[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.669348] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.660641] random: sshd: uninitialized urandom read (32 bytes read) [ 29.997761] sshd (5345) used greatest stack depth: 16584 bytes left [ 30.021075] random: sshd: uninitialized urandom read (32 bytes read) [ 31.002658] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. [ 36.805287] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/25 02:51:33 fuzzer started [ 38.270382] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/25 02:51:35 dialing manager at 10.128.0.26:46835 2018/09/25 02:51:35 syscalls: 1 2018/09/25 02:51:35 code coverage: enabled 2018/09/25 02:51:35 comparison tracing: enabled 2018/09/25 02:51:35 setuid sandbox: enabled 2018/09/25 02:51:35 namespace sandbox: enabled 2018/09/25 02:51:35 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/25 02:51:35 fault injection: enabled 2018/09/25 02:51:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/25 02:51:35 net packed injection: enabled 2018/09/25 02:51:35 net device setup: enabled [ 40.666245] random: crng init done 02:53:50 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/14, 0xe}, {&(0x7f0000000100)=""/40, 0x28}], 0x2, 0x0, 0x0, 0x8}, 0x10000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x93, 0x0, 0xffffffffffffffc1, 0x6}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e23, 0x80000000, @empty, 0x4000000000000000}}}, &(0x7f0000000300)=0x84) r3 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x8, 0x800) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000380)=0x80) ioctl$sock_proto_private(r0, 0x89e7, &(0x7f00000003c0)="e87c94d8f20df94862d1439e1dc55be497d92831951b175717375b97d0e1feafd10f4b403a895319b47bddb0d91c0b75d542619c281e12d9f42929") flock(r3, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000400)={'veth0_to_team\x00', 0x7c5}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000440)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480)={0x0, 0x81, 0x8, 0x7f, 0xfffffffffffffffc, 0x4, 0x0, 0x3, 0x5, 0x3ff, 0x40}, 0xb) r4 = getpgid(0xffffffffffffffff) ptrace$setsig(0x4203, r4, 0x1cb, &(0x7f00000004c0)={0x36, 0xc6, 0x2, 0x5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={r1, @in={{0x2, 0x4e22, @remote}}, [0x400, 0x100000000, 0x2, 0x80000000, 0x0, 0x0, 0x9, 0x9, 0x5c3, 0xce, 0x80000001, 0x30f1, 0x9, 0x9, 0x7f]}, &(0x7f0000000600)=0x100) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000640), &(0x7f0000000680)=0x10) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_proto_private(r3, 0x89e2, &(0x7f0000000700)="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") getsockname(r0, &(0x7f0000001700)=@can={0x1d, 0x0}, &(0x7f0000001780)=0x80) sendmsg$can_bcm(r0, &(0x7f00000018c0)={&(0x7f00000017c0)={0x1d, r5}, 0x10, &(0x7f0000001880)={&(0x7f0000001800)={0x7, 0x410, 0x100, {0x77359400}, {0x77359400}, {0x4, 0x7ff, 0x13, 0x1}, 0x1, @can={{0x4, 0x100000000, 0x0, 0x9}, 0x7, 0x0, 0x0, 0x0, "70ff7a7e394ac9d2"}}, 0x48}, 0x1, 0x0, 0x0, 0x4044}, 0x4000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000001900)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000001940)={r6, 0x1}) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000001980)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000019c0)=@assoc_value={r2, 0x1}, &(0x7f0000001a00)=0x8) getsockname$packet(r3, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14) bind$can_raw(r0, &(0x7f0000001ac0)={0x1d, r7}, 0x10) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000001b00)=""/58) r8 = syz_genetlink_get_family_id$team(&(0x7f0000001b80)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001e00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000002380)={&(0x7f0000001b40), 0xc, &(0x7f0000002340)={&(0x7f0000001e40)={0x4fc, r8, 0x504, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8, 0x1000, 0x0, 0x9d}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r7}, {0x4}}, {{0x8, 0x1, r7}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xe96}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2feb}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r7}, {0x170, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r9}, {0x19c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x4, 0x9, 0xa1, 0x81}, {0x10000, 0x800, 0xfffffffffffff84e, 0x4}, {0x1, 0x2, 0x4, 0x401}, {0x0, 0x1, 0x3, 0x401}, {0x4, 0x10001, 0x5, 0x6}, {0x163b, 0x10001, 0x6, 0x3}, {0x40, 0x9, 0x7f, 0x7}, {0x3, 0x200, 0x9, 0x6}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x4fc}}, 0x20040800) 02:53:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xfc, 0x4, {"4bff1c8b9d10f1bab9d65d139c23b58d117e6543ebf7179f353cff45281823a7593a4a1ce8bc2ff3fa37bc3ad4a951be08b131fa038ab5ac49004696a072f4e362ffd264c2f1f54a6c8e872fcb9391e430b8a31e72326e4e6ee867f5eaaa0f8bfd0d5ba0f88969efaee64e8f218f6c241e438d99838b8f3ec263d62aba3e3a5a1e59dc600a3a2f65d420cd2ae3adf4004af1f572e47c7c6976ad4e3c4e7196e55eca48fb30945bbf88b58607763668ceaef040a53132313ee718fdb5966e2c8561e1090c71dee363d816c6e5f463cf5452798bf3409536fb24e532581187d1f592d9"}}, {0x0, "18ab077641d0818af2046984833206fe74e6b54e2029d0118db7b709c93ad9dcb0e01d2f921485fbccfbc998d70cd1d3e959fb688cf500e0defa"}}, &(0x7f0000000140)=""/105, 0x138, 0x69, 0x1}, 0x20) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x40000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$TIOCEXCL(r0, 0x540c) socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_PIE_OFF(r0, 0x7006) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0xc4, "efaf415eeea43f578de0d41ca3ca06b0f1f993a9ffd1d2bc69d9944f33a0924616fb8b883e7e4225a2039d0dfd64a1a26ce28916e194861248d501074d89442bdb9800da6615f5c18fd8d6944d4d33a936f10051cc54bb2856e838cdfc7268e8262927056073515fd716f7a2986c3c09762f682f2947e424c268d6c10d6f7c76d9e0d4c13e10da512e53229b983a42a5ce7651ddbd1e19de2a01e5513acf127c69ba5c6b50180b0a0f194321b9ecc81769294590fd1937c778782c75378a1cd7a72c8930"}, &(0x7f0000000340)=0xe8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000380)={0x4, 0x1, 'client0\x00', 0x7, "01f90f4e4f7d1b21", "bcf5b67f8068cf00bc688d81c5276522024b64137cb6bdbdd0cccc3342ff43af", 0x4}) r2 = inotify_add_watch(r0, &(0x7f0000000440)='./file0\x00', 0x100) inotify_rm_watch(r0, r2) ioctl$VT_ACTIVATE(r0, 0x5606, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000480)={'bond0\x00', 0x3}) ioctl$VT_RELDISP(r0, 0x5605) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000004c0)) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000500)) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000580)={0x1ff, 0x100}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000005c0)=""/1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x80, 0x0) read$eventfd(r3, &(0x7f0000000640), 0x8) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000680)={'ip6_vti0\x00', {0x2, 0x4e22, @remote}}) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000006c0)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r3, 