7f0000ffb000/0x4000)=nil) 07:38:49 executing program 5: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x0) 07:38:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) mlock2(&(0x7f000023e000/0x4000)=nil, 0x4000, 0x0) 07:38:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000005, 0x84) sendto$inet6(r0, &(0x7f00000001c0)='a', 0x1, 0x0, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0xfffffffffffe, 0x9) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84800) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0xbc, "411aca34b7a176daba8331d71e9a3530685e92ecc231bb49934aa4abf4725265cbbf7598ca520671b2e5749cb63d01f9125164df38bc297938aadbba73407d55ecba3690f1649250d0f1bf934a838dcbf6d63d90c54c1118a6473efa9e3092e302488ffe022d8f9eac5776c2c3442b61c32aec4e5fca15cf6d8de28419449b91259aba2458960cda5f531d1508065f9b96e620137a04155ea5f035a4d831640bb4e7d665195299d0e7ad750e8a844014913d47a488283fbaf038dd31"}, &(0x7f0000000240)=0xe0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6(0xa, 0x807, 0x80000000) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r4, 0x2, 0x1) getsockname$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_void(r5, 0x1, 0x3f, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000380)="9529b00a80f5eb629899860a9c7a89b5", 0x10) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x8000000}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) accept(r0, &(0x7f0000000000)=@can, &(0x7f00000000c0)=0x80) 07:38:49 executing program 1: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00z', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)="520972757374e3632a7367725665783a4465", 0x0) 07:38:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x1, 0x0, 0x0) [ 287.226929] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:38:49 executing program 4: 07:38:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) write$P9_RGETLOCK(r2, &(0x7f0000000000)=ANY=[], 0x0) 07:38:49 executing program 3: 07:38:49 executing program 1: 07:38:49 executing program 2: 07:38:49 executing program 4: 07:38:49 executing program 3: 07:38:50 executing program 5: 07:38:50 executing program 1: 07:38:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000005, 0x84) sendto$inet6(r0, &(0x7f00000001c0)='a', 0x1, 0x0, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0xfffffffffffe, 0x9) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84800) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0xbc, "411aca34b7a176daba8331d71e9a3530685e92ecc231bb49934aa4abf4725265cbbf7598ca520671b2e5749cb63d01f9125164df38bc297938aadbba73407d55ecba3690f1649250d0f1bf934a838dcbf6d63d90c54c1118a6473efa9e3092e302488ffe022d8f9eac5776c2c3442b61c32aec4e5fca15cf6d8de28419449b91259aba2458960cda5f531d1508065f9b96e620137a04155ea5f035a4d831640bb4e7d665195299d0e7ad750e8a844014913d47a488283fbaf038dd31"}, &(0x7f0000000240)=0xe0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$inet6(0xa, 0x807, 0x80000000) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r4, 0x2, 0x1) getsockname$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_void(r5, 0x1, 0x3f, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000380)="9529b00a80f5eb629899860a9c7a89b5", 0x10) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x8000000}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) accept(r0, &(0x7f0000000000)=@can, &(0x7f00000000c0)=0x80) 07:38:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000080, 0x0, 0x0, 0x20000188, 0x200001b8], 0x0, &(0x7f0000000040), &(0x7f0000000080)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000280)) 07:38:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) accept(0xffffffffffffffff, &(0x7f0000000300)=@nfc, &(0x7f0000000140)=0x80) r2 = dup2(r1, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="2b8de000000000000000eb515deee200000000000000000000000000"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) dup2(r0, r2) 07:38:50 executing program 3: 07:38:50 executing program 1: [ 288.396776] kernel msg: ebtables bug: please report to author: Valid hook without chain 07:38:50 executing program 5: [ 288.456393] kernel msg: ebtables bug: please report to author: Valid hook without chain 07:38:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd58, 0x40000) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x5a1180, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x0, "d0d6da7076e758bde75e37467d5bcc6e6f33a354ca80942257501777b59fa0b6fc4c6fcbb4cc3be715b69f49252dcaa248f70c0036517e49ec4b86db5c037f9b72bbda52ae894a7af084010fd24bd1f3"}, 0xd8) sendto$inet(r2, &(0x7f0000a88f88), 0x0, 0x2000560b, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) prctl$getname(0x10, &(0x7f0000000000)) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x2, 0x1, 0x7fffffff, 0x7fffffff}) shutdown(r2, 0x2200000000000001) shmget(0x1, 0x1000, 0x78000011, &(0x7f0000ffd000/0x1000)=nil) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x100, 0xffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) connect$bt_rfcomm(r1, &(0x7f0000000380)={0x1f, {0x9, 0x7, 0x1ea5, 0x400, 0x9, 0x1}, 0xfffffffffffffcc2}, 0xa) r4 = syz_open_pts(r3, 0x20201) write(r4, &(0x7f0000000180)="bf", 0x1) 07:38:50 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getgid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)) 