[....] Starting OpenBSD Secure Shell server: sshd[ 50.634048] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 50.964702] audit: type=1800 audit(1538972701.029:29): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 50.984147] audit: type=1800 audit(1538972701.039:30): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 55.243391] random: sshd: uninitialized urandom read (32 bytes read) [ 55.760401] random: sshd: uninitialized urandom read (32 bytes read) [ 57.326132] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.12' (ECDSA) to the list of known hosts. [ 63.117651] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 04:25:14 fuzzer started [ 67.292499] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 04:25:19 dialing manager at 10.128.0.26:36867 2018/10/08 04:25:19 syscalls: 1 2018/10/08 04:25:19 code coverage: enabled 2018/10/08 04:25:19 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 04:25:19 setuid sandbox: enabled 2018/10/08 04:25:19 namespace sandbox: enabled 2018/10/08 04:25:19 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 04:25:19 fault injection: enabled 2018/10/08 04:25:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 04:25:19 net packed injection: enabled 2018/10/08 04:25:19 net device setup: enabled [ 72.191506] random: crng init done 04:26:56 executing program 0: [ 167.043927] IPVS: ftp: loaded support on port[0] = 21 [ 169.133805] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.140282] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.148729] device bridge_slave_0 entered promiscuous mode [ 169.268064] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.274774] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.283065] device bridge_slave_1 entered promiscuous mode [ 169.401169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 169.519709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.887580] bond0: Enslaving bond_slave_0 as an active interface with an up link 04:27:00 executing program 1: [ 170.064600] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.713206] IPVS: ftp: loaded support on port[0] = 21 [ 170.975521] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.983554] team0: Port device team_slave_0 added [ 171.224863] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.233114] team0: Port device team_slave_1 added [ 171.451252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.459142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.467970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.713487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.720514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.729216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.864740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.872360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.881402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.123870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.131397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.140162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.011275] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.017910] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.026181] device bridge_slave_0 entered promiscuous mode [ 174.244081] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.250523] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.258710] device bridge_slave_1 entered promiscuous mode [ 174.343029] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.349493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.356477] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.362961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.371372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 174.409831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:27:04 executing program 2: [ 174.607361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.132617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.321293] IPVS: ftp: loaded support on port[0] = 21 [ 175.366867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 175.623005] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 175.913107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 175.920182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.133953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 176.141007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.844083] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 176.852025] team0: Port device team_slave_0 added [ 177.015633] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.023662] team0: Port device team_slave_1 added [ 177.213102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.441938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 177.449087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.457930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.675583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.683365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.692215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.925091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.932697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.941415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.492539] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.499150] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.507532] device bridge_slave_0 entered promiscuous mode [ 179.670331] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.677005] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.685169] device bridge_slave_1 entered promiscuous mode [ 179.960141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 180.209594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.636233] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.642768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.649595] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.656149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.664650] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.865306] bond0: Enslaving bond_slave_0 as an active interface with an up link 04:27:11 executing program 3: [ 181.097655] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.375622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.427433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 181.435487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.750480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 181.757616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.144762] IPVS: ftp: loaded support on port[0] = 21 [ 182.663374] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.671049] team0: Port device team_slave_0 added [ 182.908657] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.916571] team0: Port device team_slave_1 added [ 