[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.767590] kauditd_printk_skb: 1 callbacks suppressed [ 66.767625] audit: type=1800 audit(1543522128.826:29): pid=6628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 66.792925] audit: type=1800 audit(1543522128.846:30): pid=6628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 67.365890] sshd (6745) used greatest stack depth: 53232 bytes left Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.14' (ECDSA) to the list of known hosts. 2018/11/29 20:08:59 fuzzer started 2018/11/29 20:09:05 dialing manager at 10.128.0.26:36065 2018/11/29 20:09:05 syscalls: 1 2018/11/29 20:09:05 code coverage: enabled 2018/11/29 20:09:05 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/29 20:09:05 setuid sandbox: enabled 2018/11/29 20:09:05 namespace sandbox: enabled 2018/11/29 20:09:05 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/29 20:09:05 fault injection: enabled 2018/11/29 20:09:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/29 20:09:05 net packet injection: enabled 2018/11/29 20:09:05 net device setup: enabled 20:11:57 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000280)=0xdc0, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syzkaller login: [ 256.708625] IPVS: ftp: loaded support on port[0] = 21 [ 259.061347] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.068004] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.077267] device bridge_slave_0 entered promiscuous mode [ 259.218823] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.225424] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.234215] device bridge_slave_1 entered promiscuous mode [ 259.369128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 259.505449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 259.930735] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.070804] bond0: Enslaving bond_slave_1 as an active interface with an up link 20:12:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)="1629237fd14966dc9339740800", 0x0) r2 = dup3(r0, r1, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000240)) [ 260.991393] IPVS: ftp: loaded support on port[0] = 21 [ 261.093920] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.102319] team0: Port device team_slave_0 added [ 261.366694] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.375049] team0: Port device team_slave_1 added [ 261.655219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 261.662440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.671333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.891007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 261.898478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.907651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.138022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.146135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.155397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.375042] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.382872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.391882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.768975] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.775592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.782952] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.789514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.798472] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 264.937236] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.943917] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.952775] device bridge_slave_0 entered promiscuous mode [ 265.140142] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.146826] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.155716] device bridge_slave_1 entered promiscuous mode [ 265.344982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 265.484490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.698468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:12:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x100000002) ioctl$TIOCSETD(r1, 0x5437, 0x0) [ 266.253492] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.507495] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.790253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 266.797546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.959313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 266.966528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.336915] IPVS: ftp: loaded support on port[0] = 21 [ 267.897232] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.905627] team0: Port device team_slave_0 added [ 268.221906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 268.230402] team0: Port device team_slave_1 added [ 268.549561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 268.556858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.566014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.884047] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 268.891133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.900444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.094541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 269.102367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.111259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.409624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 269.417465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.426716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.059411] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.066084] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.074951] device bridge_slave_0 entered promiscuous mode [ 272.363461] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.369995] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.378963] device bridge_slave_1 entered promiscuous mode [ 272.639997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 272.884228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 272.900589] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.907143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.914211] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.920717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.929491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 273.763054] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.772813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.098410] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.455043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 