0xc008551c, &(0x7f0000000700)={0x4, 0x18, [0x2, 0x0, 0x33f7, 0x9, 0x1f, 0x6]}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty, @dev}, &(0x7f0000000780)=0xc) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000900)={&(0x7f00000007c0)={0x1d, r4}, 0x10, &(0x7f00000008c0)={&(0x7f0000000840)={0x5, 0x822, 0x9, {}, {r5, r6/1000+30000}, {0x1, 0x0, 0x2, 0x6}, 0x1, @canfd={{0x0, 0xe54, 0x8, 0x5}, 0x1d, 0x1, 0x0, 0x0, "4cad16a4d5db7b3314bca217461462c9323749c13d8934b4aa34998a7e97e6d37a9b8369b7ca3bf096ae13032ac09a369e1e3543de2b97abffe9a31d3585ec4b"}}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x400c840) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000940)={0xffffffff00000001, 0x1, 0xaa, 0x5, 0x4, 0x400, 0x9, 0x1, 0x100000000000, 0x4, 0x80, 0xffffffff80000000}) openat$ion(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ion\x00', 0x40000, 0x0) 02:53:50 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20001, 0x0) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/loop-control\x00', 0x80, 0x0) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x1, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)=0x0) r12 = geteuid() r13 = getgid() r14 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x84100, 0x0) r15 = openat$mixer(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/mixer\x00', 0x200, 0x0) r16 = socket$inet_smc(0x2b, 0x1, 0x0) r17 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000800)='tasks\x00', 0x2, 0x0) r18 = accept4(0xffffffffffffffff, &(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f00000008c0)=0x80, 0x80800) r19 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r20 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) r21 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900), 0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000980)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b80)=0x0) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00)=0x0, &(0x7f0000000c40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d40)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) r31 = getgid() r32 = getpid() getresuid(&(0x7f0000000ec0)=0x0, &(0x7f0000000f00), &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f80)={0x0, 0x0, 0x0}, &(0x7f0000000fc0)=0xc) sendmsg$unix(r0, &(0x7f0000001180)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000000c0)="d2bb812792207aa63228e7956bb38bf7322e3a31660f2fe04ae4a1774fec28380afd7da3af5d33635dd55a1aa96c8bce688ae3a9d223", 0x36}, {&(0x7f0000000100)="c7567d0f39d1cfecb0504fca71efd062b415c951102acab7a4834445d7c2401a92a7160aeed67670bbe603db707a7e7f3770f3e360b0b3ea3f3c545ab45691984226375e8c6f7e03b345c4cdc97cd36b883bcf2daac21b81329f0931fd4e850a0ce122e915fce20940f08a728394fb019d08bf3d31b3", 0x76}, {&(0x7f0000000180)="af7545ea4e7e9ca9ded5f0af7f3370a21d1f87e4b6364a343199d3aa7c420ef637ab832847251b40c313882b125a9eafb39b9b01e7053303d3b7d101164d8b7acc97a0c38b3a35b2822e9eb4741b55615784085f099e4a6ad7245ce6d29e8c5fc11911ab04e716d223c852d2686846aa443d8d05f7cf666ae17d0f516a2a54f282cdbecf8222d1540d31336f5e96292d29027a0ab52bcae437de5043024dc1007b268e7f69bf2b6c3fb279f80cf4376e982881d13ab7e4fbaf67c3952841718c7d226decd463fba57c8dbd", 0xcb}], 0x3, &(0x7f0000001000)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r7, r8, r9, r10]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x30, 0x1, 0x1, [r14, r15, r16, r17, r18, r19, r20, r21]}, @rights={0x18, 0x1, 0x1, [r22]}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @cred={0x20, 0x1, 0x2, r32, r33, r34}], 0x148, 0x4000}, 0x20000004) 02:53:50 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc600, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{}]}) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x80402, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x5, 0x9, 0x6, 0x8, 0xfffffffffffffff7, 0xff, 0x10000], 0x7, 0x5, 0xfffffffffffffc01, 0x1, 0x0, 0x0, {0x101, 0x9, 0x9, 0x0, 0xbb, 0x100000001, 0xfffffffffffffeff, 0x0, 0x2, 0xffffffff, 0x3, 0x2, 0x0, 0x3, "281b26483cc996c7818f813eee454cd94e2e95a29720065e4e61d41b64a68d2e"}}) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000280)) r4 = socket$inet6(0xa, 0xa, 0x9cbe) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r5) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000340)) r6 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @loopback, 0x6}}, 0xb8f, 0x3, 0x3, 0xffffffff7fffffff, 0x4}, &(0x7f0000000480)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000004c0)={r7, 0x7, 0x1}, &(0x7f0000000500)=0x8) setsockopt(r4, 0x1, 0x39, &(0x7f0000000540)="a64fb07ab84956b9cacb3e4eb360d77c84461dfc646c0ab583f990a2c558f8dbfbcbd4a3988c1558f796889e7974406cfb8ac218ff2de5da8d2595f2cfb42587ee0ceddf284d962e2bcd8363daf316a581b27845ae0cb247d18d8e4d1c38c1a0bddb397d5d2ecac88e0a63e57cd0c9dc2722ae113ad1e0da3a49a3a0779ee6e887c1fce5188261417b4dc3a147336f6ea5d6a764ccde9958cb3e1b268ca5adcd11c7175d9fdc7ba6480e5674fae2d0", 0xaf) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000600)={{0x6, 0xfffffffffffffffe}, 'port1\x00', 0xc8, 0x1000, 0x8, 0xff, 0x0, 0x3, 0x74fe, 0x0, 0x2, 0xd4}) linkat(r0, 0xffffffffffffffff, r3, &(0x7f00000006c0)='./file0\x00', 0x400) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000700)='/dev/snapshot\x00', 0x84000, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000740)={0x6, 0xfff, 0x1, 0x4, 0x100000001, 0x0, 0x9}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000780)={r8, 0x4}, &(0x7f00000007c0)=0x8) timer_create(0x5, &(0x7f0000000940)={0x0, 0x39, 0x2, @thr={&(0x7f0000000800)="86f1b700e3de6d8e23f6b16ec5b208f56191df6a0d6667770800ea2b655bb07011f05bc24d92bdd07af10c0a590df2484ccf5157beddbe60a9a0c4d49d56e8a17211f9ef68edde161e9dbaaa8c9d496bdf7b0896ed4feea3fe465a6b304b15cdb3a4c13596a3810569cd8d161f98d4fcc814af417ec218c262b123a940b93c9dcb654339", &(0x7f00000008c0)="43e47bc0445e674e923c94b7b48e008a4e8915655c75222a138b3163cee17d2efabfbf0957280349e0317a00213e3d404ba8f3b123e25949e1143664b85b15a71d55f60f487c81dff5939869e68c986ebc335d5068cc067f0eb3b25f4f921ad09cb963f6177f721284a9623b31e866c367f1"}}, &(0x7f0000000980)=0x0) timer_settime(r10, 0x1, &(0x7f00000009c0)={{}, {0x0, 0x989680}}, &(0x7f0000000a00)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000ac0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x508, 0x268, 0x180, 0xc0, 0xc0, 0xc0, 0x470, 0x470, 0x470, 0x470, 0x470, 0x6, &(0x7f0000000a40), {[{{@ip={@multicast1, @loopback, 0xff000000, 0x0, 'bond_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {0xff}, 0xff, 0x3}, 0x0, 0x98, 0xc0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x4800000000}}}, {{@ip={@multicast1, @local, 0xffffffff, 0xffffff00, 'yam0\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0x2e, 0x1, 0x4d}, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0x5}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x8b}}}, {{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x31, 0x6f47, 0x3}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x800, 0x200, 0x401, 0xaf, 