183.203357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.210430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.219648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.523651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.530690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.539482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.815654] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.823401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.832385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.204852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.212509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.221295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.004447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.136590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.093741] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.100316] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.108564] device bridge_slave_0 entered promiscuous mode [ 187.207133] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.213787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.221751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.462690] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.469168] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.477480] device bridge_slave_1 entered promiscuous mode [ 187.542834] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.549294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.556268] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.562769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.571129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.642072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.750303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.011610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.383150] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.993348] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.256750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.540334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 189.547576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.854044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 189.861118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:27:20 executing program 4: [ 190.785613] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.793498] team0: Port device team_slave_0 added [ 191.111864] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.119997] team0: Port device team_slave_1 added [ 191.489015] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.496433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.504980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.575714] IPVS: ftp: loaded support on port[0] = 21 [ 191.834190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.841232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.849861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.195545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.203326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.212047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.536519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.544131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.552823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.826354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.212000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:27:26 executing program 0: 04:27:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x100402}}, 0x50) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "87bb9e6a4f38c7b44675d8f5fd1078547ebea3c47f1aec94d6004e199ddc2c2982ec2ea9108019fe39584ecd398ea8170f57bac2fd0902d9eed1d80af58c0b5a7e6ef7f612e239cb9f27625134bf8567ae4df61632fccc20230228a4462d4a4e937c5ffa4e4c5b9218dfa2f01cfca28efdf3a534ec0a318e44347d7f01d45261aa817ff2b9f5cf12783ddd16f236fc36294fe2a56678f80d3a"}, 0x9d) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f7369785f61636c5f64656661756c74da", &(0x7f00000005c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 04:27:26 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x80000000, 0x101000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="30ce4f2157340703793339494f2e52") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = gettid() setpgid(r2, 0x0) [ 196.596963] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.603425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.611042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.757828] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.764343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.771100] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.777615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.785653] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 04:27:27 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x2900) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000300)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e24, 0x8001, @dev={0xfe, 0x80, [], 0xf}}}, 0x1a, 0x6}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x100000001, @ipv4={[], [], @multicast1}, 0x9}}, 0x9, 0x3f, 0x1, 0x45, 0xb057}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r2, 0x6}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x1, 0x37ab7f81, 0x86, 0x6, 0x2, 0xfffffffffffffffb}) fsetxattr(r0, &(0x7f0000000440)=@known='system.advise\x00', &(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x12, 0x0) getresgid(&(0x7f0000000280), 0x0, &(0x7f00000004c0)) [ 197.410422] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.417172] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.425391] device bridge_slave_0 entered promiscuous mode 04:27:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x2) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=@ipv6_deladdr={0x40, 0x15, 0x209, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @remote}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="99da32c0") [ 197.692605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:27:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0xfffffffffffffff8, 0x8, 0x0, 0x4, 0x0}, &(0x7f0000000080)=0x10) clock_gettime(0x0, &(0x7f0000003f40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003e40)=[{{&(0x7f0000001dc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001e40)=""/210, 0xd2}, {&(0x7f0000001f40)=""/81, 0x51}, {&(0x7f0000001fc0)=""/4096, 0x1000}], 0x3, &(0x7f0000003000)=""/134, 0x86, 0xfffffffffffffdd9}, 0xff}, {{&(0x7f00000030c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003140)=""/166, 0xa6}, {&(0x7f0000003200)=""/74, 0x4a}, {&(0x7f0000003280)=""/184, 0xb8}, {&(0x7f0000003340)=""/148, 0x94}, {&(0x7f0000003400)=""/209, 0xd1}], 0x5, &(0x7f0000003580)=""/241, 0xf1, 0xfffffffffffffffe}, 