07:38:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000000)={&(0x7f0000000700)=@bridge_newneigh={0x1c, 0x1c, 0x429, 0x0, 0x0, {0xa, 0x0, 0x0, r1}}, 0x1c}}, 0x0) 07:38:50 executing program 4: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)='lo}user\x00'}, 0x30) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001340)) 07:38:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000340), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @dev}]}, 0x1dc}}, 0x0) [ 289.293059] ptrace attach of "/root/syz-executor4"[9652] was attempted by "/root/syz-executor4"[9653] 07:38:51 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000340)='@\x00'}, 0x30) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001340)) [ 289.623032] ptrace attach of "/root/syz-executor1"[9665] was attempted by "/root/syz-executor1"[9666] 07:38:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) close(r0) 07:38:51 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x400000) 07:38:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000004000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00000000000000ffffffffffff00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000726f736530000000000000000000000062726964676530000000000000000000ffffffff0a1b000000000000aaaaaaaaaa0000000000000000007000000070000000a0000000415544495400000000000000000000000000000000000000000000000000000008000000000000000000000000000000"]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000040), 0x0, [{}, {}]}, 0x98) 07:38:51 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000200), 0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r2, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000528000)=[{0x6}]}, 0x10) dup3(r0, r1, 0x0) 07:38:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001340)) 07:38:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd58, 0x40000) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x5a1180, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x0, "d0d6da7076e758bde75e37467d5bcc6e6f33a354ca80942257501777b59fa0b6fc4c6fcbb4cc3be715b69f49252dcaa248f70c0036517e49ec4b86db5c037f9b72bbda52ae894a7af084010fd24bd1f3"}, 0xd8) sendto$inet(r2, &(0x7f0000a88f88), 0x0, 0x2000560b, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) prctl$getname(0x10, &(0x7f0000000000)) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x2, 0x1, 0x7fffffff, 0x7fffffff}) shutdown(r2, 0x2200000000000001) shmget(0x1, 0x1000, 0x78000011, &(0x7f0000ffd000/0x1000)=nil) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x100, 0xffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) connect$bt_rfcomm(r1, &(0x7f0000000380)={0x1f, {0x9, 0x7, 0x1ea5, 0x400, 0x9, 0x1}, 0xfffffffffffffcc2}, 0xa) r4 = syz_open_pts(r3, 0x20201) write(r4, &(0x7f0000000180)="bf", 0x1) 07:38:52 executing program 4: setrlimit(0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000240), 0x0, 0x8) 07:38:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) 07:38:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r3, &(0x7f00000006c0)={0x8, "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", 0x1000}, 0x1006) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) close(r3) 07:38:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000200), 0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r2, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) dup3(r0, r1, 0x80000) 07:38:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = dup2(r1, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) dup2(r0, r2) 07:38:52 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000340)={0xfffffffffffffffd, 0x0, 0x8000000000000}) dup2(r1, r0) r2 = msgget(0x3, 0x1) msgsnd(r2, &(0x7f0000000380), 0x8, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r4}) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df0d0d49d6ca010023df39a4a85312a0187080fe4242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34b273b0faf499d4208dbc3af632ca7032012345e216d229e0e0100000086b32d11860888ea9e9ad21d8852f678a3ada658d3bf28cb98fc7575040000008e4e3eb9065ec6"], 0x83) fchdir(r0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, 0x7, {0x9}}, 0x18) [ 290.733162] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:38:53 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) 07:38:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000480)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x8, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x38}}, 0x0) 07:38:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x190, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000008060300736630000010000000000000000064756d6d79300000000000000000000088dd62300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff0000000000000000d0000000d000000000010000617270000000000000000000000000000000000000000000000000000000000038000000000000000000000000000000e0000001000000007f00000100000000000000000000000000000000aaaaaaaaaa000000000000000000000000000000726564697265637400000000000000000000000000000000000000000000000008000000000000000000000000000000"]}, 0x208) [ 291.269516] ================================================================== [ 291.276986] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 