0x3b2, 0x3], 0x1ff, 0x0, 0x7fff}, {0x7, [0xfffffffffffffc00, 0x2, 0x4, 0x8, 0x3ff00000, 0xba7], 0x9, 0x707c6cff, 0x3}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x568) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000001040)) exit(0xffffffffffffe95f) openat$cgroup(r6, &(0x7f0000001100)='syz0\x00', 0x200002, 0x0) fgetxattr(r9, &(0x7f0000001140)=@random={'btrfs.', 'mangle\x00'}, &(0x7f0000001180)=""/193, 0xc1) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000001280)={0x10d0, 0x8, 0x7, 0x1eb}) r11 = getpgrp(0x0) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f00000012c0)=0x0) kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r9, &(0x7f0000001300)={r9, r4, 0x8}) 02:53:50 executing program 1: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000180)=0xe8) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x3, r1, 0x35, r0}, 0x10) r3 = timerfd_create(0x7, 0x80000) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r4 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x111002) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000280)=@generic, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4}, 0x40000100) r5 = getegid() mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x1800, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x100000001}}]}}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback, 0x4e21, 0x0, 0x4e23, 0xac, 0x2, 0x80, 0x80, 0x7f, 0x0, r2}, {0x8a, 0x6, 0x800, 0x80000, 0x2, 0x400, 0x9, 0x8}, {0x7f, 0x6, 0x7fffffff, 0x1}, 0x9, 0x0, 0x1, 0x1, 0x2, 0x3}, {{@in=@broadcast, 0x4d2, 0xff}, 0xa, @in6=@mcast2, 0x3500, 0x3, 0x2, 0x101, 0x7, 0x100000000, 0xd99}}, 0xe8) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f00000006c0)=0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000700)={r7, 0x581b}, &(0x7f0000000740)=0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000780)=0x5, 0x4) msgget(0x2, 0x400) prctl$intptr(0x2b, 0x101) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000007c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r6, 0x40bc5311, &(0x7f0000000800)={0x0, 0x0, 'client1\x00', 0x3, "65ebb31fc3d7228d", "061da506103606c4c04474984209740cfb34e74a172c9b2494b2a955ece4d300", 0x1, 0x400}) r8 = semget$private(0x0, 0x0, 0x5a0) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f00000008c0)={{0x2, r2, r5, r2, r5, 0x4, 0x7}, 0x7fffffff, 0x2, 0xfffffffffffffffb}) readlinkat(r6, &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)=""/165, 0xa5) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) fcntl$setstatus(r0, 0x4, 0x2800) open_by_handle_at(r4, &(0x7f0000000a40)={0x1008, 0x3, "b4942ab0448147a8bcd3b4ea08112aa6a3e1bf8a1655caeab82cb51eccf213b59f6eb6d6207be79af03f9113aa31a9a683fdb73b8a2a5726a02cf6a63572a256e23a81f6b6a83947144570312aa83366e93181b87e7d0d6d16c4ffb28c2299e034dc65cd3748d1343dd6a991fb0af95c47245a563494ba1a6a2139e9480fae6bcd6ea278cb7197bf65e70fc1a73a46a0d45ff86f603cd718e138961ffa7a60c637ddceaf08365b704c11ae16a4ab19fc991a5fb56ea255f7c19df572802d9a3486c4fb43901773e1b63d5f5f3d65379c3eee1063995f4e6a29553aa29d6e899c1b69474a00c26bc514afdc91d9e8d2284f8202c6d8a83dc1e7edf12d7fe3cee5c7d7b247e58855e86d833419f7fd82c2e7ff30bf3a22954fc50dc30c58609dd203564ab5c800ba2e7c8764638c06bce425a497d4c61ab08e63940cf95d86ce4197927a09d5abb17d9641f0871afc896eae73666c8639ec1f51055e969b28b8aef308b5743a4381dd9a12e9bd2ecf1ce4d27912f33f97b61b4129c895173975723a648a460a5458913cf82d662e4f2c5371dea4a93c8bb50b58a7f184cda36f2eeaec8c9393f4ef806ecd1c69200684bbe3e34a4c36edd2044f7282dea1a9864d5db07c23e240f0a4951f7688c8665e35fa502b404e7410c6538da679d97d5cdd3659cc142b3d687c526f59e417d21192460a03817a6daf96fed6eb717e3483f18cfe879024dbb4e39c73e483370dea86c1079fc1b1cce69a0ac65d4b0926402fb80f3ad3aebef03804f8adbb7a03da428a2c98a9678f72253377493ec0f70ade67ab22197e85fcee18f1e76efbd0bfca3b95e7f83596db663a0231ae8ca8ae3d03d824aaedcde2a8f305f067a7c5cf5b90b292cbc9052d39095031b6b04284bb52884f336f2732a65bd33d72c6c0dff970f19f1471627bf9be329e63d9d0a60f8ef3d45b5176d3ca51c8d81b2c000a585f6ba50b11a06205456d80a88cb9e6b99848b18294082110dbf8047ee99b06ce72b806b1b89d5a5ac6ce08bf9876d22ca49dc8f7b2e53375ad634e4eb4201d313d2ec82c5002564ab4e88f535e7798487014b90cb7d6defca7aced8f1d97311d0bebb4f5337ad3758092e664b0d142714bbd4b30d924ad9cd769269ab141c37f1dc973d332fd28198e3f9a4b2a039ff6acd177986cd25586d40f082327931f59606a71fac1bb46e4dc091f6751c9b687a1eedccc818b7e49ea6f1c29ac0f6b963d33985ecd821ca7b6b71248c74498d2b1da675bcc8433aac16eb4bdbc6c27a960ea5d164d1fb6953a67cc9bf99502778bebfb75c022df123aafb9b860623f5483f55f5a943e9624d0b05e7444e4affd6114e0df4f927efd182f2aaf78a89eb933ab3cf1194a23623aa38d1bb85e0d4132fcfe1105102f9752f335370ec4ca430a4946058368f18c1c9fe71bf2234e081ecac15c213f83c417d152af5ae3337c2cba61f0f98adb2d6f2a8a8f39a4e58ecd880f9735231e6995f61aaecb0f073cc176fe99a4e9eb012a7ee300180e1ef9d8eadd9e119b797b89e723b21e3b96e500b053f1061c68535dc0818657ab84ab58e7fb95d6769ee358c08d56753c50788f40af8e986725891048bb2650ed3e23a57707471dbdbb21a064738c4ba28722fe4984cfeb3fa967210bac75b5c74a8e558303db9b4a0ecf8722d5c76cb8603d0c72e3310b9c881a156c5e46610fa0432da79f4d2877e78a29c017063913403faff4e0aae57ccc874d49e6daf1fd64f04282deab184bf17e35771654dc98577d33d2116f738109eec9f0570e08b5d45937dfa4987c56334354f5ba141cfc7cad74c3d5d2fd8345c932987adf69419dccc4dd3cf6f81a9bb62573a8742a40725846d439c734907ee4379db5b2259d3babd98a6eb17fd75f996578cd9720363f5c27a1162ea167e52e64193b822ab68306fababc0bc8e41810ff4a4f9f1e88c890970cdc2f10a9eb1f753e243e28b7ad9b35da7088b34604fdf237e36c67136c5ced184a3a4446d74a603aaf9d90ea9834f475e2f1a140c67e77292ed408d420abf9c67ec597e22eead9a7892791223f012ce93e65bc89e5738931960b56cca5dd76c5066dcf441e9d413b08de4ad2e6f1191750ad2e18278df60107a24718a7c5db9f982ccbcfe12ce602130fe9de0fe3682f47d2915393449e83a9b7704709574e973939d6127a03f3b269fef8cbf9ddc254a324657c805ef95d47f38707fbd07701ce56411c7dd55ab38e60d23881a45444e53fd76427d1d86dd5c477f0e145f5208ff11971647b384c93c0ba6f3e5d27e9fd376e252cfdffb7c995665d32afc15baab696a312873a8ada894304179618a6a311532e1381168fedf04d2ff36f12347415729e482e7cd637fb7a860c4546cbb75bd6bdc1613284edcdd826d099e44867e80d0a93243ef8b0867f8c807992f55c543b35c587aa66fdfe63e19bce42db77d7cce212f6bb4457e6f895f04a557e0d232b8b66bf02b5c85381d2f5e53b9ee63becd87f4898a376bc6992a7fc48df7b3476d99e694fbbc97fc8491c1b564c61526e1a6da8b0fcca0ac6108a37ffeee461b1bd9da4c30ab9a312380aa9d2a2ff88a13104cda8df3839f0ecf83d5356ace7a2339ab34d70076af82ab5b57766b359c0e153f1c2307bdd794b49182599b80b474cb4b871f360b0bc361cb321fdbbfbbbb3ee5e96799632d7032af78dfd52a3d0315a37fbe3fe04c9b65c5d6a526dd8a2d1134b1fcc42138d89dbccf980e5f3ecd138ada6496d5832bae333e65cf958c3bbeb257b6d0717845c2cca53a05330cd261a936f8e98cf0f481d18856f246cfe27553bc6cfa525b5117dd1a9b3642a1ed0df052d9eb1bff965f1dd639fb8516902d6c7fab252583e1a06ea5b1d8f887cb357f672c7777e918a3da1c3c7a41216a5c37711d8e35ba2074b480595b11edc548df7da460721d76bee01fd055bb4a6d05bdfdfcce90376f92a24c122502da0c9befacfb0827f5198b1d3ddec8278b6845f80b56180f148080e1ee4be3845ac5425f1746be8eb2583a397af5ed38e1ec150a76