0x1}, {{&(0x7f0000003680)=@nl, 0x80, &(0x7f0000003980)=[{&(0x7f0000003700)=""/154, 0x9a}, {&(0x7f00000037c0)=""/239, 0xef}, {&(0x7f00000038c0)=""/150, 0x96}], 0x3, &(0x7f00000039c0)=""/81, 0x51, 0x40}, 0x8}, {{&(0x7f0000003a40)=@un=@abs, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003ac0)=""/179, 0xb3}, {&(0x7f0000003b80)=""/61, 0x3d}, {&(0x7f0000003bc0)=""/30, 0x1e}, {&(0x7f0000003c00)=""/238, 0xee}], 0x4, &(0x7f0000003d40)=""/218, 0xda, 0x1000}, 0x874}], 0x4, 0x40000100, &(0x7f0000003f80)={r2, r3+30000000}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003fc0)={'vcan0\x00', r4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r1, 0x39, "c83bde62494192b74288f035648c7390c71e2da1b6688da89b92817bfb66fa884e32923309cd121e5ee411d2233fb8698fd4fd2cbe9a75003a"}, &(0x7f00000000c0)=0x41) r5 = socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup3(r5, r0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000000)) sendmsg$nl_route(r6, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@ipv6_getanyicast={0x14, 0x3e, 0x10, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x20000010) [ 197.768343] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.775247] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.783383] device bridge_slave_1 entered promiscuous mode [ 198.104785] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.148474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.515464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:27:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6249488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x4000007, 0x0) perf_event_open(&(0x7f0000001000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc4c85512, &(0x7f0000001000)) 04:27:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@rc, 0x80, &(0x7f00000013c0)=[{&(0x7f00000001c0)=""/178, 0x31}, {&(0x7f0000000280)=""/161, 0xffffffffffffffcc}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001400)=""/17, 0x11, 0x9}, 0x40000040) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, "6468ed820000030092230000000d00", 0x0, 0x200000}, 0x2c) r2 = dup3(r1, r1, 0x80000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100), 0x4) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000001480)={0x8, @multicast1, 0x4e24, 0x3, 'fo\x00', 0x10, 0x6, 0x2f}, 0x2c) [ 199.592323] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.673121] IPVS: set_ctl: invalid protocol: 8 224.0.0.1:20004 [ 200.044059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.300244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 200.307540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.649590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.656736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.358924] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.366822] team0: Port device team_slave_0 added [ 201.547465] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.555648] team0: Port device team_slave_1 added [ 201.729126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.776158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.785640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.794362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.114129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.141948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.150468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.424423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.432109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.440773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.565795] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.725947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.733648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.742427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.492187] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 203.498604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.506513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.440842] 8021q: adding VLAN 0 to HW filter on device team0 04:27:34 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000000)={0x0, 0x10002be, 0x60}) [ 205.592492] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.598959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.605984] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.612527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.620847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.627518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.538061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.107031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.771038] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 208.777655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.785324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:27:39 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f00000003c0)=ANY=[]) [ 209.389426] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.933377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.382927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:27:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) dup2(r0, r1) [ 212.784408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.790673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.798373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.079131] 8021q: adding VLAN 0 to HW filter on device team0 04:27:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000000000000, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x1, 0x90, [0x0, 0x20001000, 0x20001030, 0x2000123c], 0x0, &(0x7f0000000580), &(0x7f0000001000)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1}]}, 0x108) 04:27:44 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000180)={0x34, 0xfffffdfd}) 04:27:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000440)="237ee13001f56ab0a1af59af2df1e69c03d9d500cf76a959c7661d7b008bf2e494dab030c5c5bf1e67b4631016b2ff1787a3d6484ff624ac00000000000000000000000000000000", 0x48) recvmmsg(r1, &(0x7f0000000a00)=[{{&(0x7f0000000080)=@ll, 0x80, &(0x7f0000000200)}}, {{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)=""/113, 0x7ffff000}], 0x1, &(0x7f00000002c0)=""/73, 0x49}}], 0x2, 0x0, 0x0) 04:27:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x71, &(0x7f0000000000)=@assoc_value, 0x8) 04:27:44 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x20000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x3f, 0x4) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r1, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3fff80}]}, 0x58}, 0x1, 0x0, 0x0, 0x804}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x40, 0x0) r3 = fanotify_init(0x20, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0xc40, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000300)='\x00', 