[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.768180] kauditd_printk_skb: 4 callbacks suppressed [ 52.768209] audit: type=1800 audit(1545366573.815:29): pid=6350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 52.793127] audit: type=1800 audit(1545366573.825:30): pid=6350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. 2018/12/21 04:29:49 fuzzer started 2018/12/21 04:29:54 dialing manager at 10.128.0.26:38701 2018/12/21 04:29:54 syscalls: 1 2018/12/21 04:29:54 code coverage: enabled 2018/12/21 04:29:54 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/21 04:29:54 setuid sandbox: enabled 2018/12/21 04:29:54 namespace sandbox: enabled 2018/12/21 04:29:54 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/21 04:29:54 fault injection: enabled 2018/12/21 04:29:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/21 04:29:54 net packet injection: enabled 2018/12/21 04:29:54 net device setup: enabled 04:33:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfeW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba&\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000180)=@known='user.syz\x00', 0x0, 0x0) syzkaller login: [ 267.032316] IPVS: ftp: loaded support on port[0] = 21 [ 268.426929] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.433539] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.441958] device bridge_slave_0 entered promiscuous mode [ 268.524165] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.530695] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.539189] device bridge_slave_1 entered promiscuous mode [ 268.620130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.700821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.955244] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.043658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 269.132967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.139984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.227254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.234329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.493539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 269.502256] team0: Port device team_slave_0 added [ 269.585578] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 269.594328] team0: Port device team_slave_1 added [ 269.676615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.764036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.851316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 269.859130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.868698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.961277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 269.969194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.978567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:33:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xf1\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10r\x1e\xe2\xdbjt13&S=\x10\x9b\fH\x83\xe9.\x80\xb7Vw;\xca\xda\xd0t\x83\x82\xad\x02\x87\x18\"\xc6\x88\xd1\xb2\xf6\xfe\xd3mZ^\xc5\xe0g\xf0=\xf9\xb2\x17\xed\xcdow\x9fvQ9\xa5\xaf=\a\xfb\x04\x9e4v\x9f\xdb\xcb\xb0Y\x8c\xe1Mh\xf1,.\xd7\xa4@\xd8C\xc8\x97,i\xe3\xf3\xcd\x80ua\x10(\xf0,\x98\xd970\x18\x1f\xe1\x87\xbc\xe7\x89po\xda/A\x1eN\xa3L\xe400\x9c\x9a\xb7\x86\xfd\xb1\xed[\x96\x15\x1f\x00\x00\x00\x00\x00\x00\x00\xe7A\x86\xb5\x13@') fcntl$setstatus(r0, 0x4, 0x5ffe) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000002000)=""/4096, 0xfffffd80, 0x0) [ 270.884425] IPVS: ftp: loaded support on port[0] = 21 [ 271.219337] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.225975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.233183] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.239721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.249039] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 271.255653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.915357] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.922042] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.930346] device bridge_slave_0 entered promiscuous mode [ 273.108505] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.115103] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.123373] device bridge_slave_1 entered promiscuous mode [ 273.202363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 273.359192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 273.718896] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.861731] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.581486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.590213] team0: Port device team_slave_0 added [ 274.740779] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.749434] team0: Port device team_slave_1 added [ 274.841670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 274.848652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.857545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.945726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 274.952918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.962309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.053213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.060924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.070155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.174657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 275.182623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.192164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:33:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfeW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba&\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0xffffffffffffff33) [ 276.517963] IPVS: ftp: loaded support on port[0] = 21 [ 277.082863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.144043] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.150661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.157938] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.164552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.173857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 277.180380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.684977] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 278.201526] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 