274.462321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.649562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 274.656926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:12:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc2c45513, 0x0) [ 275.666782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.675218] team0: Port device team_slave_0 added [ 276.058625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.066895] team0: Port device team_slave_1 added [ 276.166161] IPVS: ftp: loaded support on port[0] = 21 [ 276.418360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 276.425515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.434530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.475564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.754942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 276.762268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.771085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.104137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 277.111813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.121256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.521524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.529277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.538843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.931048] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 279.315203] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 279.321891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.330129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.622936] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.484822] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.491319] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.500125] device bridge_slave_0 entered promiscuous mode [ 281.709007] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.715579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.722715] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.729183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.738136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 281.772306] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.778769] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.787476] device bridge_slave_1 entered promiscuous mode [ 282.098553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 282.413756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.423288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 283.474675] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 283.799531] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.179108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 284.187979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.576666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 284.583983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.660104] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 285.668337] team0: Port device team_slave_0 added [ 285.950690] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 285.958995] team0: Port device team_slave_1 added [ 286.196992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 286.205846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.214828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.586520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 286.593745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.603239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 20:12:28 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, 0x0) [ 286.960465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.023875] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 287.031528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.040695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.491682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 287.499921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.509170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.193143] IPVS: ftp: loaded support on port[0] = 21 [ 288.500407] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 20:12:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x1, 0x0, [], &(0x7f0000000080)={0x98f909, 0xfffffffffffffffd, [], @p_u32=&(0x7f0000000100)}}) [ 289.763982] hrtimer: interrupt took 51078 ns [ 290.006417] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.012945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.020822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:12:32 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xfffffffffffffc00, 0x10001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x5, 0x1, 0x9, 0x7ef, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x3}, &(0x7f0000000180)=0x8) r2 = socket$inet6(0xa, 0x803, 0x4) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000240)={'veth1_to_bridge\x00', &(0x7f0000000140)=@ethtool_gstrings={0x1b, 0x1}}) 20:12:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000700)={'bridge_slave_0\x00', 0x0}) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000280)={0xeb, 0x6, 0x0, [], &(0x7f0000000240)=0x6}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$VIDIOC_G_EDID(r4, 0xc0285628, &(0x7f00000001c0)={0x8, 0x8, 0x100000001, [], &(0x7f0000000080)=0xc4}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x9}]}}}]}, 0x44}}, 0x0) [ 290.728639] netlink: 'syz-executor0': attribute type 9 has an invalid length. 20:12:33 executing program 0: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) r0 = getpid() r1 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x1, 0x82800) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000002c0)={{0x0, 0x7, 0x0, 0xd77, 'syz0\x00', 0xffff}, 0x0, 0x10000003, 0x0, r0, 0x1, 0xbe0, 'syz1\x00', &(0x7f0000000280)=['net/hci\x00'], 0x8, [], [0x118, 0x3ff, 0x8000, 0x2]}) rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x8) r2 = syz_open_procfs(r0, &(0x7f0000000000)='net/hci\x00') perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x8, 0x0, 0xfffffffffffff5a3, 0x5, 0x0, 0x5, 0x32000, 0x7, 0x6, 0x4b6, 0x3, 0x7, 0x5, 0x7, 0x1, 0x80000000, 0x401, 0x8, 0x5, 0x4, 0x7, 0x2, 0x7fff, 0x9, 0x2, 0x64907f9a, 0x100, 0x0, 0x5, 0x3, 0x1, 0x3, 0x2d3, 0x1ba90000, 0x100, 0x7, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x4000, 0xde55, 0x47, 0xb, 0x0, 0x7, 0x7fffffff}, r0, 0xd, r2, 0x2) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000040)={0x7fff, 0xffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) 20:12:33 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000b1c000/0x1000)=nil}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) dup3(r0, r2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000280)='memory.high\x00', 0x2, 0x0) writev(r4, &(0x7f0000000700), 0x1000000000000110) io_setup(0x4, &(0x7f0000000040)=0x0) flistxattr(r4, &(0x7f0000000380)=""/142, 0xfffffffffffffef4) io_pgetevents(r5, 0x0, 0x0, 0x0, 0x0, 0x0) [ 291.681336] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.719637] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 292.136017] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.142572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.149494] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.156117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.164893] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 292.171467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:12:34 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000b1c000/0x1000)=nil}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) dup3(r0, r2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000280)='memory.high\x00', 0x2, 0x0) writev(r4, &(0x7f0000000700), 0x1000000000000110) io_setup(0x4, &(0x7f0000000040)=0x0) flistxattr(r4, &(0x7f0000000380)=""/142, 0xfffffffffffffef4) io_pgetevents(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 20:12:35 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000b1c000/0x1000)=nil}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) dup3(r0, r2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000280)='memory.high\x00', 0x2, 0x0) writev(r4, &(0x7f0000000700), 0x1000000000000110) io_setup(0x4, &(0x7f0000000040)=0x0) flistxattr(r4, &(0x7f0000000380)=""/142, 0xfffffffffffffef4) io_pgetevents(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 20:12:36 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005000)={0x0, r1, 0x0, 0x1, &(0x7f0000004fc0)='\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r5, 0x1, 0x4) r6 = dup2(r4, r2) recvmmsg(r2, &(0x7f0000004bc0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)=""/172, 0xac}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000001c0)=""/177, 0xb1}], 0x3, &(0x7f0000000400)=""/55, 0x37, 0x4}, 0x7c2f454f}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/45, 0x2d}, {&(0x7f0000000480)=""/15, 0xf}, {&(0x7f00000004c0)=""/209, 0xd1}, {&(0x7f00000005c0)=""/21, 0x15}, {&(0x7f0000000600)=""/134, 0x86}], 0x5, &(0x7f0000000740)=""/185, 0xb9, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/92, 0x5c}, {&(0x7f0000000880)=""/112, 0x70}, {&(0x7f0000000900)=""/232, 0xe8}, {&(0x7f0000000a40)=""/221, 0xdd}, {&(0x7f0000000b40)=""/130, 0x82}], 0x5, &(0x7f0000000c80)=""/212, 0xd4, 0x9}, 0x4}, {{&(0x7f0000000d80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/51, 0x33}, {&(0x7f0000000f40)=""/90, 0x5a}], 0x3, &(0x7f0000001000)=""/4096, 0x1000, 0x7}, 0xd9}, {{&(0x7f0000002000)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002080)=""/56, 0x38}, {&(0x7f00000020c0)=""/95, 0x5f}, {&(0x7f0000002140)=""/73, 0x49}, {&(0x7f00000021c0)=""/238, 0xee}, {&(0x7f00000022c0)=""/4096, 0x1000}], 0x5, &(0x7f0000003340)=""/110, 0x6e, 0x1f}, 0xa65}, {{&(0x7f00000033c0)=@nl=@proc, 0x80, &(0x7f0000004680)=[{&(0x7f0000003440)=""/40, 0x28}, {&(0x7f0000003480)}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/226, 0xe2}, {&(0x7f00000045c0)=""/158, 0x9e}], 0x5, 0x0, 0x0, 0x7c}}, {{&(0x7f0000004700)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004780)=""/58, 0x3a}, {&(0x7f00000047c0)=""/186, 0xba}, {&(0x7f0000004880)=""/149, 0x95}, {&(0x7f0000004940)=""/1, 0x1}, {&(0x7f0000004980)=""/13, 0xd}, {&(0x7f00000049c0)=""/111, 0x6f}, {&(0x7f0000004a40)=""/166, 0xa6}], 0x7, &(0x7f0000004b80)=""/56, 0x38}, 0x8}], 0x7, 0x42, &(0x7f0000004dc0)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000004e80)={0x0, 0xa8, "6adc238dd4b2962f17eb2f92d7979794953dab7630c8332cb8f013566a58f38e9e746db6b12bc4ad9e47dbbcf3f52bd8d27a0bb61ee8a6a282d0a194351728ef2690cb2a9db674a4d53d3b4a1388f8a3f984f7d07304fdcb74bcea09e8803eabcde6b6a3c063693ed1aefa1a8443104e882836ab678a57c10f188f59c0011cbad6750eb940adde9590add4e5a7e4bff28e86795eeee4b4982de028748046f056266511e198187270"}, &(0x7f0000004f40)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000004f80)={r9, 0x5}, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000005040)={r0, 0x2, 0x20, r1}) ppoll(&(0x7f0000005080)=[{r8, 0x4731}, {r4, 0xc420}, {r8, 0x2}, {r6, 0x4098}, {r3, 0x88}, {r6, 0x200}], 0x6, &(0x7f00000050c0)={0x77359400}, &(0x7f0000005100)={0xffffffffffffffff}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000003480)={0x77359400}, &(0x7f0000004e40)) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000004e00)={@loopback, r7}, 0x14) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x30}, 0x0) [ 295.514778] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.521322] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.530200] device bridge_slave_0 entered promiscuous mode [ 295.935203] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.941710] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.950417] device bridge_slave_1 entered promiscuous mode [ 296.307814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.656069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 297.481092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.654504] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 297.983649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 298.226560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 298.233878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.613731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 298.620791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.873772] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 299.651953] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.660352] team0: Port device team_slave_0 added [ 300.008078] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.016617] team0: Port device team_slave_1 added [ 300.070595] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 300.078222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.086282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.317529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.324699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.333807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 