0xffffffffffffffff}, 0x30) capget(&(0x7f0000000380)={0x19980330, r5}, &(0x7f00000003c0)={0xffffffffffffffc1, 0x9, 0x1, 0x1, 0x8, 0x80000001}) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) modify_ldt$read(0x0, &(0x7f0000000480)=""/255, 0xff) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000580)) setxattr$trusted_overlay_redirect(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.redirect\x00', &(0x7f0000000640)='./file0\x00', 0x8, 0xe5a41b5e451cbdd7) removexattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=@random={'security.', '/vmnet0#\x00'}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e24, 0x4, @ipv4={[], [], @local}, 0x1}}, 0x800, 0x80000001}, &(0x7f00000007c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000800)=@sack_info={r6, 0x200, 0x8}, 0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000840)={r6, @in6={{0xa, 0x4e24, 0x8, @remote, 0x8}}}, 0x84) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000900)={0x9, 0x37bd, 0x9, 0x1000, 0x10f, 0x3b2a}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000940)={r6, @in6={{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0xd}, 0x8000}}, 0x1000, 0x2}, &(0x7f0000000a00)=0x90) removexattr(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)=@random={'osx.', '/dev/sequencer\x00'}) r7 = open(&(0x7f0000000ac0)='./file0/file0\x00', 0x40000, 0x6) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b40)={0x5, &(0x7f0000000b00)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000b80)={r8, 0x10}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000bc0)=0x420000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r7, 0x40045532, &(0x7f0000000c00)=0x1) syz_open_dev$sndpcmc(&(0x7f0000000c40)='/dev/snd/pcmC#D#c\x00', 0x58f, 0x4180) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000c80)) open(&(0x7f0000000cc0)='./file0\x00', 0x40000, 0x102) 04:27:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) [ 214.962959] ion_ioctl: ioctl validate failed [ 215.039283] kernel msg: ebtables bug: please report to author: Valid hook without chain 04:27:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'bro\nte\x00', 0x20, 0x3, 0x974, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001100000000000000000076657468315f746f5f626f6e6400000069705f76746930000000000000000000726f736530000000000000000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000000000000000000000000000000080900000809000040090000616d6f6e6700000000000000000000000000000000000000000000000000000038080000000000000004000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005ecf69e700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0bcd33f8f48b64e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d22a82af65c64f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414bb000000006d616300000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000003000000000000000000626f6e645f736c6176655f30000000000000"]}, 0x9ec) 04:27:45 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x6, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f00000000c0)) 04:27:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@local, 0x80000000, 0x0, 0x3, 0x0, 0x390}, 0x20) 04:27:45 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xe, 0x3, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000000180), &(0x7f0000000080)}, 0x20) [ 215.412217] kernel msg: ebtables bug: please report to author: entries_size too small 04:27:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1f}, 0x2c) 04:27:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 04:27:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000240)={'ah\x00'}, &(0x7f00000002c0)=0x1e) 04:27:46 executing program 2: getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb2580000000000"], 0x3a) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(0x0, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001000)}]) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[]}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x1, 0xc01}, 0xc) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) [ 216.153921] hrtimer: interrupt took 32721 ns [ 216.348760] IPVS: ftp: loaded support on port[0] = 21 [ 217.627875] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.634527] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.642291] device bridge_slave_0 entered promiscuous mode [ 217.715880] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.722337] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.729888] device bridge_slave_1 entered promiscuous mode [ 217.801865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.877752] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.094697] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.169842] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.313332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.320280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.538243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.545843] team0: Port device team_slave_0 added [ 218.618971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.626496] team0: Port device team_slave_1 added [ 218.701144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.775696] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.850574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.858164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.866926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.933345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.940589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.949492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.765859] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.772499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.779219] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.785732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.793566] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.314936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.738373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.002611] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.277275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 223.283716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.291339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.568426] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.235546] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 04:27:55 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000003c0)='gre0\x00', 0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x342, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000b80], 0x0, &(0x7f0000000000), &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}, 0x3ba) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x3782}, 