bdbf1597bb614df07c42220773c12e7bcdd6c1e39d2d3a2f95c5493bf4e07b4eb8944d13c4b5ab1a15091453dc9a2ecb8f490b9036ecfd0ec8971fe65514d70fa3a0927c771170a1ce494677ef0b9eadd44036d74b70bee25fd56e9d3dfae551e4917dcd326de35be2980779b11a96bcab3bff355a9818f051dc8d6c966fe5bdb649a2b4506aa38a81bfb8e0f2b64084be7802b7e0eb3ea32c2059d9210d796ef234df70b1203d0961f1be048dc2c6dde0fd7473c3dd68e237d6d7e00ef4a493b322d00b6c7b6437f0a29863f0d8f5e94a8206ad66bde65c3a75d3d062012579d456dec12f994fab25920f85154eeae3c7fe1483a6424656b4611a65f1afdd6ed3f76affcb0baa28593c0844cbb6513b1247e04928660e682064dc3517b0abbc7f4165d0a321026f8a643f6c659015525f2f33dfcf200d11755a9522690ba651d33d20a054c87f46aa595b84b1909be635beac65ee4243807d8df501b6c4e4f647376da709faf99eb78a1271b2e17a9391d4de092308349872c022249af5dc8370dc64d7c30757b10ea11b5a80114a5a549bdcce628399094a273bf4afa51df7553fe0587abd8068b85f3d3c3ada3462488f25c3f282a893fbb8c1a089e17f23d83358d59b90e7f4188a78b4edff477e7edf12665a8a51ae2385b938915d48910e7005e85dd5539825230daf05e17841e14c3fe77509a57c1576b379e14ccff871fda835086ac29fb1d64edfaed11d71df5604d1aeab2b7a8e1476754a89a45e09b28f4fdbcab2109d234ed8d1075d96b497468f5bc05ee127b1efa7b25dab7b7a5e33c450a11e5904f9b56a64c812fd0051ff78da9e436523d33b47a9bc1759a55b4667c73c32cfd29f9578c2d540a2dd192b0ad4441a8f5400b607623e202327dee8a2bece1259a19713fecec9b15bcc8c6cabb4b00620482e97606f5720edfae71853dfe3256742909f1af03e52e2379c073bc9399fe04e26fc6b27102c28f3c64c5821e5ee9b2c032272cb109e2a6fc768a36da49149c0a5e71f24d3bd0dc8118362c0fe04e35dec66abeed1d207090127f6d39c787fc88efc2eac8f406a86c0bcf117b213177dd38b413ca82aa0e5e6717c12614d0a6689b64dc45364d094af51715d12d32c1d1678774e3062fed0006fe60dc216ec967103b0e9f67121ed83686618ab7b84733746f4e69d4163698ee1ea1696f7c2ba1f5fa70a4236f6e47b41ca8484c6aca13c2806fe0af7399185a47ecdc5a46324aed4bd296e81bff442e9ce2be6b3a4f3836d1ba777807f526baeb7c2cbef87b446b98cfa651b8488ed2cc17433f6a079a3b348f10b4d56ac975cf6961373a2f547a245efe534aa29a5331126c2c8576a5098af5c91a3cdfdd1df6f60667e615b5e37cd6897941ef6d49f2baac555afeadbf077206f2e0199a4eff5e66a075f0a99d106510cd93736e959a2a463f530def5bb36f8d0e188e9ac84bf73b0460ec03f741522abdc02d43ebc0d1d0a655584ef4ea44d1bc1d3afa715bc0bbeb106a1d65f09c496d1616ee5f8bdbb516a4c0f941009925248627e2d7add7fce27910b36a12841b685b36111b3ea44e926a9a8f8ff0e7817b4065cf95cf065afff44b127b17290a258f0ec20d570398fd631867387a5c486f546573ac2459e8ac7eb56d32b1f7942f2fadd863fff58e114f47169a12e551d622be68866075fb7a92a83b4eb6d050854e2b1f30f1422d8d346328ab0652b309801b344a0175541522c582057faed7cc4db9ce6848e3d72b02ff87f4cf68729e3609b637053ebb0f59dde724c6fde415d18f8a1f8bfd91bd159ff99b4d144b3ef10c34e2522ec44544357cb60d2472509e55f3604b695624b7211f2b24f35c0d64bda4ce229a1ae44260b7bfe6377fa2999f53319e6ba00921ef308723deba6adda7286dcdc4a33d122cb0bb2bc98d2cccf233b1e828f82d595649677edd07c577ba9e28dd65b91f39d336f46b351dce858a5be7aaa0348cc1c6b399f0fb2f39139014c16d342506c7ca29a3461ac35b8e2c9bfa0eae10a0f4b129dd811bccab66c89bf70469650a3df03d100ab608c0456972842ea9c26644a66abcbd967fc31f6785661cce9c74c07f51737d9d3bce08c44ad12dbfe18e645bfc54c0f727dfc17473b9e475a2cfa6466b20c376b92be7c5dc824e487d2616f3181cb4d6b1ba7f9b055a89ed34cbec69191ef94b6895e08b6065f4be5a4abbe93f07abd73fae307c72e95651d13c3a6c049b01ad6d9dfcd1079789ceef75e3f020bf31ed2960bc33ed528f040b16f9ca8d41ed33ac4ede4c3cc3981304f74a0288632bb9d8a6bb67bb7ea9242d591a5d4e8bbaa99bc8f2bba65ef9ad0b0f7887c720383df23b087ffbb6a7668c45f6de2ba4363a68464f02f09f9c234ac9c7c00b2a3c6c3e4a82700449d10a9089b1a71c3c629c8427e277e3d99c52fbd0a5cc7f2df88c31482514fe428b88a9b7b1572182e5c8bc0fd2e175dd6ab5cc008d28b7cbcfc60d8f347b716e2a156c5f44d28eae4b5427578c9ad773af7286f116bde07d05144cdce94f4b3df84ac310cf5241ceed045c00e59ecbf69db77b682f14142071ac54e8b115d661db49d47d0f3eefbfb583a38d68ffe4bbcc2d7dd33cc160d404744ba3a7b2090cd544dd4952cb15e6bc1603fbf04653794f21c220b5f365da5538729d5a132e8ff15c58482cc6b996889e0977fbaec706e70049e47a"}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/zero\x00', 0x101001, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001b00)={'veth0_to_team\x00', &(0x7f0000001ac0)=@ethtool_eee={0x45, 0x1, 0xfffffffffffffc01, 0x0, 0x1, 0x1, 0x6, 0xfff, [0x400, 0x1]}}) 02:53:50 executing program 4: eventfd(0x8000) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$KDDISABIO(r0, 0x4b37) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x6, 0x4) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)={0x0, 0x800}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000180)={r3, &(0x7f0000000140)=""/49}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xfb, "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"}, &(0x7f0000000300)=0x103) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000340)={r4, 0x10001}, 0x8) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000380)=0x27) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000003c0)={r2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='lp\x00', 0x3) fsetxattr$security_smack_transmute(r2, &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000004c0), &(0x7f0000000500)=0xc) io_setup(0x800, &(0x7f0000000540)) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) write$FUSE_GETXATTR(r0, &(0x7f0000000580)={0x18, 0x0, 0x1, {0x400}}, 0x18) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) ioctl$BLKBSZSET(r5, 0x40081271, &(0x7f00000005c0)=0x1) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) sendto$inet(r1, &(0x7f00000006c0)="d776580e", 0x4, 0x800, &(0x7f0000000700)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r7 = getuid() write$FUSE_ATTR(r0, &(0x7f0000000740)={0x78, 0x0, 0x5, {0x1, 0x0, 0x0, {0x3, 0x8000000000000, 0x4, 0x41e, 0x8, 0x3, 0x9, 0x8, 0x3, 0x1f, 0x5, r7, r6, 0x7, 0x2}}}, 0x78) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000007c0)={@local, 0x0}, &(0x7f0000000800)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000840)={@local, 0x3a, r8}) io_setup(0x7, &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000008c0)=[@in6={0xa, 0x4e20, 0x1, @empty, 0x9}, @in6={0xa, 0x4e22, 0x80000001, @ipv4, 0x2}, @in6={0xa, 0x4e20, 0x2, @remote, 0x9}], 0x54) openat$cuse(0xffffffffffffff9c, &(0x7f0000000940)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000980)={0x79, 0x0, [0x2, 0x1bfe80000000000, 0x9]}) [ 175.122667] IPVS: ftp: loaded support on port[0] = 21 [ 175.123323] IPVS: ftp: loaded support on port[0] = 21 [ 175.148381] IPVS: ftp: loaded support on port[0] = 21 [ 175.170273] IPVS: ftp: loaded support on port[0] = 21 [ 175.177000] IPVS: ftp: loaded support on port[0] = 21 [ 175.179281] IPVS: ftp: loaded support on port[0] = 21 [ 177.657584] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.665600] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.676046] device bridge_slave_0 entered promiscuous mode [ 177.697494] ip (5584) used greatest stack depth: 16184 bytes left [ 177.709450] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.732049] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.747686] device bridge_slave_0 entered