278.207906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.215796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.746246] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.158382] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.165006] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.173367] device bridge_slave_0 entered promiscuous mode [ 279.380078] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.387263] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.395470] device bridge_slave_1 entered promiscuous mode [ 279.594297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 279.752556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 280.195639] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 280.376542] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 280.553103] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 280.560219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 280.783166] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 280.790240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.314111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 281.322946] team0: Port device team_slave_0 added [ 281.479220] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 281.487945] team0: Port device team_slave_1 added [ 281.692118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 281.699170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.708222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.873386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 281.880423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.889546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.071142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.078880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.087869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.280957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 282.288622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.297912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:33:23 executing program 0: getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000380)='/exe\x00\x00\x00\x00\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\xd2\xdau\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfeW\x05\x95\x03\xebZx\x19\xe5nQ\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x19?\xb8Af\xc26\xfd\xaf\x97\x16\xedQ\xbd\x15\xd8\x1dC\xb8\x9e\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x00\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba&\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0xffffffffffffff33) 04:33:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000000c0)={[], 0x0, 0x8000, 0x407}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:33:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='/exe\x00\x00\xff\xff\x00\x04\x9b\x84\x05r\x13r\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5\xe9\x01\x02\x00u\x8d]\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\xe8\xf5\xeb\x84_\x06\xc2\xb4\x83?\x0f\x84\x93V\xf09\x19(\x06\x00\x8f|\xe6lr\x88A\x04\x1a\xfeW\x05\x95\x03\xebZx\x19\xe5nq\x80\xb4\x9a\xca\xd4Yd\x89\xf4E_,\xbaX\xeem)\x81G\xdf\xab2V\xc7B\xc1\xb6\x9fgy=\xfdj\x9bM\xb8\x88\xe6F\";\xe7\xfb\'\x17 .\xa9V\x11\x8f\x85{\xf4\x80\xdc\xda\xfb\xfeEI\xf3\x95\\\xa0\x19?\xb8>f\xc26\xfd\xaf\x97\x16\xedQ\xbd\x15\xd8\x1dCUz\x1c\xec\xab\xcb\xa5\xd2\xe6/[>\xc8\xaf\xed\xae\x87\x12\x18\xff\a\x00\x00\x1e\x00\x00\x00\x1d\xb9\x8eXV\xf1z\x93\x0f\xe8d)]\xa8\xae\xbc\x0f\x7f\x7fV\x80\xe4\xd3\xf7\xad\xe2\x1a->B\v5Ea\x80\xb1\tT\x9eN\xf0\xe1\xb5V\x91\x03\x009\xce6\xa2H7)z\x9b\x9fzgK\x06_o3\xf0\x01\x00\xf4\x84\xf0M\x8b\xba&\x89\x91\xd3d\xecZ\xc18\xba.$\xb5\x933l?\xf5\x16\xb1\xe9=\x9a\xb7F\r*\x89\x93\x8f\xb7`\t6\xd9\x9bjy&\xdd\xfb\'\xe0\x96\x00\xc5\x03DqjA\xfd\x12\xd6\v\x05\x1d\x15\x11\x9fq\n') fgetxattr(r0, &(0x7f0000000180)=@known='user.syz\x00', 0x0, 0x3e) 04:33:24 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x8, @raw_data="ab2bd9c04c426476cd735793368952d60cc7e1dc22ce38fcb39e281166f6db8959e552aee8f278be84f131800a968bcac66d20e73f19086ac497d9765dd2a66321cbdf926f0129ccc6ab8d52214b41e6401b779314353b6d3e3dc63dee2b7ae08157ccfe8cf85c446791be016574b99344dacffc351df6d947b442fe3a3ed12078c2eb319ec53c16d082338204368a411dd10d5c57ee0d38c9bc4873cbb686d2e2cb7648380df8b39982563ff4255bc9acc2c82836ff28873110fbe752d621b149c62417bb635f41"}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) wait4(r1, &(0x7f0000000080), 0x80000009, 0x0) 04:33:24 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0xffffffffffffffe8) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000180)=0x1b, 0xfffffffffffffdc8) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x101000, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000440)={0x7, 0x21, 0x2}, 0x7) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000300)=""/218) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0x2, 0x6}) signalfd(r0, &(0x7f0000000400)={0x81}, 0x8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x4e7) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x2, 0x0) prctl$PR_GET_SECCOMP(0x15) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) sendto$inet6(r0, &(0x7f00000000c0), 0xfead, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x100000002, @mcast2}, 0x1c) 04:33:24 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x101400) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x0, 0x0, 0x1}, 0xbc}}, 0x18) write$P9_RREAD(r0, &(0x7f0000000080)={0xcd, 0x75, 0x1, {0xc2, "8a46b3fdb6b1ba10150fe94e8549a7856a4f3ffcbe3838d7bba6a7eddd5e159a39ce53bc3fb4159e3e2d93a202fccdf0ada60625e36707bea12862de7469557fab5a2e2489c8fb97f5b77a0caf2c0f18be423f9f39d859c1701097ebe9743923b7c0992856382024274a989c6213520c5ad2bf63ce9a6802dfcf6c7b6bf53c8a6aa993640e201c3ec5e40d81dc042e1e3579fdd794e12964446f77c26a254de24f1550dd4eb12fa3c4bac179595eed2a71fcdf5f43d46bf96737e81ee74f441c384b"}}, 0xcd) write$P9_RREAD(r0, &(0x7f0000000180)={0x81, 0x75, 0x2, {0x76, "d1fa427fab4234572c4b7e23c61a9132de1c5972e9881bd268ae81c57fcb8c2bafb12996d413a20781499a4a3f9819bd2ceb09f1eaaf7b642469409028f9874e727914da45f507e0787674eac74b17a50b2122b29e1ce4ae75d96441f103f25c6e0270a5d8e79522a85530db4d6d447bb58ffff8e11a"}}, 0x81) syncfs(r0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000240)={'broute\x00'}, &(0x7f00000002c0)=0x78) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x2, {{0x2, 0x3, 0x8}, 0x4}}, 0x18) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000340)={0x0, 0x0, {0x200, 0x3, 0x3017, 0x9, 0xf, 0x6, 0x2, 