20:12:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={"62726f75746500888802004c11007a6c0000000000000200", 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) [ 300.649612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 300.656896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.666012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.722409] xt_connbytes: cannot load conntrack support for proto=7 [ 300.728881] xt_connbytes: Forcing CT accounting to be enabled [ 301.008887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 301.016736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.025672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.160446] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.288941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 301.297685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.306847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.405384] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.411903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.418982] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.425514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.433927] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 303.440490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.334566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.081918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.909938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.916462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.924534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.825656] 8021q: adding VLAN 0 to HW filter on device team0 20:12:49 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000200)) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x5385, &(0x7f0000000200)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) 20:12:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x20000) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000006140)=0xe290) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f34"]) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) sched_setscheduler(r1, 0x5, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000006100)={0x1, 0x10, 0xfa00, {&(0x7f0000001900)}}, 0x18) shmctl$SHM_LOCK(0x0, 0xb) [ 310.354272] libceph: parse_ips bad ip '[d::]:6 ,[' [ 310.638401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.966683] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 311.243764] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 311.250012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 311.258014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.535884] 8021q: adding VLAN 0 to HW filter on device team0 20:12:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:12:55 executing program 0: pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005000)={0x0, r1, 0x0, 0x1, &(0x7f0000004fc0)='\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r5, 0x1, 0x4) r6 = dup2(r4, r2) recvmmsg(r2, &(0x7f0000004bc0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)=""/172, 0xac}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000001c0)=""/177, 0xb1}], 0x3, &(0x7f0000000400)=""/55, 0x37, 0x4}, 0x7c2f454f}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/45, 0x2d}, {&(0x7f0000000480)=""/15, 0xf}, {&(0x7f00000004c0)=""/209, 0xd1}, {&(0x7f00000005c0)=""/21, 0x15}, {&(0x7f0000000600)=""/134, 0x86}], 0x5, &(0x7f0000000740)=""/185, 0xb9, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/92, 0x5c}, {&(0x7f0000000880)=""/112, 0x70}, {&(0x7f0000000900)=""/232, 0xe8}, {&(0x7f0000000a40)=""/221, 0xdd}, {&(0x7f0000000b40)=""/130, 0x82}], 0x5, &(0x7f0000000c80)=""/212, 0xd4, 0x9}, 0x4}, {{&(0x7f0000000d80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000e00)=""/197, 0xc5}, {&(0x7f0000000f00)=""/51, 0x33}, {&(0x7f0000000f40)=""/90, 0x5a}], 0x3, &(0x7f0000001000)=""/4096, 0x1000, 0x7}, 0xd9}, {{&(0x7f0000002000)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002080)=""/56, 0x38}, {&(0x7f00000020c0)=""/95, 0x5f}, {&(0x7f0000002140)=""/73, 0x49}, {&(0x7f00000021c0)=""/238, 0xee}, {&(0x7f00000022c0)=""/4096, 0x1000}], 0x5, &(0x7f0000003340)=""/110, 0x6e, 0x1f}, 0xa65}, {{&(0x7f00000033c0)=@nl=@proc, 0x80, &(0x7f0000004680)=[{&(0x7f0000003440)=""/40, 0x28}, {&(0x7f0000003480)}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/226, 0xe2}, {&(0x7f00000045c0)=""/158, 0x9e}], 0x5, 0x0, 0x0, 0x7c}}, {{&(0x7f0000004700)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004780)=""/58, 0x3a}, {&(0x7f00000047c0)=""/186, 0xba}, {&(0x7f0000004880)=""/149, 0x95}, {&(0x7f0000004940)=""/1, 0x1}, {&(0x7f0000004980)=""/13, 0xd}, {&(0x7f00000049c0)=""/111, 0x6f}, {&(0x7f0000004a40)=""/166, 0xa6}], 0x7, &(0x7f0000004b80)=""/56, 0x38}, 0x8}], 0x7, 0x42, &(0x7f0000004dc0)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000004e80)={0x0, 0xa8, "6adc238dd4b2962f17eb2f92d7979794953dab7630c8332cb8f013566a58f38e9e746db6b12bc4ad9e47dbbcf3f52bd8d27a0bb61ee8a6a282d0a194351728ef2690cb2a9db674a4d53d3b4a1388f8a3f984f7d07304fdcb74bcea09e8803eabcde6b6a3c063693ed1aefa1a8443104e882836ab678a57c10f188f59c0011cbad6750eb940adde9590add4e5a7e4bff28e86795eeee4b4982de028748046f056266511e198187270"}, &(0x7f0000004f40)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000004f80)={r9, 0x5}, 0x8) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000005040)={r0, 0x2, 0x20, r1}) ppoll(&(0x7f0000005080)=[{r8, 0x4731}, {r4, 0xc420}, {r8, 0x2}, {r6, 0x4098}, {r3, 0x88}, {r6, 0x200}], 0x6, &(0x7f00000050c0)={0x77359400}, &(0x7f0000005100)={0xffffffffffffffff}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000003480)={0x77359400}, &(0x7f0000004e40)) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000004e00)={@loopback, r7}, 0x14) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x30}, 0x0) 20:12:55 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x681, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x3, 0xa, 0x100, 0x1, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in={{0x2, 0x4e23, @loopback}}, 0x6055, 0x8}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000380)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f00000015c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001580)={&(0x7f00000003c0)={0x11b4, 0x9, 0xb, 0x200, 0x70bd2b, 0x25dfdbfc, {0x3, 0x0, 0x9}, [@nested={0x102c, 