promiscuous mode [ 177.780443] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.796390] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.810845] device bridge_slave_0 entered promiscuous mode [ 177.830854] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.840102] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.854248] device bridge_slave_0 entered promiscuous mode [ 177.862514] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.873720] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.887796] device bridge_slave_1 entered promiscuous mode [ 177.900966] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.915559] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.934754] device bridge_slave_1 entered promiscuous mode [ 177.950334] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.957471] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.965049] device bridge_slave_0 entered promiscuous mode [ 177.976378] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.983562] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.991612] device bridge_slave_1 entered promiscuous mode [ 178.006321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.013641] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.025027] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.049741] device bridge_slave_0 entered promiscuous mode [ 178.068751] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.075189] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.095627] device bridge_slave_1 entered promiscuous mode [ 178.104449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.121541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.155296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.175221] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.186907] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.202472] device bridge_slave_1 entered promiscuous mode [ 178.219207] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.228793] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.236959] device bridge_slave_1 entered promiscuous mode [ 178.246427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.258978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.276464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.384153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.394164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.414090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.533953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.561386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.592065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.736982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.780599] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.807651] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.828691] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.929008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.960428] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.989432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.011536] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.036189] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.066386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.075496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.101402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.125668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.148695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.162975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.186047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.198108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.240336] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.267653] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.289312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.307675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.315664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.346158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.378122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.392637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.407220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.414219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.447767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.470875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.512236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.533944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.571023] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.587914] team0: Port device team_slave_0 added [ 179.593495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.639408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.724612] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.732545] team0: Port device team_slave_0 added [ 179.741517] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.752880] team0: Port device team_slave_1 added [ 179.803628] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.846365] team0: Port device team_slave_0 added [ 179.865541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.903507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.916686] team0: Port device team_slave_1 added [ 179.926667] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.938670] team0: Port device team_slave_0 added [ 179.949934] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.958690] team0: Port device team_slave_0 added [ 180.015736] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.049411] team0: Port device team_slave_1 added [ 180.059144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.075254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.092507] team0: Port device team_slave_1 added [ 180.111044] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.119064] team0: Port device team_slave_1 added [ 180.128006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.134897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.146154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.161300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.171846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.184299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.204444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.218776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.229156] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.244428] team0: Port device team_slave_0 added [ 