0x2}}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000003c0)={0xffffffff, {{0x2, 0x4e24, @multicast1}}}, 0x88) write$P9_RCREATE(r0, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x1, 0x4, 0x5}, 0x6}}, 0x18) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4100204}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)={0x110, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7c2a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfe}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc96}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1d8ceb22}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40001) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000700), &(0x7f0000000740)=0x4) write$P9_RUNLINKAT(r0, &(0x7f0000000780)={0x7, 0x4d, 0x2}, 0x7) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000007c0)=0xffffffffffffffff, 0x4) write$P9_RREAD(r0, &(0x7f0000000800)={0x21, 0x75, 0x2, {0x16, "28c454f67f4d5cfbe90c97e2a3c5241bea3cb5848f9f"}}, 0x21) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000840)={0x2, 0x4}, 0x2) syslog(0x9, &(0x7f0000000880)=""/62, 0x3e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r0, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) ptrace$setopts(0x4206, r2, 0x10001, 0x32) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000940)=""/112) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000009c0)={0x1, 0x8, 0x5, 0x27}) r3 = semget(0x3, 0x4, 0x40) r4 = getuid() r5 = getgid() fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000a80)=[0xee01, 0xee01, 0xee00, 0xee00]) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000ac0)={{0x8001, r4, r5, r6, r7, 0x90, 0x3}, 0x7d, 0x100, 0x7bc8}) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000b40)) unlinkat(r0, &(0x7f0000000b80)='./file0\x00', 0x0) 04:33:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1000000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)=r2) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 283.875039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 04:33:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x200000, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f00000000c0)={{0x50f}}) 04:33:25 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) ioprio_get$uid(0x3, r3) dup2(r2, r1) [ 284.405859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.442516] IPVS: ftp: loaded support on port[0] = 21 [ 284.556562] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.563165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.570280] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.576885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.587095] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 284.595321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:33:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000380)="153f6234488dd25d766070") r1 = socket(0x8, 0x80001, 0x407fffffffffd) nanosleep(&(0x7f0000000040), 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x4200) ioctl$sock_ifreq(r1, 0x89fa, &(0x7f0000000100)={'sit0\x00\x1f\x80\x12\x00\x00\x01\xe0\x00\x00\x0e\x02', @ifru_ivalue=0x907000}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f00000000c0)=@buf={0x2, &(0x7f0000000080)="b567"}) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000200)) r3 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000240)=""/152, 0x98) [ 285.148985] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.647120] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.653508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.661311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.286795] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.193731] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.200268] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.208532] device bridge_slave_0 entered promiscuous mode [ 287.369811] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.376508] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.384820] device bridge_slave_1 entered promiscuous mode [ 287.593161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.690141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 288.190518] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 288.288390] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.163285] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 289.172137] team0: Port device team_slave_0 added [ 289.321537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 289.330191] team0: Port device team_slave_1 added [ 289.517793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.692605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.854920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 289.862623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.871871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.033968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 290.041531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.050746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:33:31 executing program 1: r0 = socket(0x1e, 0x1000000000005, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)="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", 0xfa}, {}, {&(0x7f0000000040)}], 0x3, &(0x7f000016cf61)}, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x9}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) [ 291.487370] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.494010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.501196] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.507876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.516933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 291.523442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.702258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.282385] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 292.842061] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 292.848397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.856349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.316610] 8021q: adding VLAN 0 to HW filter on device team0 04:33:37 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af03, &(0x7f00000002c0)) 04:33:37 executing program 0: unshare(0x20400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:33:37 executing program 1: r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0b01000000000000000000000000020000fdfe080000000000000010"], 