291.284599] CPU: 0 PID: 9726 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #66 [ 291.291801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.301196] Call Trace: [ 291.303813] dump_stack+0x306/0x460 [ 291.307466] ? vmap_page_range_noflush+0x975/0xed0 [ 291.312435] kmsan_report+0x1a2/0x2e0 [ 291.316257] __msan_warning+0x7c/0xe0 [ 291.320082] vmap_page_range_noflush+0x975/0xed0 [ 291.324885] map_vm_area+0x17d/0x1f0 [ 291.328621] kmsan_vmap+0xf2/0x180 [ 291.332181] vmap+0x3a1/0x510 [ 291.335295] ? relay_open_buf+0x81e/0x19d0 [ 291.339536] relay_open_buf+0x81e/0x19d0 [ 291.343608] relay_open+0xabb/0x1370 [ 291.347334] do_blk_trace_setup+0xaf7/0x1780 [ 291.351757] __blk_trace_setup+0x20b/0x380 [ 291.356004] blk_trace_ioctl+0x274/0x970 [ 291.360074] ? kmsan_set_origin_inline+0x6b/0x120 [ 291.364915] ? __msan_poison_alloca+0x17a/0x210 [ 291.369586] ? blkdev_ioctl+0x327/0x55e0 [ 291.373639] ? block_ioctl+0x16f/0x1d0 [ 291.377531] blkdev_ioctl+0x1aaa/0x55e0 [ 291.381513] ? task_kmsan_context_state+0x6b/0x120 [ 291.386442] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 291.391803] ? vmalloc_to_page+0x57d/0x6b0 [ 291.396039] ? kmsan_set_origin_inline+0x6b/0x120 [ 291.400881] block_ioctl+0x16f/0x1d0 [ 291.404592] ? block_llseek+0x190/0x190 [ 291.408567] do_vfs_ioctl+0xcf3/0x2810 [ 291.412465] ? security_file_ioctl+0x92/0x200 [ 291.416964] __se_sys_ioctl+0x1da/0x270 [ 291.420942] __x64_sys_ioctl+0x4a/0x70 [ 291.424824] do_syscall_64+0xbe/0x100 [ 291.428622] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.433802] RIP: 0033:0x457519 [ 291.436992] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.455888] RSP: 002b:00007fc6e2af6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.463595] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 291.470859] RDX: 00000000200001c0 RSI: 00000000c0481273 RDI: 0000000000000006 [ 291.478556] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.485819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6e2af76d4 [ 291.493082] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 291.500355] [ 291.501976] Uninit was created at: [ 291.505523] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 291.510621] kmsan_kmalloc+0xa4/0x120 [ 291.514421] __kmalloc+0x14b/0x440 [ 291.517950] kmsan_vmap+0x9b/0x180 [ 291.521485] vmap+0x3a1/0x510 [ 291.524596] relay_open_buf+0x81e/0x19d0 [ 291.528649] relay_open+0xabb/0x1370 [ 291.532371] do_blk_trace_setup+0xaf7/0x1780 [ 291.536782] __blk_trace_setup+0x20b/0x380 [ 291.541010] blk_trace_ioctl+0x274/0x970 [ 291.545066] blkdev_ioctl+0x1aaa/0x55e0 [ 291.549034] block_ioctl+0x16f/0x1d0 [ 291.552740] do_vfs_ioctl+0xcf3/0x2810 [ 291.556618] __se_sys_ioctl+0x1da/0x270 [ 291.560585] __x64_sys_ioctl+0x4a/0x70 [ 291.564463] do_syscall_64+0xbe/0x100 [ 291.568280] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.573466] ================================================================== [ 291.580815] Disabling lock debugging due to kernel taint [ 291.586258] Kernel panic - not syncing: panic_on_warn set ... [ 291.586258] [ 291.593625] CPU: 0 PID: 9726 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #66 [ 291.602192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.611544] Call Trace: [ 291.614134] dump_stack+0x306/0x460 [ 291.617768] panic+0x54c/0xafa [ 291.620981] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 291.626432] kmsan_report+0x2d3/0x2e0 [ 291.630233] __msan_warning+0x7c/0xe0 [ 291.634035] vmap_page_range_noflush+0x975/0xed0 [ 291.638816] map_vm_area+0x17d/0x1f0 [ 291.642535] kmsan_vmap+0xf2/0x180 [ 291.646077] vmap+0x3a1/0x510 [ 291.649189] ? relay_open_buf+0x81e/0x19d0 [ 291.653430] relay_open_buf+0x81e/0x19d0 [ 291.657509] relay_open+0xabb/0x1370 [ 291.661235] do_blk_trace_setup+0xaf7/0x1780 [ 291.665661] __blk_trace_setup+0x20b/0x380 [ 291.669905] blk_trace_ioctl+0x274/0x970 [ 291.673977] ? kmsan_set_origin_inline+0x6b/0x120 [ 291.678822] ? __msan_poison_alloca+0x17a/0x210 [ 291.683499] ? blkdev_ioctl+0x327/0x55e0 [ 291.687558] ? block_ioctl+0x16f/0x1d0 [ 291.691451] blkdev_ioctl+0x1aaa/0x55e0 [ 291.695436] ? task_kmsan_context_state+0x6b/0x120 [ 291.700371] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 291.705740] ? vmalloc_to_page+0x57d/0x6b0 [ 291.709976] ? kmsan_set_origin_inline+0x6b/0x120 [ 291.714821] block_ioctl+0x16f/0x1d0 [ 291.718536] ? block_llseek+0x190/0x190 [ 291.722513] do_vfs_ioctl+0xcf3/0x2810 [ 291.726416] ? security_file_ioctl+0x92/0x200 [ 291.730910] __se_sys_ioctl+0x1da/0x270 [ 291.734899] __x64_sys_ioctl+0x4a/0x70 [ 291.738785] do_syscall_64+0xbe/0x100 [ 291.742585] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.747769] RIP: 0033:0x457519 [ 291.750961] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.769864] RSP: 002b:00007fc6e2af6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.777574] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 291.784840] RDX: 00000000200001c0 RSI: 00000000c0481273 RDI: 0000000000000006 [ 291.792106] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.799370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6e2af76d4 [ 291.806645] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 291.815176] Kernel Offset: disabled [ 291.818808] Rebooting in 86400 seconds..