180.255999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.266598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.286859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.296903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.315763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.323750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.339401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.350274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.363887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.371331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.396760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.404929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.426438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.434158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.444309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.452884] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.461596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.470161] team0: Port device team_slave_1 added [ 180.477389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.487901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.499376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.517467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.542057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.561853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.570622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.587713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.602547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.612616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.622173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.632231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.647945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.657276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.666290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.674339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.710667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.726672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.745924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.754523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.774218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.791802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.811007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.823997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.846335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.865992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.878632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.886510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.897802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.906891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.930099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.946246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.976193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.997282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.005007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.019962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.037427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.053983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.078169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.091550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.108803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.229635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.237742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.262229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.244785] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.251381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.258463] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.264869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.285867] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.296252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.311745] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.318193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.324935] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.331374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.340011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.457612] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.464016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.470739] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.477148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.492502] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.501828] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.508242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.514911] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.525006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.553320] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.700635] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.707078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.713774] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.720213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.733276] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.844235] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.850695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.860776] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.867246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.890326] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.326330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.345994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.367828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.383010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.390315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.796565] ip (6058) used greatest stack depth: 15800 bytes left [ 187.804843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.991424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.037339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.147159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.255854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.266544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.428724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.437105] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.567930] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.658492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.708877] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.854681] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.876542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.893303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.931764] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.951604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.968283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.035253] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.041571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.057822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.097828] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.193505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.204237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.214751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.361842] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.389480] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.405784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.426105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.487219] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.566529] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.727541] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.736653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.743921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.780383] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.982050] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.307053] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.637118] Unknown