[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.555113][ T27] audit: type=1800 audit(1556705523.416:25): pid=7744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.591786][ T27] audit: type=1800 audit(1556705523.416:26): pid=7744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.633873][ T27] audit: type=1800 audit(1556705523.416:27): pid=7744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.86' (ECDSA) to the list of known hosts. 2019/05/01 10:12:18 fuzzer started 2019/05/01 10:12:21 dialing manager at 10.128.0.26:34869 2019/05/01 10:12:21 syscalls: 2440 2019/05/01 10:12:21 code coverage: enabled 2019/05/01 10:12:21 comparison tracing: enabled 2019/05/01 10:12:21 extra coverage: extra coverage is not supported by the kernel 2019/05/01 10:12:21 setuid sandbox: enabled 2019/05/01 10:12:21 namespace sandbox: enabled 2019/05/01 10:12:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 10:12:21 fault injection: enabled 2019/05/01 10:12:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 10:12:21 net packet injection: enabled 2019/05/01 10:12:21 net device setup: enabled 10:13:59 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) read(r0, &(0x7f0000000140)=""/103, 0x67) sendto(r0, &(0x7f0000000080)='\"', 0x1, 0x0, 0x0, 0x0) syzkaller login: [ 154.389002][ T7908] IPVS: ftp: loaded support on port[0] = 21 10:13:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="b1f291cd806969ef69dc00d94c2c39fd64663e6ec40269aad61cc1585c5cf4a957f9420f66420f38074cf09558165dbbc48192128dc3c36645bd400fbee4de730fc4a1e5e9bcc50400000001fea730aea36e646736662e66470f380841060804f4") [ 154.494134][ T7908] chnl_net:caif_netlink_parms(): no params data found [ 154.564196][ T7908] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.571597][ T7908] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.584138][ T7908] device bridge_slave_0 entered promiscuous mode [ 154.602953][ T7908] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.610062][ T7908] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.632925][ T7908] device bridge_slave_1 entered promiscuous mode [ 154.656342][ T7908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.666474][ T7908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.695343][ T7908] team0: Port device team_slave_0 added 10:13:59 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') fcntl$setlease(r0, 0x400, 0x0) sendfile(r1, r2, 0x0, 0x80000001) [ 154.702971][ T7908] team0: Port device team_slave_1 added [ 154.716299][ T7911] IPVS: ftp: loaded support on port[0] = 21 [ 154.835319][ T7908] device hsr_slave_0 entered promiscuous mode 10:13:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) socket$can_bcm(0x1d, 0x2, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) unshare(0x40000000) [ 154.882402][ T7908] device hsr_slave_1 entered promiscuous mode [ 154.957755][ T7913] IPVS: ftp: loaded support on port[0] = 21 [ 154.996725][ T7908] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.003950][ T7908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.011557][ T7908] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.018657][ T7908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.131997][ T7916] IPVS: ftp: loaded support on port[0] = 21 10:14:00 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) r0 = open(0x0, 0x0, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) [ 155.236717][ T7913] chnl_net:caif_netlink_parms(): no params data found [ 155.294131][ T7908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.361448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.384732][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.403884][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.412602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 155.427307][ T7908] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.451213][ T7913] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.458958][ T7913] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.467140][ T7913] device bridge_slave_0 entered promiscuous mode [ 155.488141][ T7920] IPVS: ftp: loaded support on port[0] = 21 [ 155.496524][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.505670][ T7921] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.512796][ T7921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.520589][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.530908][ T7921] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.538007][ T7921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.553011][ T7911] chnl_net:caif_netlink_parms(): no params data found 10:14:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/103, 0x67}], 0x1, 0x1f000000) [ 155.565049][ T7913] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.573708][ T7913] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.581637][ T7913] device bridge_slave_1 entered promiscuous mode [ 155.599343][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.610488][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.668435][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.677927][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.686854][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.717084][ T7913] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.727891][ T7913] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.750009][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.759034][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.767212][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.775588][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.814551][ T7913] team0: Port device team_slave_0 added [ 155.821630][ T7913] team0: Port device team_slave_1 added [ 155.829355][ T7908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.848136][ T7911] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.856628][ T7911] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.866792][ T7911] device bridge_slave_0 entered promiscuous mode [ 155.874867][ T7911] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.881933][ T7911] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.889917][ T7911] device bridge_slave_1 entered promiscuous mode [ 155.908008][ T7924] IPVS: ftp: loaded support on port[0] = 21 [ 155.966923][ T7911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.983806][ T7911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.045220][ T7913] device hsr_slave_0 entered promiscuous mode [ 156.112275][ T7913] device hsr_slave_1 entered promiscuous mode [ 156.179269][ T7916] chnl_net:caif_netlink_parms(): no params data found [ 156.209276][ T7911] team0: Port device team_slave_0 added [ 156.219621][ T7911] team0: Port device team_slave_1 added [ 156.305256][ T7911] device hsr_slave_0 entered promiscuous mode [ 156.362542][ T7911] device hsr_slave_1 entered promiscuous mode [ 156.442926][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.450030][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.458780][ T7916] device bridge_slave_0 entered promiscuous mode [ 156.467841][ T7908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.513584][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.520661][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.529385][ T7916] device bridge_slave_1 entered promiscuous mode [ 156.554074][ T7916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.591647][ T7920] chnl_net:caif_netlink_parms(): no params data found [ 156.610864][ T7916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.637651][ T7916] team0: Port device team_slave_0 added [ 156.678216][ T7916] team0: Port device team_slave_1 added [ 156.784177][ T7920] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.791262][ T7920] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.800999][ T7920] device bridge_slave_0 entered promiscuous mode [ 156.848292][ T7924] chnl_net:caif_netlink_parms(): no params data found [ 156.906448][ T7916] device hsr_slave_0 entered promiscuous mode [ 156.962574][ T7916] device hsr_slave_1 entered promiscuous mode [ 157.002579][ T7920] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.009669][ T7920] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.017922][ T7920] device bridge_slave_1 entered promiscuous mode [ 157.053784][ T7920] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.063970][ T7920] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.120260][ T7911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.138365][ T7924] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.145670][ T7924] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.154076][ T7924] device bridge_slave_0 entered promiscuous mode [ 157.169987][ T7920] team0: Port device team_slave_0 added [ 157.177442][ T7920] team0: Port device team_slave_1 added [ 157.188749][ T7924] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.197313][ T7924] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.207235][ T7924] device bridge_slave_1 entered promiscuous mode [ 157.230283][ T7924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.255873][ T7913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.275834][ T7924] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.302954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.310565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.325970][ T7911] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.374819][ T7920] device hsr_slave_0 entered promiscuous mode [ 157.412314][ T7920] device hsr_slave_1 entered promiscuous mode [ 157.461923][ T7924] team0: Port device team_slave_0 added [ 157.470524][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.478434][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.502903][ T7913] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.513872][ T7924] team0: Port device team_slave_1 added [ 157.528094][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.537757][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.546311][ T2909] bridge0: port 1(bridge_slave_0) entered blocking state 10:14:02 executing program 0: [ 157.553366][ T2909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.563067][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.572700][ T2909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.581094][ T2909] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.588199][ T2909] bridge0: port 2(bridge_slave_1) entered forwarding state 10:14:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000a40), 0x4) 10:14:02 executing program 0: clone(0x4000000, &(0x7f0000000040), 0x0, &(0x7f0000000140), &(0x7f0000000340)="61e3225f034f3d9f80fd54fba49c7a7763cbbe1b9863632c41d00e5c65e40596a62ab3a9d14685840161874e950c554aca758e6c696a1d2e960e339752c77e3c714a3825738583b43f7f44203f333dc962f352f1f8f2094aa38a78fc5a526ffe198ba287ef0af8886a0700711c37194993cb372fc6bce1310284e6f489c0b51f21105d8402eba86a4131d157a7e70af1043d42d89ee303f1c43c31fe12b444ef365c76c47f9e9655365ed3da2cb9d5ff6f1414") [ 157.669458][ T7924] device hsr_slave_0 entered promiscuous mode 10:14:02 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, 0x0) 10:14:02 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) personality(0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xffffff90) ftruncate(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) set_thread_area(0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$team(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\x00', 0x0) [ 157.718957][ T7924] device hsr_slave_1 entered promiscuous mode [ 157.806315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.820494][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.829849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.838427][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.845557][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 10:14:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040), 0x4) [ 157.860032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.869075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.877999][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.890372][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.900153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.910133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.918720][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.925838][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 10:14:02 executing program 0: pause() syz_execute_func(&(0x7f0000000a80)="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") [ 157.970759][ T7916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.980588][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.991868][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.001364][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.015580][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.024494][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.033419][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.041620][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.050171][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.058700][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.073053][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.084193][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.102841][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.118607][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.129692][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.138658][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.147489][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.155976][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.182364][ T7911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.214578][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.223428][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.239485][ T7916] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.255506][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.264171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.271715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.310503][ T7911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.322682][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.331843][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.342582][ T7921] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.349690][ T7921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.357774][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.366309][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.375321][ T7921] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.382447][ T7921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.390645][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.418885][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.429380][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.443282][ T7924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.454989][ T7920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.467854][ T7913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.491296][ T7924] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.500838][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.510972][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.519985][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.539965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.564689][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.573541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.581610][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.591422][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.599684][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:14:03 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)=ANY=[@ANYRESOCT], 0x17) [ 158.626088][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.641619][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.657763][ T7915] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.664894][ T7915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.665696][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.681131][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.689706][ T7915] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.696812][ T7915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.705997][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.713944][ T7915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.752880][ T7920] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.759855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.771546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.782484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.791233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.804476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.813349][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.821748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.830204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.838676][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.847592][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.856121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.864892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.873310][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.882933][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:14:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BLKALIGNOFF(r1, 0x127a, 0x0) [ 158.956974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.974914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.990594][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.997754][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.027370][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.036256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.045347][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.052473][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.061646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.080274][ T7924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.091772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.103596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.130328][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.141537][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.150978][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.161079][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.170409][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.179256][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.188300][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.208772][ T7916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.225743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.234942][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.263197][ T7920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.323213][ T7920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.542980][ C0] hrtimer: interrupt took 47402 ns [ 159.630052][ T8021] IPVS: ftp: loaded support on port[0] = 21 [ 159.696274][ T8023] IPVS: ftp: loaded support on port[0] = 21 [ 159.919223][ T8025] IPVS: ftp: loaded support on port[0] = 21 [ 161.687067][ T8028] IPVS: ftp: loaded support on port[0] = 21 10:14:08 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000012c0)=0x80000001) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x892, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0x0) 10:14:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) socket$can_bcm(0x1d, 0x2, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) unshare(0x40000000) 10:14:08 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000680)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r1) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 10:14:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0xffffffb5) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:14:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4080aebf, &(0x7f00000000c0)={0x0, 0x600000000000000, [], [0xc2]}) 10:14:08 executing program 4: socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) r0 = open(0x0, 0x0, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) [ 163.347101][ T8034] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 10:14:08 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='romfs\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 163.479217][ T8044] IPVS: ftp: loaded support on port[0] = 21 10:14:08 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$RTC_WKALM_SET(r0, 0x7001, 0x0) 10:14:08 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040), 0x10) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x6, 0x3, 0x0, 0x0, 0x9, 0x4, 0x9, 0x5e, 0x80000000, 0x3, 0x5, 0x9, 0xfffffffffffffff8, 0x2, 0x0, 0x0, 0x9, 0x3, 0x8, 0x2, 0x0, 0x0, 0x5, 0x6fe, 0x9, 0x1, 0x8, 0x1000, 0x348, 0x0, 0x9, 0xfffffffffffffff7, 0x0, 0x7, 0x2, 0x0, 0x3, 0x4, @perf_config_ext={0x85, 0x3}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff8, 0x6}, r0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0xe) pipe2(&(0x7f0000000080), 0x80000) sendfile(r1, r1, &(0x7f0000000000), 0x401) fcntl$setstatus(r1, 0x4, 0x44000) 10:14:08 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$RTC_WKALM_SET(r0, 0x7001, 0x0) 10:14:08 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x10000000000) fstat(0xffffffffffffff9c, &(0x7f0000000880)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0000000000000000faff070000ee8b08b7960ff7aa6e041c7700fdf0058058aa0063b8f24252b1d85cbf1d0000000038f70f653f0ffb09f0d536b564df5e0a9e0e09251d3534da91b5b9fb501e1ab8bfff01000063e232b9b2500fb1d96033ccfdff0664cffcf15c937d1aa65d6b9917694df4616dc0e90ee3ccd44758f0c6e5591505091f60c360c09df5658ba53071461fe70cd72eb04e3079e4765fc04301a86f2cfed0bbf9d52fc19dd06bee71535dc608d068156d991f79125e1994cc686e0539e1c6519c6c0de67b21ec0d3b956fb5756e4deadf01d044fc1b1091933653539af7fef0bfd909d97912c5ae513d9fb72cdfbb420948a73104e396c41ea3ff557d77367039b41ca8f60e51d0f5c485ffe9efa063c7b08c89b6be7ebcbbb88487fed182943c2f87259049fa93dc84afb9a314d2459b31712596cf271e38a0b59e42f87cd17ca423660fba26c1694112f6a276cda961"], 0x157) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000700)={0x6, 0x100, 0x7f}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 10:14:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0xb) [ 