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) r2 = getegid() chown(&(0x7f0000000080)='./file1\x00', r1, r2) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000140), 0x1000) 04:33:37 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2, 0x9, 0x800, 0x7, 0x29, 0x0, 0x70bd29, 0x25dfdbfd, [@sadb_x_sec_ctx={0x12, 0x18, 0x8, 0x6, 0x85, "120db663c93c801302f3f4b60dcd1a4379736932c8a086631537532ffe1e0657a19865c4bf1db816e57d386586d33253f612c5fc10285e9a5aeffea912ebde3631dfa3f246228e9cbf5a95c1e5e6cf0d1e2280fb45f01fc072c7625e44f39dd252983bc35b99a323e1634b4dd88f9a06983b0f275b1c88b46e4527734b5ef16fa1694ce0a9"}, @sadb_ident={0x2, 0xb, 0x3, 0x0, 0x3f}, @sadb_x_sa2={0x2, 0x13, 0x80, 0x0, 0x0, 0x70bd26, 0x3503}, @sadb_x_policy={0x8, 0x12, 0x3, 0x1, 0x0, 0x0, 0x0, {0x6, 0x33, 0x80000000, 0x9, 0x0, 0x6, 0x0, @in6=@mcast1, @in6}}, @sadb_ident={0x2, 0xb, 0x100000001, 0x0, 0x3}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in6=@remote, 0x1f, 0x10, 0x10}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d6}]}, 0x148}}, 0x20000000) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) r2 = dup(r0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000002c0)={0x2, 0xf0, @broadcast}, 0x10) flistxattr(r2, &(0x7f0000000300)=""/225, 0xe1) getsockname$tipc(r0, &(0x7f0000000400)=@name, &(0x7f0000000440)=0x10) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000004c0)={0x8, &(0x7f0000000480)=[{0x5}, {0xffffffff, 0xfff}, {0x7, 0x80}, {0x1, 0x8001}, {0x10001, 0x4}, {0x7fff, 0xffffff8000000000}, {0x100000001, 0x4}, {0xb3, 0x9}]}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000500)=0x200, 0x4) r3 = getuid() getresgid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) lchown(&(0x7f0000000540)='./file0\x00', r3, r4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x7}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000006c0)=@assoc_value={r5, 0xfffffffffffff54e}, 0x8) r6 = socket$inet6(0xa, 0x80003, 0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RRENAME(r2, &(0x7f0000000700)={0x7, 0x15, 0x1}, 0x7) getpeername$netlink(r0, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000007c0)={0x0, 0x0, 0x7, 0x0, [], [{0x3, 0x1000, 0xfffffffffffffff8, 0x9, 0x10000, 0x40}, {0x2, 0x5, 0x20, 0x4, 0x10001}], [[], [], [], [], [], [], []]}) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000a40)) setsockopt$inet6_MRT6_DEL_MFC(r6, 0x29, 0xcd, &(0x7f0000000a80)={{0xa, 0x4e24, 0x564f1a9a, @local, 0xafc}, {0xa, 0x4e22, 0x2, @remote, 0x7f}, 0xca4, [0x1ff, 0x6, 0xf3c2, 0x80, 0x2, 0x4, 0x7f, 0x9]}, 0x5c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000f80)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x6b5e9aec40a2af2}, 0xc, &(0x7f0000000f40)={&(0x7f0000000b80)={0x394, r7, 0x201, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9d57}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x990}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x71}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2e90}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6a70}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @loopback, 0xfffffffffffffff9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3, @local, 0xffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @loopback, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffffffffffffaf, @dev={0xfe, 0x80, [], 0x19}, 0x6}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd327}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7b13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2bef}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x394}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) write$P9_RXATTRWALK(r1, &(0x7f0000000fc0)={0xf, 0x1f, 0x1, 0x3}, 0xf) fcntl$getflags(r8, 0x401) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000001000)={0xa9, 0x2, 'client0\x00', 0x4, "96c9aef74b4aba84", "10209b552144432aa4de9e49e04cf0e39cd1b6ba1d73b22afdff49e18fa82786", 0x8, 0x5}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000010c0)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@mcast1, @in=@rand_addr=0x6, 0x4e22, 0x40add05c, 0x4e21, 0x78, 0x2, 0x20, 0x80, 0x2b, r9, r3}, {0x1ff, 0x4208, 0x3ff, 0x1000, 0x4f, 0x0, 0x1f, 0x4}, {0x279, 0x7, 0xfffffffffffffff7, 0x80}, 0x8, 0x6e6bbf, 0x2, 0x0, 0x2}, {{@in=@multicast2, 0x4d6, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x3505, 0x5, 0x3, 0x1, 0x665, 0x8, 0x3}}, 0xe8) [ 296.815285] 8021q: adding VLAN 0 to HW filter on device bond0 04:33:38 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x40007ff, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x10001}, 0xffffff43) ftruncate(r1, 0x90) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 04:33:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x20) getpeername$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', r1}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000000)={0x3}) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000006c0), 0xe9926194}], 0x1, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@generic={0x0, 0x3ff, 0x5}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x3, 0x2, 0x4, 0x2426, 0x101, 0x3, 0x9, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r4, 0x0, 0x1ff}, 0xc) [ 297.583306] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 297.586436] IPVS: ftp: loaded support on port[0] = 21 [ 297.905422] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 297.911902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.919812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.246719] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.971200] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.977877] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.985824] device bridge_slave_0 entered promiscuous mode [ 299.065326] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.072433] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.080517] device bridge_slave_1 entered promiscuous mode [ 299.158192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 299.236348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 299.488145] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 299.572998] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 299.962402] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.970196] team0: Port device team_slave_0 added [ 300.049904] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.058572] team0: Port device