0x20, [@generic="a3d601ed3d46bcc9ff8e4551bf35c74711dd7581e583af27063b78cfcc8ea112328e34670ac1ba", @generic="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"]}, @nested={0x16c, 0x50, [@typed={0x8, 0x1d, @uid=r2}, @generic="a47a89ad9a54f1d96fe8b71ae213593aade5", @generic="b871806851dd97db0053cb3dc0b8d723d3daf2945656909e5ebc06f1e299a0e6f67a4459324c", @generic="f5c89358be0b0b599e27ef3f22b3f0a7cd4f2b49cc3a808897b5910246641df9f755aa0f115b7fdf8df22ef0bdae5b12650e8bef7cd28b55f8718b0d4f62bcf6e0da6106a486d33e0b260cee028856916dfb0e52f4cddfa6d40bcf7cc0f6bdc21d8f89355b0444ef5fc0071abc5fde5b6f464d528d09f969145376e99939ea0f6d1695938de7506e50a43cc3aaec6019d6b114304994af1b586069a2ffd6ac9c97465d8c", @generic="4cb0bb335223fb9981d0fdfc1dd09e726f11042ec2b6f6c6c6be6c20d9665e556a4b2f7e70c6f2d26494e567d6a2c9e66473c50e43dd1aaeb1106785ea51c4ad723b799c8a4d5bb0983e9b9d874f415f5f26fc8709532de3f96d51b2d5c6987fdce3a34f29c3c8cba72d3cfd5a9781c0e5b3b26e0f87746370153ef52bad58c8996931"]}, @typed={0x8, 0x2d, @str='\x00'}]}, 0x11b4}, 0x1, 0x0, 0x0, 0x4000}, 0xc800) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001600)={0x5, 0x7c0, 0x1, 0x7ff, 0x8, 0xa39, 0x1a, 0x3a23, r1}, &(0x7f0000001640)=0x20) r3 = semget(0x0, 0x3, 0x10) semctl$GETVAL(r3, 0x3, 0xc, &(0x7f0000001680)=""/75) sendmsg$kcm(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000001700)}, {&(0x7f0000001740)="42c5e3b19664a2ba4970407167674e445b5417e957b1808bace62955960add04ec7f28e0eb31e3621173efeebc06697a4813ffe201d494a582afb5ad5a023d9a304171124204b8b22e701ded90847e48b6e0a26c500331694c8e847c7c04b32b024fe5182732ad688266d21fca7d1925f3b3ea45fa78bad2b6870731d5b2be239a25296a88bdabc324dacad4103a1ad18233aeca49ed9fb9d58397791012141b685694a58678f5dab3d5a06e6f1da4a91dd912726dea818dbc5059a5455c408800e527ea5b0902ee78e075062e6cd81d59ab3f07a3fbe4877a9a2322aedcfde90a61d274f2e0a99f2edc7078e57e65bee9", 0xf1}], 0x2, 0x0, 0x0, 0x20000000}, 0x8000) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000018c0), &(0x7f0000001900)=0x4) r4 = gettid() capset(&(0x7f0000001940)={0x20071026, r4}, &(0x7f0000001980)={0x5, 0xdf, 0x5e4, 0x83a, 0x2, 0x971c}) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000019c0)=""/4096) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x2010, r0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000029c0)={0x2, 0x4e21, @local}, 0x10) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r5 = syz_open_dev$admmidi(&(0x7f0000002a00)='/dev/admmidi#\x00', 0x4, 0x2) ioctl$BLKRRPART(r5, 0x125f, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000002a40)={r1, 0x14000000000000}, 0x8) r6 = perf_event_open(&(0x7f0000002ac0)={0x2, 0x70, 0x80000001, 0x9, 0x1, 0x2d67, 0x0, 0x7, 0x8, 0x8, 0x7f, 0xfff, 0x1, 0x101, 0x1caa, 0x4, 0x5, 0x8, 0x9, 0x7fffffff, 0x4, 0x5, 0xbe0f, 0x3ff, 0xffffffffffffffb1, 0x200, 0x6, 0x8, 0x4, 0x7, 0x7ff, 0x8, 0x5, 0x8000, 0x40, 0xffffffff, 0x0, 0x5, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000002a80), 0x2}, 0x5, 0x2, 0x1, 0xd, 0x4, 0x4, 0x3ff}, r4, 0x1, r5, 0x2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000002b40)={0x3, 0x3, 0x6ef, 0x1, 0x100}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000002b80)={r1, 0x34, "6cd2e3fa4878b9692061e3133ec67bd9e633de4be76e5951565481b7100757b564ba4024c42f7dde88cc996881cd3c243c383e68"}, &(0x7f0000002bc0)=0x3c) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000002c00)={{0x7f, @dev={0xac, 0x14, 0x14, 0x1d}, 0x4e21, 0x0, 'sh\x00', 0x2, 0x7fff, 0x64}, {@local, 0x4e21, 0x3, 0x2, 0x8, 0x9}}, 0x44) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000002c80), &(0x7f0000002cc0)=0x4) ioctl$KVM_GET_MSR_INDEX_LIST(r5, 0xc004ae02, &(0x7f0000002d00)={0x3, [0x0, 0x0, 0x0]}) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000002d40)={0xffffffff00000000, 0xa, 0x0, [{0x2, 0x5, 0x9, 0xb66, 0x9, 0xfffffffffffffffb, 0x3f}, {0x7, 0x6, 0x0, 0x17606862, 0x0, 0x6, 0x401}, {0xfffffffffffffffc, 0xffff, 0x3f, 0x100000000, 0x7fffffff, 0x7, 0x2}, {0x2, 0xfffffffffffffffd, 0x7, 0x2, 0x2, 0x1, 0xfffffffffffffffc}, {0x13e8436d, 0x3f, 0x8, 0x0, 0x9, 0x4, 0x4c5}, {0x8, 0x5, 0xf66, 0x8000, 0x9, 0x28, 0x1}, {0x2, 0x4, 0x7, 0xeb, 0x8001, 0xc, 0x401}, {0x5, 0x5, 0x101, 0xc7, 0xa2, 0x8, 0x80000001}, {0x100000001, 0xfffffffffffffff7, 0x1f, 0x0, 0x5, 0x3}, {0x7f, 0x9, 0x7fffffff, 0x10001, 0x0, 0x1, 0x8}]}) ioctl$VIDIOC_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f0000003000)={0x0, @reserved}) mknodat(r6, &(0x7f00000030c0)='./file0\x00', 0x20, 0xfffffffd) sigaltstack(&(0x7f0000fec000/0x13000)=nil, 0x0) 20:12:55 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000200)) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x5385, &(0x7f0000000200)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) 20:12:55 executing program 1: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='./file1\x00') chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 20:12:55 executing program 3: openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000380)={0xffffffffffffffb3}, 0x4) getitimer(0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 20:12:55 executing program 3: openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000380)={0xffffffffffffffb3}, 0x4) getitimer(0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 20:12:56 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) fstat(0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) getegid() ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 20:12:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x300, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x2000012c, 0x0, 0x0) close(r0) 20:12:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x1000000604044) fcntl$dupfd(r0, 0x0, r1) chdir(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x300, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x2000012c, 0x0, 0x0) close(r2) 20:12:56 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x800, 0x0, 0x2, 0x1}, 0x20) 20:12:56 executing program 3: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000040160000, 0x1a0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) 20:12:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x2c0}], 0x3b6, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) preadv(r0, &(0x7f0000000480), 0x350, 0x0) [ 314.928495] IPVS: ftp: loaded support on port[0] = 21 20:12:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)="6c696d69747300f00b9a3891f4daf3c60010504ae655ed20512446f5772cf09a641ecde3d713bc9c4ab97d8616a7a153634dda238ca47f0de2f76ae91779782395def86eac3676721125d5822d82a6c6afde1e4d905c20b80000000074697ff82aad92c2f67477496c3db69ff4a2cb70f942808c595e2edae93b29f4349878768c534cdc7427a6d290f13bc3763473b7e1116eb04bae939c2c6adea0df46d88260916d9daa") preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 