165.099127][ T8070] syz-executor.5 (8070) used greatest stack depth: 22896 bytes left 10:14:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) socket$can_bcm(0x1d, 0x2, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) unshare(0x40000000) 10:14:10 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040), 0x10) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x6, 0x3, 0x0, 0x0, 0x9, 0x4, 0x9, 0x5e, 0x80000000, 0x3, 0x5, 0x9, 0xfffffffffffffff8, 0x2, 0x0, 0x0, 0x9, 0x3, 0x8, 0x2, 0x0, 0x0, 0x5, 0x6fe, 0x9, 0x1, 0x8, 0x1000, 0x348, 0x0, 0x9, 0xfffffffffffffff7, 0x0, 0x7, 0x2, 0x0, 0x3, 0x4, @perf_config_ext={0x85, 0x3}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff8, 0x6}, r0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0xe) pipe2(&(0x7f0000000080), 0x80000) sendfile(r1, r1, &(0x7f0000000000), 0x401) fcntl$setstatus(r1, 0x4, 0x44000) 10:14:10 executing program 1: 10:14:10 executing program 0: 10:14:10 executing program 2: 10:14:10 executing program 5: 10:14:10 executing program 1: 10:14:10 executing program 2: 10:14:10 executing program 5: getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) connect$rds(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x400000000000011, 0x2000000000000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\xff\xff\xff\xc3`\x00'}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03t\x02\xff', 0x4bfd}) 10:14:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') pread64(r0, &(0x7f0000000140)=""/8, 0xfffffeee, 0x200000) 10:14:10 executing program 1: pause() syz_execute_func(&(0x7f0000000700)="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") 10:14:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000200)='5', 0x1, 0x8001, 0x0, 0x0) [ 166.040749][ T8115] device team0 entered promiscuous mode [ 166.052580][ T8115] device team_slave_0 entered promiscuous mode [ 166.059090][ T8115] device team_slave_1 entered promiscuous mode [ 166.068183][ T8115] 8021q: adding VLAN 0 to HW filter on device team0 10:14:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) socket$can_bcm(0x1d, 0x2, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) unshare(0x40000000) 10:14:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000180)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'bond0\x00\x00 \x00 \x00\x00\x00/\x98\x00', @ifru_names='bond_slave_1\x00'}) 10:14:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0xd000000) 10:14:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x4, 0x0, 0x0) 10:14:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) flock(0xffffffffffffffff, 0x9) 10:14:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, 0x0) [ 167.578954][ T8132] bond0: Releasing backup interface bond_slave_1 10:14:12 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x10000000077fffe, 0x0, 0x720000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0)="cf", 0x0, 0x1}, 0x20) 10:14:12 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3f5552a) clone(0x2100001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="410f01f964ff0941c3c4e2c99758423e46d873123e400fc7253b5e000066420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xb102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0), 0xfd65) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="b4e73da68991c5286b77e96ab4774469", 0x10) write$P9_RMKDIR(r2, 0x0, 0x0) utime(&(0x7f0000000100)='./file0\x00', 0x0) 10:14:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sync_file_range(r0, 0x0, 0x0, 0x2) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0xffffffd6) creat(0x0, 0x124) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r0, r1}) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0xffff) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, 0x0, 0x88) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) 10:14:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r4, 0x0, 0x0, 0x80020003ffc, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$EVIOCGEFFECTS(r2, 0x80044584, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 10:14:12 executing program 1: gettid() semget$private(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) umount2(0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) tkill(0x0, 0x15) 10:14:12 executing program 1: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) [ 168.022563][ T8141] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.038429][ T8142] IPVS: ftp: loaded support on port[0] = 21 [ 168.119238][ T8141] bond0: Error: Device is in use and cannot be enslaved [ 168.143165][ T8132] bond0: Releasing backup interface bond_slave_1 [ 168.180121][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 168.180135][ T27] audit: type=1800 audit(1556705653.036:31): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16576 res=0 10:14:13 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000400)=0x40, 0x4) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000900)=@generic) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000680)={0x7}, 0xffffff50) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2e, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000001c0)={'gretap0\x00', {0x2, 0x0, @broadcast}}) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000740)='\xe5&\x00', 0xfffffffffffffffc) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RSTATu(r3, &(0x7f0000000380)=ANY=[], 0x0) fdatasync(r3) 10:14:13 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xf8, 0x0) close(r0) 10:14:13 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3f5552a) clone(0x2100001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="410f01f964ff0941c3c4e2c99758423e46d873123e400fc7253b5e000066420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0), 0xfd65) r2 = dup2(r1, r1) write$P9_RMKDIR(r2, 0x0, 0x0) utime(&(0x7f0000000100)='./file0\x00', 0x0) 10:14:13 executing program 4: semget$private(0x0, 0x3, 0x220) 10:14:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000000c0)={0x80000000000007b, 0x600000000000000, [0x0, 0x0, 0x400000b0], [0xc2]}) 10:14:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, &(0x7f0000001200)) 10:14:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) 10:14:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) timerfd_create(0x7, 0x0) 10:14:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)='h', 0x1, 0x40080, 0x0, 0x0) 10:14:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000000c0)={0x80000000000007b, 0x600000000000000, [0x0, 0x0, 0x10a], [0xc2]}) 10:14:13 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000380)="fcea6d3695", 0x5}], 0x1, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x80900}], 0x1000000000000013) 10:14:13 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000001200)) 10:14:13 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:14 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)={0x7, 0x1f}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000005c0)={0x1, 0x2, 'client0\x00', 0x4, "01ee703c0b4babb8", "b811ff0c6e3b92b0f2ff316dd7514d4c7111f0e20c0b8775ccb40c648cbb7414", 0x0, 0x200}) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x142) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 10:14:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_group_source_req(r1, 0x0, 0x12, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @local}}}, 0x108) 10:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r0 = socket(0x400000000000011, 