0x8) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000002640)=""/207, 0xfffffede, 0xfffffffe) 04:27:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000) accept4(r0, &(0x7f00000000c0)=@alg, &(0x7f0000000040)=0x67, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:27:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000340)='children\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 04:27:55 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x18) 04:27:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000400)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7fff, 0xfffffffffffffffa}]}}) 04:27:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'bro\nte\x00', 0x20, 0x3, 0xa0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001100000000000000000076657468315f746f5f626f6e6400000069705f76746930000000000000000000726f736530000000000000000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000000000000000000000000000000080900000809000040090000"]}, 0x118) [ 225.373721] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 225.394483] kernel msg: ebtables bug: please report to author: entries_size too small [ 225.448307] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:27:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'bro\nte\x00', 0x20, 0x3, 0x34, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0200000011000000"]}, 0xac) 04:27:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2e, 0x119, 0x0, 0x0, {0x2}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @binary="04"}]}]}, 0x20}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 04:27:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1, 0x3, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f00000002c0)}, 0x20) [ 225.794271] kernel msg: ebtables bug: please report to author: entries_size too small 04:27:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x6, &(0x7f0000000480)={@multicast1}, 0x10) 04:27:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000340)='children\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 225.867313] kernel msg: ebtables bug: please report to author: entries_size too small 04:27:56 executing program 0: bpf$MAP_CREATE(0x5, &(0x7f0000000080), 0x2c) [ 226.258509] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:27:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)) getsockopt$SO_COOKIE(r0, 0x1, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 04:27:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x200000000010}, 0x2c) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x54}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 04:27:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/174, 0x1a, 0xae, 0x1}, 0x20) 04:27:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f00009322c4)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0xf) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) dup2(r1, r3) tkill(r2, 0x1000000000016) 04:27:56 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)) pwrite64(r0, &(0x7f0000000480)="06", 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x67, 0x0, 0x6, 0x1, 0x80000000}, 0xc) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x61bf, 0x1c2dc0000}) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) 04:27:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, 0x5c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)) 04:27:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") getsockopt$SO_COOKIE(r0, 0x1, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 04:27:56 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:27:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="5000000090780000"], &(0x7f0000000840)) 04:27:57 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='ceph\x00', &(0x7f0000000440)='{-]eth1nodev:\x00') 04:27:57 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 04:27:57 executing program 0: memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000001800)={{0x1}, {}, {0xf000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x5}, {0x10000}, {}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x101}, {}, {}, 0x0, 0x0, 0x0, 0x80, 0x0, 0x8100, 0x0, [0x100]}) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001640)={0x0, 0x20, 0x6, 0x0, 0x7, 0x7, 0x4, 0x0, {0x0, @in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, 0x463, 0x80000000}}, &(0x7f0000000400)=0xb0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 04:27:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="73746174e91193513049f831550d6f7de66cf637bdbf131192a4dcc3783f9db5116bce436cd20512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0xfff) fallocate(r1, 0x0, 0x0, 0x10001) ftruncate(r1, 0x5) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) [ 227.389353] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 227.399673] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 227.412264] Error parsing options; rc = [-22] 04:27:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) 04:27:57 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:57 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:27:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000007c0)="0f16c0cab817d55a4fb44debaf16da79013c845fd4783717be923f71b746de22a01272642c31fec33fbe60cfd29b0114169b37db52178d3391d0e23329fd8bc9b957e79a6335dbbb1107f3c2822c0e49be", 0x51}], 0x1, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 04:27:57 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 04:27:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80003, 0xfd) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x20000000000004}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bond\x00', 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/68, 0x44}, {&(0x7f0000000240)=""/203, 0xcb}, {&(0x7f0000000140)=""/11, 0xb}, {&(0x7f0000000340)=""/2, 0x2}], 0x4, &(0x7f00000003c0)=""/36, 0x24, 0x5}, 0x3f}, {{&(0x7f0000000400)=@rc, 0x80, &(0x7f0000000540)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000480)=""/179, 0xb3}], 0x2, 0x0, 0x0, 0x5}, 0x6}, {{&(0x7f0000000580)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000780)=[{&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000000600)=""/114, 0x72}, {&(0x7f0000000680)=""/141, 0x8d}, {&(0x7f0000000740)=""/44, 0x2c}], 0x4, &(0x7f00000007c0)=""/9, 0x9, 0x6}, 0x1}, {{&(0x7f0000000800)=@hci, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000880)=""/13, 0xd}, {&(0x7f00000008c0)=""/147, 0x93}, {&(0x7f0000000980)=""/24, 0x18}, {&(0x7f00000009c0)=""/126, 0x7e}, {&(0x7f0000000a40)=""/97, 0x61}, {&(0x7f0000000ac0)=""/125, 0x7d}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/4, 0x4}, {&(0x7f0000000b80)=""/238, 0xee}, {&(0x7f0000000c80)=""/86, 0x56}], 0xa, &(0x7f0000000dc0)=""/27, 0x1b, 0x611}, 0x47ef}, {{&(0x7f0000000e00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e80)=""/178, 