ioctl -1066900319 [ 192.661397] Unknown ioctl 19459 [ 192.677809] Unknown ioctl 19586 02:54:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='projid_map\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000001c0)=ANY=[], 0x3da}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 02:54:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x401) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7}, 0x7) truncate(&(0x7f0000000040)='./file0/bus\x00', 0x0) [ 192.707574] Unknown ioctl 19459 [ 192.769139] Unknown ioctl 1075343564 02:54:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/protocols\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 02:54:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0xa0000008}) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x10000, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0xb05, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}}, 0x88) lseek(r1, 0x0, 0x0) 02:54:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 192.976765] hrtimer: interrupt took 33858 ns 02:54:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000340)=""/198, 0xc6}], 0x2, 0x0) [ 193.431410] Unknown ioctl -1066900319 [ 193.431438] Unknown ioctl 19459 [ 193.439220] Unknown ioctl 19586 [ 193.445127] Unknown ioctl 19459 [ 193.449544] Unknown ioctl 1075343564 02:54:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 02:54:10 executing program 4: prctl$intptr(0x1d, 0xfffffffffffffd69) prctl$getreaper(0x40400000000001e, &(0x7f0000000200)) 02:54:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x1, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000340)='-', 0x1}], 0x1) 02:54:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x7fffffffefff) 02:54:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) 02:54:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10040, 0x0) getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 02:54:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600), 0x0, 0x8001}, 0x20048014) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000003880)=[{0xc0, 0x11f, 0x2, "b9100a3d9ffe853624a1cfba4e436ff1fff968d0a5844e437f76724edaaf16abcdc4087ee2ab14c349ade352ac5ad5d36584e515a978e459da02f63afa4280eab13da1df5f9bf5669065b1cd7b838e02887fc77c867c88e3aa5208b70b3a4e81e6c5098324b62a5435b3e9c38f6eaac86b9f38a741d2f78b1f9993d6dae63cdcb143576c6847678587251400b00f530515f24085ec2c9e852935238845238d2122358b32f570e0b704"}], 0xc0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000740)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=""/230, 0xe6, 0x400fff}, 0x40000102) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000006c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)={r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000007c0)={r0}) socket$kcm(0xa, 0x0, 0x11) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000600)) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) mkdir(&(0x7f0000000000)='.\x00', 0xc) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f0000000140)=r2, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x40) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) socket$kcm(0x29, 0x5, 0x0) 02:54:10 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000ba4000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00002e8000)}}, 0x0, 0x0, r0, 0x0) fchmod(0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000734000)=[{&(0x7f0000d42000)=""/146, 0x92}], 0x1) 02:54:10 executing program 3: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000180)=0xc) [ 194.238489] mmap: syz-executor0 (6985) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:54:10 executing program 2: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setgid(0x0) 02:54:10 executing program 3: prctl$intptr(0x5104b0840000001d, 0xfffffffffffffa76) prctl$void(0x80000000000001e) 02:54:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) 02:54:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600), 0x0, 0x8001}, 0x20048014) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000003880)=[{0xc0, 0x11f, 0x2, "b9100a3d9ffe853624a1cfba4e436ff1fff968d0a5844e437f76724edaaf16abcdc4087ee2ab14c349ade352ac5ad5d36584e515a978e459da02f63afa4280eab13da1df5f9bf5669065b1cd7b838e02887fc77c867c88e3aa5208b70b3a4e81e6c5098324b62a5435b3e9c38f6eaac86b9f38a741d2f78b1f9993d6dae63cdcb143576c6847678587251400b00f530515f24085ec2c9e852935238845238d2122358b32f570e0b704"}], 0xc0, 0x400000000}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000740)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=""/230, 0xe6, 0x400fff}, 0x40000102) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000006c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)={r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000007c0)={r0}) socket$kcm(0xa, 0x0, 0x11) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000600)) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) mkdir(&(0x7f0000000000)='.\x00', 0xc) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f0000000140)=r2, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x40) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) socket$kcm(0x29, 0x5, 0x0) 02:54:10 executing program 2: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:10 executing program 1: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, &(0x7f000000a000)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 02:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000380)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x800, 0x2, @mcast1}, 0x1c) 02:54:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10040, 0x0) getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 02:54:10 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000780)={0x30}, 0x30) 02:54:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0xa, 0x36ad, 0x10000000000001, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000240), &(0x7f0000000280), 0x3}, 0x20) 02:54:11 executing program 2: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10040, 0x0) getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 02:54:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x100000000002}, 0x1c) 02:54:11 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:11 