0x2000000000000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03t\x02\xff', 0x4bfd}) 10:14:14 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x2, [@dev, @broadcast]}, 0x18) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@multicast2, @loopback, @broadcast=0xac141400}, 0xc) 10:14:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x2, 0x0, 0x0, {0x0, 0x989680}}) 10:14:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/103, 0x67}], 0x1, 0x1f000000) 10:14:14 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000380)="2ad51d457df1374499166465c8c33920", 0x10, 0x8000, 0x0, 0x0) 10:14:14 executing program 4: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x310, 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x0, 0x0) 10:14:14 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) [ 170.028084][ T8244] device team0 entered promiscuous mode [ 170.064217][ T8244] device team_slave_0 entered promiscuous mode 10:14:14 executing program 2: [ 170.098135][ T8244] device team_slave_1 entered promiscuous mode [ 170.148092][ T8244] 8021q: adding VLAN 0 to HW filter on device team0 10:14:15 executing program 1: 10:14:15 executing program 5: [ 170.528102][ T8244] device team0 left promiscuous mode [ 170.534536][ T8244] device team_slave_0 left promiscuous mode [ 170.540896][ T8244] device team_slave_1 left promiscuous mode 10:14:15 executing program 0: 10:14:15 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) 10:14:15 executing program 2: 10:14:15 executing program 1: 10:14:15 executing program 5: 10:14:15 executing program 4: 10:14:15 executing program 5: 10:14:15 executing program 1: 10:14:15 executing program 2: 10:14:15 executing program 4: 10:14:15 executing program 0: 10:14:15 executing program 1: 10:14:15 executing program 5: 10:14:16 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) 10:14:16 executing program 4: 10:14:16 executing program 2: 10:14:16 executing program 0: 10:14:16 executing program 5: 10:14:16 executing program 1: 10:14:16 executing program 4: 10:14:16 executing program 0: 10:14:16 executing program 1: 10:14:16 executing program 2: 10:14:16 executing program 5: 10:14:16 executing program 0: 10:14:17 executing program 2: 10:14:17 executing program 4: 10:14:17 executing program 5: 10:14:17 executing program 1: 10:14:17 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) 10:14:17 executing program 0: 10:14:17 executing program 4: 10:14:17 executing program 5: 10:14:17 executing program 1: 10:14:17 executing program 0: 10:14:17 executing program 2: 10:14:17 executing program 0: pause() syz_execute_func(&(0x7f0000000140)="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") 10:14:17 executing program 4: pause() syz_execute_func(&(0x7f00000002c0)="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") 10:14:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)={[{@codepage={'codepage', 0x3d, ',p1251'}}]}) 10:14:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x10000, 0x82) set_mempolicy(0x2, &(0x7f00000008c0)=0x9, 0x3) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) pipe(&(0x7f0000000080)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 10:14:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, 0x0) r0 = socket(0x400000000000011, 0x2000000000000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\xff\xff\xff\xc3`\x00'}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03t\x02\xff', 0x4bfd}) [ 172.956521][ T8371] hfs: unable to parse mount options [ 173.043774][ T8371] hfs: unable to parse mount options 10:14:18 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) close(r0) 10:14:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0xfd7c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2b) fcntl$setstatus(r1, 0x4, 0x42803) 10:14:18 executing program 5: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) execve(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000001a80)) 10:14:18 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5b94, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$FITRIM(r0, 0x40046607, &(0x7f0000000100)) [ 173.547614][ T8379] device team0 entered promiscuous mode [ 173.565998][ T8379] device team_slave_0 entered promiscuous mode [ 173.594940][ T8379] device team_slave_1 entered promiscuous mode [ 173.626420][ T8379] 8021q: adding VLAN 0 to HW filter on device team0 10:14:18 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) 10:14:18 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = dup(r0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000500)=r1, 0x4) 10:14:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000002004e21e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4000300000002004e24ac1e010100000000000000000000000000000000000000000000000000000000000000000000000078c1aa74d24d30e50000000000000000000000000000000000000000000014333c3b9d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e227f00000100"/528], 0x1) [ 173.928468][ T8415] IPVS: ftp: loaded support on port[0] = 21 [ 173.960643][ T8374] device team0 left promiscuous mode [ 173.977964][ T8374] device team_slave_0 left promiscuous mode [ 173.986058][ T8374] device team_slave_1 left promiscuous mode 10:14:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0xffffffffffffff3a, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x0, 0x68000000}}}}, 0x30}}, 0x0) 10:14:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0xffffffb5) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f00000004c0)={0x0, 0xfb, 0xfbb, 0x0, 0x0, "a6dc72d92178f54b3baf91201cc24467", "23c91b028a2e564389e4b6a50dbb0f77b8bbea5fd6d2709f5302a07f7d8f3e088f14bba1ccf07125dfa67918a004f98e6e8a56def0399809b8fb61064c2dd21de7c95f6ee7d87a7e5eb1b9a931ff1b56427d8e63f8be8330fb99d02e903eebc9ae2ace75e311090b8b13eafad2ea11b6402309792f2fac2ffbb1162ef6abfa2690b339533f1166f9add9bd6c8ed5a66b43636e9e1fd5c4dd7d6da61cb8896a008c3923771bd3d9a351ed4378da9a1f66c4e70b2a3fffa0e70a77f1ce030c5d2840bf6df15a0bd6e89b5b4347ab30030afbafc0cf767308cadf983be45cb93dc6f470552a9a4b85d654cc42be23c8690f6ec856091678950b82ffcd251656cc8af8fc22e37cddaabdd7811b099feacf3ab963dcd1e57c325ad63a2fa776dfc90854b668102235a17af641362e4c9e67ce744b3d22e67de03750c1e6df2fbe1524dbba9d71a205feda97375615ea694a6e727b6a4e128c137f8623d3333c1bfa48ce3d6b31353db6c470bdef67d4c03adbe526dc7323a21828f1a154efd56f255c1026f07865276c14e964f62dcb5d8a7b74122a5e1b87a9f439e581f1ecf64399963d837bad040c59095a9db3cbe534d898a668fbde2d1ac2c1d09bd9fa4634a6433e446dc545d21200126cf73cc47fc5a4e63bdae5be7d822db975d85b4a84946160621a1c8f0f1b680fb2ea12a76d9d10d4a467b174c9677479bed5fba5b2200352306c9763626ebd667ec3b7a1deab56c7b7b81de4e6b2070786af660e258fbc9d4b323cfa20f98c865ec2196ebf52a13e75d9f75f4f21b6062fe096f7fd1f79c72900e4067ff83e7be60e64d69a88fdfc3292bddeb48ffbb4fa9b7c66a56e388d7df57c69cf9c643cc9e1ee4b93b203b89d4204a5dd09c6103d6df612c8caefa1c7a96494c8f8ce6ab9f4f4cefd93e76605e0b1fd31250f4b6b435a9d7a7145d3801137960607a5f38fb2f1084c851625a17c3a313507f2da892df1b6afe303661b4c0ce738a5d6accb6dc30bfd74c94db8739c7175cec3174063a336eb1079de3a7beb4bb72a5cea2504ad01b5c8f7cfff81efe06d8d890e2b6b737da7fad7334cc03b8b171b54b8f299701b0c76070f7c706b384b6de5af3481d014c91f6ac3b811c4f4cd810d4b4e32e06919203f7d6dc1a644c50092c76bbb7c5734b4c3f76910247d36a4edf8c452a800066ce7d0d03f78791101f80ca0fd643060938420e0af6f679c8c1117be99864ca15fd1155f6371aec3a5d793e440c0b854e7696cc9bf77a520d34afd3e890b5de13d162dc3ae2745cc18bab54ae9b309f2d94d84d7a7e6b0d8c95c666