team_slave_1 added [ 300.137064] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.144748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.153713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.239136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 300.246772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.255824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.345916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.353554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.362560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:33:41 executing program 3: 04:33:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x1e2, 0x200000) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000001c0)={0x2, 0x10003, "7ce508ab5da1e724d7bd71f4d4ddb082c5cb739550c67018", {0x1, 0x3}, 0x6}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100)={r3, r4/1000+10000}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r1, @ANYBLOB="0a000200aaaaaaaaaaaa000000000000000000000000000000"], 0xff8e}}, 0x0) 04:33:41 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x300) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040), 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x7, 0x100, 0x5, {0x77359400}, {0x0, 0x7530}, {0x0, 0x7, 0x200, 0x101}, 0x1, @can={{0x1, 0xfffffffffffffffb, 0x40, 0x6}, 0x5, 0x2, 0x0, 0x0, "beb4f781c16e03c5"}}, 0x48}, 0x1, 0x0, 0x0, 0x48014}, 0x810) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1080200}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=@delqdisc={0xa0, 0x25, 0xb02, 0x100, 0x25dfdbfb, {0x0, r1, {0x5}, {0xfffe, 0xf}, {0x5, 0xffff}}, [@TCA_STAB={0x6c, 0x8, [@TCA_STAB_DATA={0xc, 0x2, [0x0, 0x0, 0x0]}, @TCA_STAB_DATA={0x14, 0x2, [0x6, 0xffffffff00000001, 0xee, 0x0, 0xffffffffffff0000, 0x0, 0x40]}, @TCA_STAB_BASE={0x1c, 0x1, {0xc7, 0x20004, 0x7f, 0xf777, 0x2, 0xffffffffffffff81, 0x1, 0x3}}, @TCA_STAB_DATA={0x10, 0x2, [0x80000000, 0x62d, 0xfffffffffffffe53, 0x8001, 0x4, 0x8]}, @TCA_STAB_BASE={0x1c, 0x1, {0x7ff, 0x3f, 0x8, 0x8, 0x1, 0x6, 0x9, 0x1}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x200}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x80, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0xffff}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsdef={'smackfsdef', 0x3d, 'system,}vboxnet0[@vmnet1$/]'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/input/mice\x00'}}, {@dont_hash='dont_hash'}, {@euid_gt={'euid>', r4}}, {@uid_eq={'uid', 0x3d, r5}}, {@measure='measure'}]}}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000940)={0xb60d, {{0xa, 0x4e21, 0x0, @mcast2, 0x9d}}}, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@local, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000b00)=0xe8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000b40)={0x6, {{0xa, 0x4e20, 0x1, @mcast2, 0x8ee8}}}, 0x88) getresuid(&(0x7f0000000c00)=0x0, &(0x7f0000000c40), &(0x7f0000000c80)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000cc0)={'filter\x00'}, &(0x7f0000000d40)=0x78) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000d80)={[0xd000, 0x115000, 0x5000, 0x2], 0xfffffffffffffff7, 0x10, 0x10001}) r8 = syz_open_dev$mice(&(0x7f0000000e00)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_int(r8, 0x29, 0x16, &(0x7f0000000e40), &(0x7f0000000e80)=0x4) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/md0\x00', 0x200000, 0x0) r10 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000f00)={0x9, 0x0, 0x10001}) setsockopt$inet6_tcp_buf(r8, 0x6, 0xb, &(0x7f0000000f40)="85830e1474e60f92a4680fa72f0b69a2ae60175bbfaef0ef", 0x18) ioctl$VT_GETMODE(r8, 0x5601, &(0x7f0000000f80)) ioctl$FIGETBSZ(r9, 0x2, &(0x7f0000000fc0)) getsockopt$ARPT_SO_GET_INFO(r8, 0x0, 0x60, &(0x7f0000001000)={'filter\x00'}, &(0x7f0000001080)=0x44) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000001100)='fou\x00') sendmsg$FOU_CMD_ADD(r8, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x2c, r11, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x17}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x40044) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001200)) fsetxattr$system_posix_acl(r10, &(0x7f0000001380)='system.posix_acl_access\x00', &(0x7f00000013c0)={{}, {0x1, 0xe6caf25425971c21}, [{0x2, 0x2, r7}, {0x2, 0x2, r7}], {0x4, 0x4}, [{0x8, 0x4, r6}, {0x8, 0x6, r3}], {0x10, 0x3}, {0x20, 0x1}}, 0x44, 0x1) 04:33:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000000c0)={0x10}) 04:33:41 executing program 2: [ 300.503296] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. [ 300.515536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.523254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.532429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:33:41 executing program 0: [ 300.552340] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 04:33:41 executing program 2: 04:33:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) dup2(r0, r1) 04:33:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='0'], 0x1) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x100000000024, &(0x7f00000001c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1c00}]) [ 301.141742] IPVS: ftp: loaded support on port[0] = 21 [ 301.612637] ip (7739) used greatest stack depth: 54128 bytes left [ 301.951477] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.958083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.965297] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.971883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.979871] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 301.986429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.592926] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.599557] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.607598] device bridge_slave_0 entered promiscuous mode [ 302.691989] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.698583] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.706644] device bridge_slave_1 entered promiscuous mode [ 302.797809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 302.882590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 303.132658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 303.217713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 303.294807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 303.301825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.381720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 