317.295230] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.301757] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.310118] device bridge_slave_0 entered promiscuous mode [ 317.388732] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.395302] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.403719] device bridge_slave_1 entered promiscuous mode [ 317.477961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 317.553794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 317.782500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 317.863071] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 317.946958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 317.954115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.029711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 318.036756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.263148] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 318.270726] team0: Port device team_slave_0 added [ 318.347322] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 318.354972] team0: Port device team_slave_1 added [ 318.429244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.510436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.588490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 318.595970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.605076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.681533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 318.688922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.698085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.529797] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.536270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.543396] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.549917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.558850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 319.965307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.642401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.925004] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 323.207158] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 323.213525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.221248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.504114] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.303320] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 20:13:07 executing program 5: 20:13:07 executing program 1: 20:13:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x2c0}], 0x3b6, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) preadv(r0, &(0x7f0000000480), 0x350, 0x0) 20:13:07 executing program 3: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000040160000, 0x1a0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) 20:13:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)="6c696d69747300f00b9a3891f4daf3c60010504ae655ed20512446f5772cf09a641ecde3d713bc9c4ab97d8616a7a153634dda238ca47f0de2f76ae91779782395def86eac3676721125d5822d82a6c6afde1e4d905c20b80000000074697ff82aad92c2f67477496c3db69ff4a2cb70f942808c595e2edae93b29f4349878768c534cdc7427a6d290f13bc3763473b7e1116eb04bae939c2c6adea0df46d88260916d9daa") preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:13:07 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) fstat(0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) getegid() ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 20:13:07 executing program 1: 20:13:07 executing program 5: r0 = socket$inet6(0xa, 0x80803, 0x2) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) 20:13:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x333b}, 0x4) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x30e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:13:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000100)="07bdfceed30a61577666c70e36f1", 0xe, 0x0, 0x0, 0x0) 20:13:08 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@sco, &(0x7f0000000180)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0xd5, 0x20}, &(0x7f0000000200)=0xc) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000440)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x2, r4, 0x1c, 0x1, @ib={0x1b, 0x0, 0x0, {"9c4285d93dfd4cd358e174ed3071fee9"}, 0x0, 0x4, 0x5}}}, 0xa0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r5, &(0x7f0000000a40), 0x400000000000038, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x5385, &(0x7f0000000200)) syz_open_dev$admmidi(0x0, 0xcb, 0x10000) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3b0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) 20:13:08 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000100)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') preadv(r0, &(0x7f0000000100), 0x2a2, 0x10400003) 20:13:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000080)={0x0, 0x80, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000006c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:13:09 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:09 executing program 2: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x14ce, &(0x7f0000000140)) [ 327.057164] libceph: parse_ips bad ip '[d::] [ 327.057164] 0 ,[' 20:13:09 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) read(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 327.138598] libceph: parse_ips bad ip '[d::] [ 327.138598] 0 ,[' [ 327.400929] libceph: parse_ips bad ip '[d::] [ 327.400929] 0 ,[' 20:13:09 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x28) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @local, @ipv4={[], [], @dev}, 0xffffffffffffffff, 0x0, 0x0, 0x1a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 20:13:09 executing program 2: syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @empty=[0x100000000000b00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x228, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x34, 0x0, 0x0, 0x0, [{}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:13:09 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000680)={@broadcast, @dev, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xe, @dev={[], 0xa}, @remote, @dev={[], 0x16}, @multicast2}}}}, &(0x7f00000006c0)={0x1, 0x2, [0xefb, 0x607, 0x865, 0x2f6]}) 20:13:09 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 