056aca50cecedb021929e4a158d2b7926cccdec501bc38256d6b9f0f5a5c5e2415ded2c919509e0da3eef251029462b9ba0dde8670e9abac61d9b09855e32b9440bc02eb15f22a43d5603953ff110dddc12faf19a4c067b4bac86fb3a76e826c1f650a85540a0402e2bee554dd8ebf091ece0a4c150b54b7c41b53e4a4b7f52a7714550d96d06a69e9dcf4177fa3a8324aa7c65fd7a81a1978951b6602d0f45b17d62e9f44589675e1b84eee4ab1eaccec0f85b200abe183d68a3dbe7ce6877d0579e43dcb75a3bd8fd935619a39397c724a8abdc5dfd1c479b5e92a8502c3556feae800af626df45c01fc7c6d7d97aded581097c5b043f2da7b4a63e0b94a0c3afbf4e91f0d5801794859a40d47d5701ddbc5113457a6aa59efb6de679c9f45a1517609f54d360c45a7c96fabcb6024f376fb6f68136d18a3fd3b71ede94001f906fdb7c4f749f9b771bcc2e95aa9efc9fa93aa0f633a2b674ec0a9ce5e49f90ce1a4776b171a7f785debb032d517254b3ad008b59a7bc8c3b1326fa2484b75d55f7de198b9e6dbf19b32b0d0e62c0b54aa83160534c40228ae9876bd3e56088d1ab322df5498022876abf44e93c3bb025fa0ae4cb78d5289aa69c09396310453fdb04d1281a3a88a9a1ee48cd7e9df8a06c6762477b134d9cf260d727efe2caa78ec1cb1bdb6adeede023923b1897f0d255e334ceed8ff06a3e566bb4d09ecc87d58875642bd57fa621c6a83717359d28e020e11610b62f87fc212751eb3bf1872a5eb1e45ad9ce164cbf13bd0cae341bcd6c4808c09d203c009d6945baf58b5b9551f30daef97fb184a0d0d893dfe9d39a61b4cad34c478128f4968bfb0bf4a944b6268da6543554be0197c85e0b6c5dba6b623934c87db075d361c80f93cf41df3e95943982fa7b602350405020573a3e5fecb445648b5a22388940c7a7cc7578599082f78996251f28797cb1c17282c3467e3470952da983a4362c10fd3101cd504a850ba70016eff474f429f5fc26e49d558774967b3ee7eb39c81f250e3ef046d569ed19b01dde695a12ab138c460c8c3b4cbd72f330a34050a280ca1553bc4a28bd364caa7558230189609e5fc5e2f692337d693d2281089510aee78d3c6bbcd73c52e9b3c3dd16c5bae9b360993206bcae01a2752ca9f51040f362ace39bd8626ee7065d3f03c77443bf98ca0d6411acf74cdca13457c3ab6479578ea9212c528a4aebe1cc1b68c814e2fce9b1fb57fba0f84cf331c1a47b61bdb82084be59c0369af922fa46709017cb5fcb3ff7d5c0cb65c3c1ce327f01e5416fb1c615bbae6054e0dca62750ce34dec44676af1950c325adfd822fbc0d5e1c41908dca39f8efdb671a0b6586d2879f64b1de0158aaf24198e2133de918f9ab874bf405fd29f3f533af2e69f5f99c89d570b76f519921a90fa499a4493d3f7234e538783a8185cde0f95eefe72a8cde30f0105da016a1935ee65111615d659aa6de3bcab31eac6d0512df10cad613aea787f9a3ce03524fa086a623b53eb49db35aee5bfe229718df8f564f3c3028d8e43402c7d0a650fed8709c966f7b44e28c1fa095d976d8cccc83c2fafffac29a177f6ec9024262407a72ddee42b9b450d484130fac3c557ac6633ff0d562880ff2d4eef0066280d3ba352297b0b54b0c57ba6090eae26fc5e575466e025795c42a424b28c98582ad9b61049abddcc93fd26d8b2cd6a6f7185a01bb84c6856c69889f4af92c732db7591890dfc64fe11a6ea6901d96ede3743c1443378d2a681a03c28a54f1b26f57808ed267f335c144564be91000d390ab4035c4c21ec5ee01e5b6a87ff76ef21afa897d0225143b8a1032be60a82622499475d5458656875b97ccc2d91f3b9343e944faca4a92f639bde5783f7937f16c00bd640f7ec7eac72afa677a964bdf0a0c0f3396a0dfb0f3ed37f14df08edc9da94dc9bf98f8dbe341510196280df3410aef04cb8f10a8aa2753eb2aa13f954cf43d50f4b3fda367b06db71acb5a3df7f0f20c35001556eabcd66fc653754a8631fa38e90bf474e3d7641f723ce22f4b661acc091a67d1ed52d364787a54cf6d8e687d6c62d1bfc6298368e327769e430b8bc360002743258a0c5ea4b9620e26da535f0070de1a41e6ae9d66dd6253a7350a47c239736bd8cccad7450252064f3326b623352713858accfa0261c4f83ea9c36481d07ce130917280e178e64a5a3506ee03d4acb39f3bee33170b9a67bb2ba8b2bf5e7f020ea78bd1c0021330c7f318adefc4e61ccba97455cad99ae101119a62ae4dbe3a1eac6373a1fc1c18bf046aff1bc12dbde1e3fd94926392223b83fa5e2a1cfe9281c17d1bb5b5d47bf953e9ffcea1a3be4f3121f7ba2ef48e35d39a600533689b57c19fc8b53c63721d874642486629ed3a1fbe9d406da37322f7cd91a76550d6000377f9f9e814affcce2815cc03dc01e86cc19d67badd9449e06b56c0261721934b3c93141f7df164a74b7c98c3883635f979fc65073a36c95bfdea10b6bbea71fb463e88494c27381c7b794a1ace37961b17f3a1ca85ffa1b137c174ffff67e6f316f8d1a859dc533f64472a063ce56acfdc6cad55a59ea372c6e6b553b6c72245cc0cca04ee0ea3cf6fdf40eac79a06d031dfc372716ab055c57fa124852a72169385569d69462136d65c80743bbf1fd554e26a0fee361349816d2430fcb8cd14a25e3db886dbb6b0593fe481a4592a4e83563bf04818643d4db4496198dc7b35aa6070f21f608ef237aadfcc1d2fc551281a5f001c6d7f2dbbdde227161ddb71100b8ece4a411c6fc08d29a040331852040d2106dc55baebd3f3a5ddac86293b58ec3ea6502a888630600abec97ed20002565e6f5d75e157b3807dae1972f20b693f4fda51c167c494e7f6042a9fc2d61bb87b6b79988d52e98593b2ebbc8a697f906df599f38d0a2fa42446bec691695bf92048479de8de02c54852496170762e81251063cc78f7d2c756936ef7add0e332e92c579644ae173218b355a066d0a876e21678c19ed70ce8b5c9380bb53e1195e61a96a7efe49a572cfc566c519156365b515a496c1a378442d0e49cf3bc47b969d71f41065e63199e6483b201b52043594e210f0c7cea3c78307d6386ef8b74390bd320722854e6f79d063cdc29c5ca167b19db71e92cd79e0fe5f800d806a36f20f086c517ceebaa2733c2f4956ebac2f682d5a9a4eba295489bfbb84a32131a323485fd22e73593725a204071c9b793c1e27bfd2799fce6a69c5392b1a9a9adf34e74b834553c4c46db2ba239cf14a1901a7567b668b58870b3d3294c07e74a4b8ae3d3f960f0ca3b685211cdfc70199e39ab44335a9b88d0897f5be97293885f462c2775e2e27d117edff3f40f6c7b365490b2c028614de7ebecbb7ec4494167161a73d69980e8b5301efecb37e23e3ff6eae7542cc55e69e2c03c2efe038c01effdbb3300edd8f99807e2c0c812be58e5c211763da30365fe89833295e4b6cab9d265d1fc8b61fe5bef7a1974e112a351f5564885d55a325c2612310c30da05b22d25f25750089bc7b20ca337435bf5fba7361e57b26c4e815d1178eca9ab0a0ee612f75835032d25173163aba2053993c37835ccc602b1a21f72688b29b8af2e61a8b9047b24fdc477c5a3bd3778f7356be479c27edc8d7af47da646f11b7de6d5603aa90d9234f7dd0f8138458d9b75126a035a6baf94b93a5213245be076131a02f7b4d749a2427c8ac429c26dda21adf0bc5cd8e6a8b140b60fac8ad7f4cfe1e39b45bc1338a375563b0e323fdb5aa424a37abdc6a77bc2875ac5582b85dcdfc8ea197418a8cb52366aaf2313f0cd68f58dfa568046f146d8c5f2b23f15ee297128a856565906655a2ba978fa2f8c57a971bab2549909112e8caf5bfba94b40daf1a0b2d1b19faeb868686781344e1f475d779921ec37bb6f545ca01a7a3701059938f516f001821331bc45f8cc1a1a63fd33d1658191ab07bcd8e4add95906ebcd1bc36409ed7e493832a2a4d28b9f4bd590a38b09f6c54fcc462c57697dfa82b2646ca6104f6f8aec6109e79d538f794cdc3f552e30af2742945278c12072355239eedd09b5f9ac1ccbb81dc2f110419cf49b7ee5f6d52d346ed6b6bc4fd9e246f8a91fc1d4537985234e1af26a36984b51cd2cc70cccc25d22597dc9be2e9e859345f92ef98c8f84cbdef6643121122385a244a127263ba9fd3883591df5ded76f7868fe26e43ae7326de993a6a1e99989f53d4146c1e31f75eadf1149ff2e42f1a36785b708dd666fee9bf293329406b7fe1bb371dbdcb66cf46971310a52474a4f92ba"}, 0xfbb, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) link(&(0x7f0000000180)='./file0/file0\x00', 0x0) 10:14:19 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) close(r0) 10:14:19 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 10:14:19 executing program 5: ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000001c0)=""/146) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x10000, 0x82) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, &(0x7f0000000140)) [ 174.601996][ T8415] IPVS: ftp: loaded support on port[0] = 21 10:14:21 executing program 5: syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") syz_execute_func(&(0x7f0000000300)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ptrace(0x11, r0) 10:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f00000000c0)="f804a2261d3a") 10:14:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffff87}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:14:21 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x4000000000000002) 10:14:21 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) close(r0) [ 176.526599][ T8460] IPVS: ftp: loaded support on port[0] = 21 10:14:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffff04) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) tkill(r2, 