303.388706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.636166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 303.644103] team0: Port device team_slave_0 added [ 303.725940] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 303.733856] team0: Port device team_slave_1 added [ 303.815627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.899916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 303.980893] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 303.988788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.997796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.076157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 304.084098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.093392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.024744] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.031352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.038556] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.045181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.053353] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 305.092707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.561287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.878335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 306.178717] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 306.185639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.193638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.503739] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.542325] 8021q: adding VLAN 0 to HW filter on device bond0 04:33:49 executing program 0: shmget(0x2, 0xe000, 0x0, &(0x7f0000ff2000/0xe000)=nil) 04:33:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4002}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x148) 04:33:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 04:33:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{0x250}]}) 04:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) [ 308.750663] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 309.079029] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 309.253964] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 309.260272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.268241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.444830] 8021q: adding VLAN 0 to HW filter on device team0 04:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 04:33:51 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x5, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) 04:33:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x75f}, 0x257) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'0aw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1000000000000378}, 0xb) 04:33:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty=0xf401000000000000}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:33:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp\x00') sendfile(r0, r0, 0x0, 0x8000) 04:33:51 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0xb) [ 310.885708] kernel msg: ebtables bug: please report to author: bad policy [ 310.922715] kernel msg: ebtables bug: please report to author: bad policy 04:33:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x828002102011ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000a80)={'lo\x00\x00\x00\x11\x0e\x00', 0x0}) bind$packet(r1, &(0x7f0000000280)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) r5 = dup3(r2, r1, 0x0) read(r5, &(0x7f0000000340)=""/4, 0x1009e) 04:33:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x2000}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) splice(r1, &(0x7f0000000000), r2, &(0x7f0000000080), 0x20, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000003080)=ANY=[@ANYBLOB="7f454c4600007346e4a0efa21e6da100000000000000000000000000000000000080000000000000004000000000000000000008000000000000000000000038edffffff000000007543b21800000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x74) fallocate(r5, 0x20, 0x0, 0xfffffeff000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) r7 = dup(r4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x9, 0x1, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) ppoll(&(0x7f00000012c0)=[{r7, 0x2}], 0x1, &(0x7f0000001340)={0x0, r9+10000000}, &(0x7f0000001380), 0x8) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 310.946551] audit: type=1326 audit(1545366831.995:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8198 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 311.153861] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:33:52 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000080)="ae", 0x1) 04:33:52 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8931, &(0x7f0000000180)={'bridge0\x00\x00\x00\a\x00', 0x4}) 04:33:52 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) 04:33:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(r0) [ 311.371695] encrypted_key: insufficient parameters specified [ 311.690446] audit: type=1326 audit(1545366832.735:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8198 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 04:33:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) sched_setaffinity(0x0, 0x8, &(0x7f0000000580)=0x800000d) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x1e, &(0x7f00000005c0)=ANY=[@ANYBLOB="0500db44c7450000bf7ce676b30007000000f0fff8ffffff79a4dcff08000000b4060e52c20c378dae6e38496924150000ff7fffff2d020000005eafe556b35eb8006504040001000000040400008500c1f3ec760001b70000140000000095000000000000000000000000000000058e5c6e6df31b89512208912fa355aaac9ac3ceb3650eeeb3d3243ba48f712c22a00705319534474476b5f9108bfe281a4c69aa796f40d0489ad405d441903938926aef98c6fdc45ae6502825d002000000c0cd42822cbe3494d7128c17f0d19d4e874ec3f156c80aa43847f8bb392d90074734e16038b84e5d68a9a5619615d178c1"], 0x0}, 0x48) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f00000002c0)=r5) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a3, &(0x7f0000000180)={'bridge0\x00\x00\x00\a\x00', 0x4}) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r6 = memfd_create(&(0x7f0000000140)='lblcr\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[], 0xfffffffffffffdfd) close(r3) r7 = dup3(r2, r6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000840)=ANY=[@ANYBLOB="000000000200000000000000020000000576ffcdbc5042f9019133184efc17fecdc0effb4f77f9369b7ecc888db2dfc57cd36bc92d518b74cc195912f3bcdf6842a7b6ccbbff822fd6f21544bc1de89b517c91449d5ffb9687d75fdeae95399409ca17ff63cc13cf00416c30ca960527f41e92ea7b1cac5581000000f2deac498ed23631aef3d93b581778a7df4d9f9b7293b5f3a76009195290bc4c98ea4f8455e194e5355815ddef0b0dc3cef7ce2fdd67c02d47ea5d65b795de733510efd1b542338e9695e2db973dbf6af1061f07b094745bd92ad0ef80fd91ce3e6c408c6d89ce9636f6291f2d7d600f1a58ada23b6981bf9e3f9a1308d18da98a468fec9a8504f066aef7f5cd937bb1389653cdbbfe2cce83e30e198f2e058025c71be4872f46673ee8b644cab886b82371d4a26dc00fbb5c58061a8735b6b4d676cab4d6bb4f714fe9069b4943dad5d6c7cf21e9acc0d65790219896ca0dfae71b72935a7cdf34d21e5a34"], 0x168}}, 0x40005) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmmsg(r8, &(0x7f0000000180), 0x400000000000117, 0x0) r9 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r7, 0x54a3) clock_gettime(0x3, &(0x7f0000000380)={0x0, 0x0}) futimesat(r6, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={{r10, r11/1000+30000}, {0x77359400}}) listen(r9, 0xffffffffffffff00) munlockall() 04:33:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x2000}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) splice(r1, &(0x7f0000000000), r2, &(0x7f0000000080), 0x20, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000003080)=ANY=[@ANYBLOB="7f454c4600007346e4a0efa21e6da100000000000000000000000000000000000080000000000000004000000000000000000008000000000000000000000038edffffff000000007543b21800000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x74) fallocate(r5, 0x20, 0x0, 0xfffffeff000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) r7 = dup(r4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x9, 0x1, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) ppoll(&(0x7f00000012c0)=[{r7, 0x2}], 0x1, &(0x7f0000001340)={0x0, r9+10000000}, &(0x7f0000001380), 0x8) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 04:33:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x2000}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) splice(r1, &(0x7f0000000000), r2, &(0x7f0000000080), 0x20, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000003080)=ANY=[@ANYBLOB="7f454c4600007346e4a0efa21e6da100000000000000000000000000000000000080000000000000004000000000000000000008000000000000000000000038edffffff000000007543b21800000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x74) fallocate(r5, 0x20, 0x0, 0xfffffeff000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) r7 = dup(r4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x9, 0x1, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) ppoll(&(0x7f00000012c0)=[{r7, 0x2}], 0x1, &(0x7f0000001340)={0x0, r9+10000000}, &(0x7f0000001380), 0x8) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 04:33:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty=0xf401000000000000}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 04:33:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(r0) 04:33:52 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2}}) [ 311.855552] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 311.929556] hrtimer: interrupt took 30222 ns 04:33:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(r0) 04:33:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0x0, 0x0) 04:33:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(r0) 04:33:53 executing program 3: pipe(0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = gettid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x382) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_gettime(0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sched_getscheduler(0x0) epoll_create(0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) tkill(r0, 0x1000000000016) 04:33:53 executing program 5: unshare(0x600) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000286, 0x1000000) 04:33:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:33:53 executing program 2: fdatasync(0xffffffffffffffff) 04:33:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x2000}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) splice(r1, &(0x7f0000000000), r2, &(0x7f0000000080), 0x20, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000003080)=ANY=[@ANYBLOB="7f454c4600007346e4a0efa21e6da100000000000000000000000000000000000080000000000000004000000000000000000008000000000000000000000038edffffff000000007543b21800000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x74) fallocate(r5, 0x20, 0x0, 0xfffffeff000) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) r7 = dup(r4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x9, 0x1, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) ppoll(&(0x7f00000012c0)=[{r7, 0x2}], 0x1, &(0x7f0000001340)={0x0, r9+10000000}, &(0x7f0000001380), 0x8) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 04:33:53 executing program 2: r0 = syz_open_procfs(0x0, 0x0) fdatasync(r0) 04:33:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, 0x0) stat(&(0x7f00000020c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 04:33:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0x40000001}) 04:33:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:33:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)) 04:33:53 executing program 5: r0 = socket$inet(0x2, 0x8000b, 0xe0b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{0x0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f00000004c0)=""/99) unshare(0x20000) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000280)=""/145) setns(r1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) rt_sigqueueinfo(0x0, 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x10200, 0x0) faccessat(r3, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) 04:33:53 executing program 2: syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(0xffffffffffffffff) 04:33:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/140, 0x8c}, 0x4}], 0x1, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 04:33:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 04:33:54 executing program 1: setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/199, 0xc7}, {&(0x7f00000000c0)=""/154, 0x9a}, {0x0}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x4, &(0x7f0000001480)=""/140, 0x8c}, 0x4}, {{&(0x7f00000003c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002800)=[{&(0x7f0000001540)=""/63, 