0xb2}, {&(0x7f0000004340)=""/4096, 0x1000}], 0x2, &(0x7f0000000f80)=""/250, 0xfa, 0x100000000}, 0x8}], 0x5, 0x3, 0x0) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 04:27:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) [ 227.940919] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 227.951314] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 227.964044] Error parsing options; rc = [-22] 04:27:58 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000280)="b0", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x224) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 04:27:58 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:27:58 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:58 executing program 4: r0 = socket$inet6(0xa, 0x4000000000000001, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in, 0x0, 0xff}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) r1 = getuid() setfsuid(r1) close(r0) 04:27:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x12, &(0x7f0000000480)={@multicast1}, 0x10) 04:27:58 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:58 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:27:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x425}], 0x1, &(0x7f0000000100)={0x0, r2+10000000}, &(0x7f0000000140), 0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000180)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000000c0)={0x20000300}) 04:27:59 executing program 1: 04:27:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@local, 0x80000000, 0x0, 0x3, 0x0, 0x390}, 0x21) 04:27:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 04:27:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") getsockopt$SO_COOKIE(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 04:27:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x425}], 0x1, &(0x7f0000000100)={0x0, r2+10000000}, &(0x7f0000000140), 0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000180)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000000c0)={0x20000300}) 04:27:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000001980)={'ipvs\x00'}, &(0x7f00000019c0)=0x1e) 04:27:59 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:27:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:27:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x425}], 0x1, &(0x7f0000000100)={0x0, r2+10000000}, &(0x7f0000000140), 0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000180)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000000c0)={0x20000300}) 04:27:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/174, 0x1a, 0xae, 0x1}, 0x20) 04:27:59 executing program 2: 04:28:00 executing program 0: 04:28:00 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:00 executing program 1: 04:28:00 executing program 2: 04:28:00 executing program 0: 04:28:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x425}], 0x1, &(0x7f0000000100)={0x0, r2+10000000}, &(0x7f0000000140), 0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000180)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f00000000c0)={0x20000300}) 04:28:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:00 executing program 1: 04:28:00 executing program 0: 04:28:00 executing program 4: 04:28:00 executing program 2: 04:28:00 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:00 executing program 1: 04:28:00 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:01 executing program 4: 04:28:01 executing program 0: 04:28:01 executing program 2: 04:28:01 executing program 4: 04:28:01 executing program 1: 04:28:01 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:01 executing program 2: 04:28:01 executing program 0: 04:28:01 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:01 executing program 4: 04:28:01 executing program 2: 04:28:01 executing program 1: 04:28:01 executing program 0: 04:28:02 executing program 4: 04:28:02 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:02 executing program 0: 04:28:02 executing program 1: 04:28:02 executing program 2: 04:28:02 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:02 executing program 4: 04:28:02 executing program 0: 04:28:02 executing program 1: 04:28:02 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:02 executing program 2: 04:28:02 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:03 executing program 4: 04:28:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 04:28:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) 04:28:03 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:03 executing program 2: 04:28:03 executing program 4: 04:28:03 executing program 0: 04:28:03 executing program 4: 04:28:03 executing program 1: 04:28:03 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:03 executing program 2: 04:28:03 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0xf4, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @broadcast}}, 0x1e) 04:28:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000100)="1b", 0x1, 0x20048045, &(0x7f00000001c0)={0x2, 0x4e20}, 0x10) 04:28:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) [ 234.074926] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:28:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000200)="766574000000000000000000bd6800") 04:28:04 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:04 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:04 executing program 4: 04:28:04 executing program 1: 04:28:04 executing program 0: 04:28:04 executing program 2: 04:28:04 executing program 4: 04:28:04 executing program 1: 04:28:04 executing program 0: 04:28:05 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:05 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:05 executing program 4: 04:28:05 executing program 2: 04:28:05 executing program 1: 04:28:05 executing program 0: 04:28:05 executing program 4: 04:28:05 executing program 2: 04:28:05 executing program 0: 04:28:05 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:05 executing program 1: 04:28:05 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:05 executing program 2: 04:28:05 executing program 4: 04:28:05 executing program 0: 04:28:06 executing program 1: 04:28:06 executing program 2: 04:28:06 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:06 executing program 4: 04:28:06 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:06 executing program 0: 04:28:06 executing program 1: 04:28:06 executing program 2: 04:28:06 executing program 4: 04:28:06 executing program 1: 04:28:06 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 04:28:06 executing program 0: 04:28:07 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000140), 0x43, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:07 executing program 