0x8001004000000016) 10:14:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000000c0)={0x80000000000007b, 0x600000000000000, [0x0, 0x0, 0x4b564d02], [0xc2]}) 10:14:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc00, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000280)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) socket$netlink(0x10, 0x3, 0x75125e4805b252fe) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/4096) unshare(0x40000000) 10:14:21 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x8001, 0x0, 0x0) [ 176.953196][ T8487] IPVS: ftp: loaded support on port[0] = 21 [ 177.216947][ T8485] IPVS: ftp: loaded support on port[0] = 21 10:14:22 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'vlan0\x00', {0x2, 0x4e21, @remote}}) r2 = accept(r1, 0x0, &(0x7f00000000c0)) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) connect$rds(r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000300)=""/4096, 0x1000}, &(0x7f0000000040)}, 0x20) r4 = socket(0x400000000000011, 0x2000000000000003, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x28, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'eth', 0x3a, 'eql\x00'}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x48800) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\xff\xff\xff\xc3`\x00'}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03t\x02\xff', 0x4bfd}) 10:14:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:23 executing program 4: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1a000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') pread64(r0, &(0x7f0000000140)=""/8, 0xfffffeee, 0x0) 10:14:23 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) [ 178.202503][ T8508] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 178.208990][ T8506] IPVS: ftp: loaded support on port[0] = 21 [ 178.235377][ T8507] gfs2: not a GFS2 filesystem [ 178.318696][ T8507] gfs2: not a GFS2 filesystem 10:14:23 executing program 5: symlink(&(0x7f00000001c0)='./file2\x00', &(0x7f00000002c0)='./file2\x00') clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) execve(&(0x7f0000000400)='./file2\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, 0x0) [ 178.605410][ T8501] device team0 entered promiscuous mode [ 178.635761][ T8501] device team_slave_0 entered promiscuous mode 10:14:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x14}, {0x2, 0x0, @empty}}) [ 178.714768][ T8501] device team_slave_1 entered promiscuous mode [ 178.798353][ T8501] 8021q: adding VLAN 0 to HW filter on device team0 10:14:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000400) mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) 10:14:25 executing program 1: 10:14:25 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000200)) 10:14:25 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:25 executing program 4: 10:14:25 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:25 executing program 5: 10:14:25 executing program 4: 10:14:25 executing program 5: 10:14:25 executing program 1: [ 180.665003][ T8552] IPVS: ftp: loaded support on port[0] = 21 10:14:25 executing program 1: 10:14:25 executing program 5: 10:14:25 executing program 2: 10:14:25 executing program 4: 10:14:25 executing program 1: 10:14:26 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:26 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1000002, 0x11) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)) 10:14:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x40001100082) r1 = memfd_create(&(0x7f0000000440)='\xc8\xf5\xa8ptp', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup3(r0, 0xffffffffffffffff, 0x0) 10:14:26 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) 10:14:26 executing program 1: r0 = memfd_create(&(0x7f0000000040)='(securityproc,ppp0keyringppp0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='~E'], 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 10:14:26 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b00)=@broute={'broute\x00', 0x20, 0x5, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, 0x0, &(0x7f0000000200)=[{}, {}, {0x0, '\x00', 0x4}]}, 0x108) [ 181.475804][ T8589] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 181.487616][ T8591] IPVS: ftp: loaded support on port[0] = 21 10:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$xdp(0x2c, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$xdp(0x2c, 0x3, 0x0) 10:14:26 executing program 4: unshare(0x20400) r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, 0x0, 0x0) 10:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000000880)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0xc018620b, 0x70c000) 10:14:26 executing program 1: r0 = memfd_create(&(0x7f0000000540)='\x9e\xdez\x88Z\xe9^H\x00\x80\x00\x00\x00\x00\x00`O\x13\xee\xabe\xc029\x01\xdcE\xce\xaf\xd5\x88\x94/_\x8cd[\xad\xfb\xeee\xd3\f\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\x00\x00t\xdb\xcf\xa6\xb7M\x00!OQV\xa0]\xa0\xf9k\a\xdbVQu97~ \xce\xfca\xe6\x9eg\x00\x95YtDT\xa0\xef\xcc\x8al\x81\'yL\nF\xa0M\xf3\xadsD\x83J\xa0B\xe1U\x89OsIj\xb8\xb5\xec\x05hR\xb8q\xad\x84G\xaf\'\x97\xdfZq\xf4\x15]Xu\x1c\xe8\x96\x89e\xa2y\x12\x97\x90\x13\xb3\xc9\xa9f\x01', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) 10:14:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:14:27 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a31ad5ee0f48a84226dc97fa10bf72d014f0782c93318c3e47bbcbe3cb29952a63d012a6f5ab8edc6f5a56873a3"], 0x30) 10:14:27 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000080)={{0x8}, 0x0, [], {0x0, 0x1c9c380}}) 10:14:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 10:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4) 10:14:27 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 10:14:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) 10:14:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x9, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x243) [ 182.412290][ T8644] IPVS: ftp: loaded support on port[0] = 21 10:14:27 executing program 1: unshare(0x20400) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x1004}, {r1}], 0x2, 0x0, 0x0, 0x0) 10:14:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETA(r1, 0x5406, 0x0) 10:14:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="3144a54b82aabf2337bde8124ccb8545"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 10:14:27 executing program 1: unshare(0x600) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) close(r0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, 0x0) 10:14:28 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xdbf, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 10:14:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x200000000000040, &(0x7f0000001fde), 0x4) 10:14:28 executing program 1: r0 = socket(0x22, 0x2, 0x4) sendmsg$rds(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x3) 10:14:28 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt(r0, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0xd) 10:14:28 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) [ 183.261754][ T8694] IPVS: ftp: loaded support on port[0] = 21 10:14:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x2c, r1, 0x211, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, '\np6_vti0\x00'}}]}]}, 0x2c}}, 0x0) 10:14:28 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x3) creat(&(0x7f0000000080)='./bus\x00', 0x0) 10:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="982cef0f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421f822ebd72e41812047002b0000006eba0dfe8c738888a1c40fbb0f0f92f0000000b48f294001b00b0000000f71d5397f8171a38a806ebb57c46291ae8ca065600000c462f5be570e740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 10:14:28 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt(r0, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0xd) [ 183.422704][ T8705] Enabling of bearer rejected, failed to enable media 10:14:28 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) fcntl$getown(r0, 0x9) [ 183.497367][ T8714] Enabling of bearer rejected, failed to enable media 10:14:28 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt(r0, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0xd) 10:14:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, 0x0) 10:14:28 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x47e283, 0x0) 10:14:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 10:14:28 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) 10:14:28 executing program 3: r0 = socket$unix(0x1, 0x4000000005, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4(r1, 0x0, 0x0, 0x0) close(r0) 10:14:28 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) [ 184.162552][ T8738] IPVS: ftp: loaded support on port[0] = 21 10:14:29 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x8) 10:14:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x23e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 10:14:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @local}]}, &(0x7f00000000c0)=0x10) 10:14:29 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10ee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/wireless\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0xa2) 10:14:29 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x1009, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x0, 0x0, "746716f58221225b5a011f35b7aa67d94e2b08e943ccfef361e1d91bcd0a7d62"}) 10:14:29 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x8) 10:14:29 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5}, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0xfffffffffffffffc, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:14:29 executing program 5: socketpair(0x2, 0x3, 0x8, &(0x7f0000000080)) 10:14:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f0000000500)=""/249, 0xf9}, {&(0x7f0000000340)=""/155, 0x9b}, {&(0x7f0000000040)=""/121, 0x79}, {&(0x7f0000000400)=""/95, 0x5f}], 0x5, 0x0) 10:14:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x401, 0x0, 0xffffffffffffffe1}, 0x8) [ 184.750743][ T8777] kasan: CONFIG_KASAN_INLINE enabled [ 184.756263][ T8777] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 184.760634][ T8738] kobject: 'ip6gre0' (0000000016a716b6): kobject_uevent_env [ 184.764338][ T8777] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 184.764357][ T8777] CPU: 1 PID: 8777 Comm: syz-executor.4 Not tainted 5.1.0-rc7-next-20190430 #33 [ 184.764366][ T8777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.764387][ T8777] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 184.764407][ T8777] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 184.764425][ T8777] RSP: 0018:ffff888059d7fa00 EFLAGS: 00010006 [ 184.782761][ T8738] kobject: 'ip6gre0' (0000000016a716b6): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 184.787624][ T8777] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e866000 [ 184.787632][ T8777] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 184.787641][ T8777] RBP: ffff888059d7fb10 R08: ffff88808e0ac140 R09: ffffed1015d26be0 [ 184.787650][ T8777] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888059e100ec [ 184.787657][ T8777] R13: 0000000000000000 R14: ffff888059e100f0 R15: ffff888059e100c0 [ 184.787669][ T8777] FS: 00007ff705499700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 184.787686][ T8777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 184.799936][ T8738] kobject: 'queues' (00000000f20e8da1): kobject_add_internal: parent: 'ip6gre0', set: '' [ 184.803449][ T8777] CR2: 000000000085fe80 CR3: 0000000089e5d000 CR4: 00000000001426e0 [ 184.803459][ T8777] Call Trace: [ 184.803486][ T8777] ? emulator_read_emulated+0x50/0x50 [ 184.803504][ T8777] ? lock_acquire+0x16f/0x3f0 [ 184.803528][ T8777] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 184.823567][ T8738] kobject: 'queues' (00000000f20e8da1): kobject_uevent_env [ 184.829185][ T8777] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 184.829200][ T8777] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 184.829222][ T8777] kvm_vcpu_ioctl+0x4dc/0xf90 [ 184.839966][ T8738] kobject: 'queues' (00000000f20e8da1): kobject_uevent_env: filter function caused the event to drop! [ 184.848164][ T8777] ? kvm_set_memory_region+0x50/0x50 [ 184.848176][ T8777] ? tomoyo_path_number_perm+0x263/0x520 [ 184.848185][ T8777] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 184.848198][ T8777] ? __fget+0x35a/0x550 [ 184.848207][ T8777] ? kvm_set_memory_region+0x50/0x50 [ 184.848217][ T8777] do_vfs_ioctl+0xd6e/0x1390 [ 184.848227][ T8777] ? ioctl_preallocate+0x210/0x210 [ 184.848235][ T8777] ? __fget+0x381/0x550 [ 184.848245][ T8777] ? ksys_dup3+0x3e0/0x3e0 [ 184.848254][ T8777] ? nsecs_to_jiffies+0x30/0x30 [ 184.848263][ T8777] ? tomoyo_file_ioctl+0x23/0x30 [ 184.848273][ T8777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.848282][ T8777] ? security_file_ioctl+0x93/0xc0 [ 184.848291][ T8777] ksys_ioctl+0xab/0xd0 [ 184.848301][ T8777] __x64_sys_ioctl+0x73/0xb0 [ 184.848310][ T8777] do_syscall_64+0x103/0x670 [ 184.848321][ T8777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.848328][ T8777] RIP: 0033:0x458da9 [ 184.848337][ T8777] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.848341][ T8777] RSP: 002b:00007ff705498c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.848349][ T8777] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 184.848353][ T8777] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 184.848357][ T8777] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 184.848361][ T8777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7054996d4 [ 184.848366][ T8777] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 184.848372][ T8777] Modules linked in: [ 184.848386][ T8777] ---[ end trace 7a235dbfee0f56df ]--- [ 184.848394][ T8777] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 184.848402][ T8777] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 184.848406][ T8777] RSP: 0018:ffff888059d7fa00 EFLAGS: 00010006 [ 184.848412][ T8777] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000e866000 [ 184.848416][ T8777] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 184.848421][ T8777] RBP: ffff888059d7fb10 R08: ffff88808e0ac140 R09: ffffed1015d26be0 [ 184.848426][ T8777] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888059e100ec [ 184.848430][ T8777] R13: 0000000000000000 R14: ffff888059e100f0 R15: ffff888059e100c0 [ 184.848436][ T8777] FS: 00007ff705499700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 184.848441][ T8777] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 184.848445][ T8777] CR2: 000000000085fe80 CR3: 0000000089e5d000 CR4: 00000000001426e0 [ 184.848452][ T8777] Kernel panic - not syncing: Fatal exception [ 184.849582][ T8777] Kernel Offset: disabled [ 185.238737][ T8777] Rebooting in 86400 seconds..