0x3f}, {0x0}, {&(0x7f0000002580)=""/89, 0x59}, {&(0x7f0000002600)=""/125, 0x7d}, {0x0}, {&(0x7f0000002740)=""/58, 0x3a}, {&(0x7f0000002780)=""/110, 0x6e}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x8}, 0x4800000000000000}], 0x2, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000002940)={0xfffffffffffffffa, 0x0, 0x10001, 0x100000001}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000002980)={0x80000000, r1}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24004000}, 0x10) 04:33:54 executing program 4: r0 = inotify_init1(0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x102, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14}, 0x14) ioctl$KIOCSOUND(r1, 0x4b2f, 0x4) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x5, 0x0, 0x7, 0x3, 0x6, 0x4, 0x286, 0x38, 0x0, 0x68, 0xfff, 0x20, 0x1, 0xfffffffffffffff8, 0xfffffffffffff287, 0xd4}, [{0x7, 0x7ff, 0x9, 0x7ff, 0x8, 0x6, 0x7, 0x8}], "bef1e0b751cabc3f6791d4f9b2f227147f12dd0ff15ad3ef11afca2b90ce8a80d28be4d3fb4a01911c065e6e845ebbd2b6c94b26e87bad7a7d324aff013a99dd3784df9530871ee85ff1e987a6162fd2db7b3f10c963a442cf83649d2090d031a0f6dc78c283dc833bcbfbfcab64b690f300e6424227c00435b025fdc919e856728d052130e170d538f36557b8ac4de9c053e4a99a6f814178d366c8a7cdf3493c41852bfb38f8ec98098728ab76d743e9f8", [[]]}, 0x20a) 04:33:54 executing program 2: r0 = inotify_init1(0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x102, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getegid() write$P9_RGETATTR(r0, &(0x7f0000000280)={0xa0, 0x19, 0x0, {0x80, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}}, 0xa0) 04:33:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=""/140, 0x8c}, 0x4}], 0x1, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 04:33:54 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) geteuid() 04:33:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 04:33:54 executing program 5: setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='maps\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/199, 0xc7}, {&(0x7f00000000c0)=""/154, 0x9a}, {&(0x7f0000000340)=""/128, 0x80}, {0x0}], 0x4, &(0x7f0000001480)=""/140, 0x8c}, 0x4}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000001540)=""/63, 0x3f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/89, 0x59}, {&(0x7f0000002600)=""/125, 0x7d}, {0x0}, {&(0x7f0000002740)=""/58, 0x3a}, {&(0x7f0000002780)=""/110, 0x6e}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x8}, 0x4800000000000000}], 0x2, 0x0, &(0x7f0000002900)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000002980)={0x80000000}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004000}, 0x10) 04:33:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 04:33:54 executing program 2: keyctl$update(0x74f47c52, 0x0, 0x0, 0x0) 04:33:55 executing program 0: 04:33:55 executing program 2: 04:33:55 executing program 0: 04:33:55 executing program 1: 04:33:55 executing program 4: 04:33:55 executing program 5: 04:33:55 executing program 2: [ 314.713515] ------------[ cut here ]------------ [ 314.718328] kernel BUG at mm/kmsan/kmsan_instr.c:85! [ 314.723486] invalid opcode: 0000 [#1] SMP [ 314.727649] CPU: 1 PID: 8413 Comm: cryptomgr_probe Not tainted 4.20.0-rc7+ #9 [ 314.734945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.744332] RIP: 0010:__msan_instrument_asm_store+0xfe/0x100 [ 314.750145] Code: 89 65 c8 ff 75 c8 9d 65 48 8b 04 25 28 00 00 00 48 3b 45 d8 75 0d 48 83 c4 18 5b 41 5c 41 5e 41 5f 5d c3 e8 84 11 59 ff 0f 0b <0f> 0b 55 48 89 e5 41 57 41 56 41 54 53 48 89 d3 49 89 f6 49 89 ff [ 314.769291] RSP: 0018:ffff88812d46f5c0 EFLAGS: 00010096 [ 314.774701] RAX: ffff88812cb8f60c RBX: ffff888160633c00 RCX: 0000000000000002 [ 314.781981] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88812d46f60f [ 314.789287] RBP: ffff88812d46f5f8 R08: ffff88812d46f610 R09: 0000000000000000 [ 314.796582] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000086 [ 314.803880] R13: ffff888160634588 R14: 0000000000000001 R15: ffff88812d46f60f [ 314.811169] FS: 0000000000000000(0000) GS:ffff88821fd00000(0000) knlGS:0000000000000000 [ 314.819419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 314.825320] CR2: 00007fff3859bab0 CR3: 0000000148f3a000 CR4: 00000000001406e0 [ 314.832617] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 314.839912] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 314.847192] Call Trace: [ 314.849813] _raw_spin_lock+0x58/0x110 [ 314.853734] try_to_wake_up+0x1318/0x2380 [ 314.857932] wake_up_process+0x34/0x40 [ 314.861839] wake_up_q+0x5f/0x90 [ 314.865240] stop_one_cpu_nowait+0x6ea/0x730 [ 314.869711] load_balance+0x960f/0x9ad0 [ 314.873869] pick_next_task_fair+0xaf1/0x3240 [ 314.878424] ? check_preempt_wakeup+0x1620/0x1620 [ 314.883286] pick_next_task+0x1ba/0x420 [ 314.887323] __schedule+0x1f7/0x830 [ 314.890979] schedule+0x1ab/0x2b0 [ 314.894464] kthread+0x3cb/0x4e0 [ 314.897857] ? cryptomgr_notify+0x1190/0x1190 [ 314.902876] ? schedule_tail+0x1b2/0x410 [ 314.906958] ? kthread_blkcg+0xf0/0xf0 [ 314.910859] ret_from_fork+0x35/0x40 [ 314.914599] Modules linked in: [ 314.917826] ---[ end trace 4e273a4fbce0af73 ]--- [ 314.922605] RIP: 0010:__msan_instrument_asm_store+0xfe/0x100 [ 314.928428] Code: 89 65 c8 ff 75 c8 9d 65 48 8b 04 25 28 00 00 00 48 3b 45 d8 75 0d 48 83 c4 18 5b 41 5c 41 5e 41 5f 5d c3 e8 84 11 59 ff 0f 0b <0f> 0b 55 48 89 e5 41 57 41 56 41 54 53 48 89 d3 49 89 f6 49 89 ff [ 314.947374] RSP: 0018:ffff88812d46f5c0 EFLAGS: 00010096 [ 314.952758] RAX: ffff88812cb8f60c RBX: ffff888160633c00 RCX: 0000000000000002 [ 314.960039] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88812d46f60f [ 314.967332] RBP: ffff88812d46f5f8 R08: ffff88812d46f610 R09: 0000000000000000 [ 314.974617] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000086 [ 314.981900] R13: ffff888160634588 R14: 0000000000000001 R15: ffff88812d46f60f [ 314.989191] FS: 0000000000000000(0000) GS:ffff88821fd00000(0000) knlGS:0000000000000000 [ 314.997434] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 315.003334] CR2: 00007fff3859bab0 CR3: 0000000148f3a000 CR4: 00000000001406e0 [ 315.010620] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 315.017899] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 315.025179] Kernel panic - not syncing: Fatal exception [ 316.589009] Shutting down cpus with NMI [ 316.609526] Kernel Offset: disabled [ 316.613193] Rebooting in 86400 seconds..