327.694322] ptrace attach of "/root/syz-executor0"[8533] was attempted by "/root/syz-executor0"[8534] 20:13:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)="6c696d69747300f00b9a3891f4daf3c60010504ae655ed20512446f5772cf09a641ecde3d713bc9c4ab97d8616a7a153634dda238ca47f0de2f76ae91779782395def86eac3676721125d5822d82a6c6afde1e4d905c20b80000000074697ff82aad92c2f67477496c3db69ff4a2cb70f942808c595e2edae93b29f4349878768c534cdc7427a6d290f13bc3763473b7e1116eb04bae939c2c6adea0df46d88260916d9daa") preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 327.923604] libceph: parse_ips bad ip '[d::] [ 327.923604] 0 ,[' 20:13:10 executing program 5: 20:13:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) write$P9_RREAD(r0, &(0x7f0000000180)={0xb4, 0x75, 0x2, {0xa9, "8ac0bdb867f87f96d0aeb3d10d98243e9022afd5d370be84ad55aa36a84969aef487a6e9aedb7fd4799443ac201792d2ee96f8198e1015a281ff9c21edce8f52a68f42a267ddea5e83eec24d8e977480fc81a6383cdfefbafbb155d01e179268ff4c1ff151895aafe42834a0d7f4d1f4924dd011d02461879f8c61374727fbb28f0fd68f9b2898d86cf0163e552cfac024c294eb9d0979ca9c041286041bca65e216b5707b0e8731c8"}}, 0xb4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) fcntl$addseals(r0, 0x409, 0x8) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 20:13:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001080)=[{&(0x7f0000000540), 0x7ffff000, &(0x7f0000000740), 0x9f, &(0x7f0000000a80)}], 0x153, 0x0) 20:13:10 executing program 2: 20:13:10 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:10 executing program 2: 20:13:10 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 328.340593] libceph: parse_ips bad ip '[d::] [ 328.340593] 0 ,[' [ 328.522602] libceph: parse_ips bad ip '[d::] [ 328.522602] 0 ,[' 20:13:10 executing program 5: io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r0, 0x0, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0xffffffffc0000001, 0x0, &(0x7f0000000000), 0x45, 0x2) 20:13:10 executing program 4: clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4000, 0x0) semget(0x0, 0x0, 0x0) 20:13:11 executing program 4: mkdir(0x0, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:11 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r4 = socket(0x1e, 0x4, 0x0) sendmmsg(r4, &(0x7f0000000a40), 0x400000000000038, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$admmidi(0x0, 0xcb, 0x10000) 20:13:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)="6c696d69747300f00b9a3891f4daf3c60010504ae655ed20512446f5772cf09a641ecde3d713bc9c4ab97d8616a7a153634dda238ca47f0de2f76ae91779782395def86eac3676721125d5822d82a6c6afde1e4d905c20b80000000074697ff82aad92c2f67477496c3db69ff4a2cb70f942808c595e2edae93b29f4349878768c534cdc7427a6d290f13bc3763473b7e1116eb04bae939c2c6adea0df46d88260916d9daa") preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:13:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) write$P9_RREAD(r0, &(0x7f0000000180)={0xb4, 0x75, 0x2, {0xa9, "8ac0bdb867f87f96d0aeb3d10d98243e9022afd5d370be84ad55aa36a84969aef487a6e9aedb7fd4799443ac201792d2ee96f8198e1015a281ff9c21edce8f52a68f42a267ddea5e83eec24d8e977480fc81a6383cdfefbafbb155d01e179268ff4c1ff151895aafe42834a0d7f4d1f4924dd011d02461879f8c61374727fbb28f0fd68f9b2898d86cf0163e552cfac024c294eb9d0979ca9c041286041bca65e216b5707b0e8731c8"}}, 0xb4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) fcntl$addseals(r0, 0x409, 0x8) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 20:13:11 executing program 5: io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r0, 0x0, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0xffffffffc0000001, 0x0, &(0x7f0000000000), 0x45, 0x2) 20:13:11 executing program 2: 20:13:11 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:11 executing program 2: 20:13:12 executing program 5: [ 330.049764] libceph: parse_ips bad ip '[d::] [ 330.049764] 0 ,[' 20:13:12 executing program 2: 20:13:12 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r4 = socket(0x1e, 0x4, 0x0) sendmmsg(r4, &(0x7f0000000a40), 0x400000000000038, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$admmidi(0x0, 0xcb, 0x10000) 20:13:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)="6c696d69747300f00b9a3891f4daf3c60010504ae655ed20512446f5772cf09a641ecde3d713bc9c4ab97d8616a7a153634dda238ca47f0de2f76ae91779782395def86eac3676721125d5822d82a6c6afde1e4d905c20b80000000074697ff82aad92c2f67477496c3db69ff4a2cb70f942808c595e2edae93b29f4349878768c534cdc7427a6d290f13bc3763473b7e1116eb04bae939c2c6adea0df46d88260916d9daa") preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:13:12 executing program 2: 20:13:12 executing program 5: 20:13:12 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:13 executing program 3: 20:13:13 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 20:13:13 executing program 2: 20:13:13 executing program 5: 20:13:13 executing program 0: 20:13:13 executing program 1: 20:13:13 executing program 2: 20:13:13 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]\n0\t,[:\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 20:13:13 executing program 5: 20:13:13 executing program 1: 20:13:13 executing program 0: 20:13:13 executing program 3: 20:13:13 executing program 2: 20:13:13 executing program 4: 20:13:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000dabea72ca2626d3441"], 0x0, &(0x7f0000000000)='vfat\x00', 0x0, 0x0) 20:13:14 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:13:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002200000007000000000e00009500004000000000"], 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x6e, 0x0, &(0x7f0000000380)="e46001923406080000000a9b86dd6a00000000072febb056601b9056115082553800810000000000e8d50000000100000034000000002089880bd320d98a7bf542832f8d00570436dca4043cf42e1d15558cbea746006dbaf166ad47272b32d85778c93f38836e2bccdabeb33ee5", 0x0, 0xea78}, 0x28) 20:13:14 executing program 0: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) removexattr(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) 20:13:14 executing program 2: syz_open_dev$loop(&(0x7f0000002a80)='/dev/loop#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, 0x0, &(0x7f0000000380)) r2 = syz_open_dev$loop(0x0, 0x0, 0x2800) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) fchdir(0xffffffffffffffff) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000540)) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x100, 0x3, 0x5, 0x0, 0x5, 0x3}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 