2: 04:28:07 executing program 4: 04:28:07 executing program 1: 04:28:07 executing program 0: 04:28:07 executing program 2: 04:28:07 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) 04:28:07 executing program 4: 04:28:07 executing program 0: 04:28:07 executing program 1: 04:28:07 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x0, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:07 executing program 2: 04:28:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x200a, 0x20000000000001}, 0x2c) poll(&(0x7f0000000000)=[{r0, 0x1}], 0x1, 0x0) 04:28:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) sendmsg$netlink(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)=[{&(0x7f0000000040)={0x10, 0x19, 0x100, 0x70bd2a, 0x25dfdbfb}, 0x10}], 0x1, 0x0, 0x0, 0x4004}, 0x800) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000100), 0x1) mmap(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x1000007, 0x2013, r0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000000c0), 0x4) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 04:28:07 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) 04:28:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") socket(0x14, 0x0, 0x0) 04:28:08 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r5 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r6, 0x1, &(0x7f00000000c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r3, &(0x7f0000001000), 0x0, 0x5, 0x0, 0x0, r5}]) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r4, r5, &(0x7f00000001c0), 0x2000005) 04:28:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0xddf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0xe57) 04:28:08 executing program 1: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000002c0)=""/38, &(0x7f0000000300)=0x26) gettid() socket$inet_tcp(0x2, 0x1, 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f0000000400)="15", 0x1, 0xfffffffffffffffb) [ 238.375363] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:28:08 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x0, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:28:08 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) 04:28:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000480)={@multicast1}, 0x10) 04:28:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="e2", 0x1, 0xfeffffff, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 04:28:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000ec0)={"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"}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000001c0)=0x4ffd) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 04:28:09 executing program 5: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140), 0x0, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 239.227424] ================================================================== [ 239.234852] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 239.241461] CPU: 0 PID: 8251 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #63 [ 239.248727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.258169] Call Trace: [ 239.260792] dump_stack+0x306/0x460 [ 239.264436] ? _raw_spin_lock_irqsave+0x227/0x340 [ 239.269293] ? vmx_create_vcpu+0x10df/0x7920 [ 239.273710] kmsan_report+0x1a3/0x2d0 [ 239.277504] __msan_warning+0x7c/0xe0 [ 239.281328] vmx_create_vcpu+0x10df/0x7920 [ 239.285554] ? kmsan_set_origin_inline+0x6b/0x120 [ 239.290404] ? __msan_poison_alloca+0x17a/0x210 [ 239.295085] ? vmx_vm_init+0x340/0x340 [ 239.299005] kvm_arch_vcpu_create+0x25d/0x2f0 [ 239.303508] kvm_vm_ioctl+0x13fd/0x33d0 [ 239.307477] ? __msan_poison_alloca+0x17a/0x210 [ 239.312147] ? do_vfs_ioctl+0x18a/0x2810 [ 239.316199] ? __se_sys_ioctl+0x1da/0x270 [ 239.320338] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 239.325185] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 239.330020] do_vfs_ioctl+0xcf3/0x2810 [ 239.333905] ? security_file_ioctl+0x92/0x200 [ 239.338394] __se_sys_ioctl+0x1da/0x270 [ 239.342365] __x64_sys_ioctl+0x4a/0x70 [ 239.346250] do_syscall_64+0xbe/0x100 [ 239.350038] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.355215] RIP: 0033:0x457579 [ 239.358396] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.377743] RSP: 002b:00007fe224088c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.385439] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 239.392695] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 239.399948] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 239.407206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2240896d4 [ 239.414461] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 239.421817] [ 239.423435] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 239.430359] Variable was created at: [ 239.434064] vmx_create_vcpu+0xd5/0x7920 [ 239.438116] kvm_arch_vcpu_create+0x25d/0x2f0 [ 239.442597] ================================================================== [ 239.450055] Disabling lock debugging due to kernel taint [ 239.455491] Kernel panic - not syncing: panic_on_warn set ... [ 239.455491] [ 239.462852] CPU: 0 PID: 8251 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #63 [ 239.471423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.480762] Call Trace: [ 239.483347] dump_stack+0x306/0x460 [ 239.486985] panic+0x54c/0xafa [ 239.490209] kmsan_report+0x2cd/0x2d0 [ 239.494003] __msan_warning+0x7c/0xe0 [ 239.497814] vmx_create_vcpu+0x10df/0x7920 [ 239.502039] ? kmsan_set_origin_inline+0x6b/0x120 [ 239.506877] ? __msan_poison_alloca+0x17a/0x210 [ 239.511544] ? vmx_vm_init+0x340/0x340 [ 239.515439] kvm_arch_vcpu_create+0x25d/0x2f0 [ 239.519947] kvm_vm_ioctl+0x13fd/0x33d0 [ 239.523930] ? __msan_poison_alloca+0x17a/0x210 [ 239.528608] ? do_vfs_ioctl+0x18a/0x2810 [ 239.532659] ? __se_sys_ioctl+0x1da/0x270 [ 239.536799] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 239.541654] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 239.546506] do_vfs_ioctl+0xcf3/0x2810 [ 239.550395] ? security_file_ioctl+0x92/0x200 [ 239.554891] __se_sys_ioctl+0x1da/0x270 [ 239.558871] __x64_sys_ioctl+0x4a/0x70 [ 239.562752] do_syscall_64+0xbe/0x100 [ 239.566560] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 239.571738] RIP: 0033:0x457579 [ 239.574929] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.593819] RSP: 002b:00007fe224088c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.601513] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 239.608766] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 239.616018] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 239.623294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2240896d4 [ 239.630552] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 239.639022] Kernel Offset: disabled [ 239.642648] Rebooting in 86400 seconds..