20:13:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2a2, 0x10400003) 20:13:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540f, 0x0) [ 332.594648] sctp: failed to load transform for md5: -2 20:13:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x10) readv(r1, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000000280)={0x14, 0x20, 0xaff, 0x0, 0x0, {0x3803}}, 0x14}}, 0x0) 20:13:14 executing program 2: r0 = memfd_create(&(0x7f0000000080)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x444, &(0x7f0000000000)=[{}]}, 0x10) 20:13:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getdents64(r0, &(0x7f0000000200)=""/116, 0x184) 20:13:15 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = socket(0x10, 0xa, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x3d, &(0x7f0000164ff0)={0x0, &(0x7f0000000080)}, 0x8) r4 = syz_open_dev$admmidi(&(0x7f00000012c0)='/dev/admmidi#\x00', 0x2, 0x150d1c6b1b09fa8f) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001300)={0x0, 0x7fffffff}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000001740)={r5, @in6={{0xa, 0x4e21, 0x5, @ipv4={[], [], @loopback}, 0x2}}, 0x100}, 0x88) rt_sigprocmask(0x1, &(0x7f0000000440)={0x3}, &(0x7f00000006c0), 0xffffffffffffffdc) recvfrom$unix(r3, &(0x7f0000000300)=""/121, 0x79, 0x10002, &(0x7f0000000640)=@abs={0x0, 0x0, 0x4e21}, 0x6e) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000700), 0x4) sendto$inet(r4, &(0x7f00000008c0)="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", 0x123, 0x1, 0x0, 0x0) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) fcntl$setsig(r2, 0xa, 0x6) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e24}}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000001340)=@broute={'broute\x00', 0x20, 0x3, 0x921, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f00000003c0), &(0x7f0000002140)=ANY=[@ANYBLOB="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"]}, 0x999) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x1, 0x200b, 0x2, 0x1, r2, 0x400}, 0x2c) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r7, &(0x7f0000000000), 0x0}, 0x20) ustat(0x100000401, &(0x7f0000000780)) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000480)={0x4, &(0x7f00000002c0)=[{0xa, 0x35ff, 0x5}, {0x6, 0x5, 0x6, 0x8007}, {0xffffffff00000001, 0xff, 0xd8, 0x101}, {0x4, 0x4, 0x7, 0x4}]}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r7, &(0x7f0000000000), 0x0}, 0x18) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) 20:13:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$xdp(0x2c, 0x3, 0x0) r1 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000300)=' ', 0x1, 0x0, 0x0, 0x0) 20:13:15 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) keyctl$dh_compute(0x19, &(0x7f0000000600), &(0x7f00000003c0)=""/107, 0x6b, 0x0) 20:13:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2a2, 0x10400003) [ 333.277838] kernel msg: ebtables bug: please report to author: entries_size too small [ 333.369408] ================================================================== [ 333.376844] BUG: KMSAN: uninit-value in keyctl_pkey_params_get+0x29c/0x7d0 [ 333.383896] CPU: 1 PID: 8742 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #96 [ 333.391102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.393715] kernel msg: ebtables bug: please report to author: entries_size too small [ 333.400471] Call Trace: [ 333.400509] dump_stack+0x32d/0x480 [ 333.400536] ? keyctl_pkey_params_get+0x29c/0x7d0 [ 333.400582] kmsan_report+0x12c/0x290 [ 333.400635] __msan_warning+0x76/0xc0 [ 333.427260] keyctl_pkey_params_get+0x29c/0x7d0 [ 333.431990] keyctl_pkey_params_get_2+0x256/0x650 [ 333.436888] keyctl_pkey_e_d_s+0x122/0x700 [ 333.441179] __se_sys_keyctl+0xed6/0x1af0 [ 333.445366] ? prepare_exit_to_usermode+0x182/0x4c0 [ 333.450425] ? syscall_return_slowpath+0xed/0x730 [ 333.455311] ? __msan_get_context_state+0x9/0x20 [ 333.460102] __x64_sys_keyctl+0x62/0x80 [ 333.464104] do_syscall_64+0xcf/0x110 [ 333.467933] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.473138] RIP: 0033:0x457569 [ 333.476346] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.495264] RSP: 002b:00007fae450afc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 333.502998] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 333.510298] RDX: 00000000200003c0 RSI: 0000000020000600 RDI: 0000000000000019 [ 333.517585] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 333.524882] R10: 000000000000006b R11: 0000000000000246 R12: 00007fae450b06d4 [ 333.532173] R13: 00000000004c286f R14: 00000000004d4258 R15: 00000000ffffffff [ 333.539480] [ 333.541153] Local variable description: ----args.i@keyctl_pkey_params_get [ 333.548100] Variable was created at: [ 333.551855] keyctl_pkey_params_get+0xaa/0x7d0 [ 333.556465] keyctl_pkey_params_get_2+0x256/0x650 [ 333.561320] ================================================================== [ 333.568686] Disabling lock debugging due to kernel taint [ 333.574142] Kernel panic - not syncing: panic_on_warn set ... [ 333.580042] CPU: 1 PID: 8742 Comm: syz-executor4 Tainted: G B 4.20.0-rc3+ #96 [ 333.588637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.597996] Call Trace: [ 333.600639] dump_stack+0x32d/0x480 [ 333.604325] panic+0x624/0xc08 [ 333.607585] kmsan_report+0x28a/0x290 [ 333.611444] __msan_warning+0x76/0xc0 [ 333.615272] keyctl_pkey_params_get+0x29c/0x7d0 [ 333.620024] keyctl_pkey_params_get_2+0x256/0x650 [ 333.624911] keyctl_pkey_e_d_s+0x122/0x700 [ 333.629186] __se_sys_keyctl+0xed6/0x1af0 [ 333.633367] ? prepare_exit_to_usermode+0x182/0x4c0 [ 333.638427] ? syscall_return_slowpath+0xed/0x730 [ 333.643307] ? __msan_get_context_state+0x9/0x20 [ 333.648101] __x64_sys_keyctl+0x62/0x80 [ 333.652110] do_syscall_64+0xcf/0x110 [ 333.655933] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.661131] RIP: 0033:0x457569 [ 333.664342] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.683426] RSP: 002b:00007fae450afc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 333.691150] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 333.698470] RDX: 00000000200003c0 RSI: 0000000020000600 RDI: 0000000000000019 [ 333.705763] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 333.713085] R10: 000000000000006b R11: 0000000000000246 R12: 00007fae450b06d4 [ 333.720366] R13: 00000000004c286f R14: 00000000004d4258 R15: 00000000ffffffff [ 333.728623] Kernel Offset: disabled [ 333.732265] Rebooting in 86400 seconds..