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x10, &(0x7f0000000440)={&(0x7f0000000280)=""/123, 0x7b}}, 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/106}, {&(0x7f00000001c0)=""/124}, {&(0x7f0000000580)=""/163, 0x29f}, {&(0x7f0000000500)=""/119}, {&(0x7f0000000640)=""/247}], 0x1000000000000288) 02:54:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000140)=0xd9) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) 02:54:11 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000480)=""/11, 0xfcd8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) clone(0x3102001dff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}}) 02:54:11 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) r3 = dup3(r0, r1, 0x0) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) munmap(&(0x7f000058e000/0x3000)=nil, 0x3000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000040)) 02:54:11 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:11 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#posix_acl_access\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042ff3)='/dev/snd/seq\x00', 0x0, 0x20002) dup2(r1, r0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffffffe, @tick, {}, {}, @connect}], 0xffffff76) 02:54:11 executing program 4: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000080)) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000640)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000600)=0x3ec) 02:54:11 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:12 executing program 4: r0 = socket(0x10, 0x100000003, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x0, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000980)=[{{&(0x7f00000007c0)=@generic, 0x80, &(0x7f0000000900), 0x0, &(0x7f0000000940)=""/9, 0x9}}], 0x1, 0x0, 0x0) 02:54:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10040, 0x0) getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 02:54:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) dup(r1) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000080)=0xaee) 02:54:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='projid_map\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000001c0)=ANY=[], 0x3da}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 02:54:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000180)="3f456c4a2a48380a33a215390000000100000000000000000000000000000000000000000000000000"}, 0x10) [ 196.352534] kernel msg: ebtables bug: please report to author: bad policy 02:54:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000140)=0xd9) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}]}]}, 0x20}}, 0x0) 02:54:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x81, 0x1, 0xe711, 0x100}, {0x6}]}) 02:54:12 executing program 5: 02:54:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:12 executing program 4: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0xb02, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x110}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x8) 02:54:12 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000440)=""/246) poll(&(0x7f0000000040)=[{r1}], 0x20000000000000bb, 0xfff) 02:54:13 executing program 4: select(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) [ 196.929549] kernel msg: ebtables bug: please report to author: bad policy [ 197.093600] audit: type=1326 audit(1537844053.178:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7152 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 02:54:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10040, 0x0) getpid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:13 executing program 5: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0xb02, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f00000000c0), 0x8) 02:54:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) 02:54:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) [ 197.239547] kernel msg: ebtables bug: please report to author: bad policy 02:54:13 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xffffffffffffffff) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r0, 0x0) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0), &(0x7f0000000480)=',self\x00', 0xfffffffffffffffb) 02:54:13 executing program 1: 02:54:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 02:54:13 executing program 4: 02:54:13 executing program 0: [ 197.734651] audit: type=1326 audit(1537844053.818:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7152 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 [ 197.804427] kernel msg: ebtables bug: please report to author: Total nentries is wrong 02:54:14 executing program 4: 02:54:14 executing program 3: 02:54:14 executing program 0: 02:54:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) [ 198.021880] kernel msg: ebtables bug: please report to author: Total nentries is wrong 02:54:14 executing program 5: 02:54:14 executing program 1: 02:54:14 executing program 0: 02:54:14 executing program 4: 02:54:14 executing program 3: 02:54:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 02:54:14 executing program 0: 02:54:14 executing program 3: [ 198.150555] kernel msg: ebtables bug: please report to author: Total nentries is wrong 02:54:14 executing program 5: 02:54:14 executing program 4: 02:54:14 executing program 1: 02:54:14 executing program 0: 02:54:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:14 executing program 4: 02:54:14 executing program 3: 02:54:14 executing program 1: 02:54:14 executing program 5: [ 198.363359] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 02:54:14 executing program 0: 02:54:14 executing program 4: 02:54:14 executing program 3: 02:54:14 executing program 1: 02:54:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:14 executing program 3: 02:54:14 executing program 5: 02:54:14 executing program 0: 02:54:14 executing program 4: 02:54:14 executing program 1: 02:54:14 executing program 3: [ 198.662146] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 02:54:14 executing program 5: 02:54:14 executing program 4: 02:54:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:14 executing program 0: 02:54:14 executing program 3: 02:54:14 executing program 1: [ 198.847769] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 02:54:15 executing program 4: 02:54:15 executing program 3: 02:54:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:15 executing program 0: 02:54:15 executing program 5: 02:54:15 executing program 1: 02:54:15 executing program 4: 02:54:15 executing program 3: syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x8cb, 0x4000) [ 199.038464] kernel msg: ebtables bug: please report to author: bad policy 02:54:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000300)) 02:54:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) lseek(r0, 0x0, 0x0) 02:54:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0x227c, &(0x7f0000979fff)) [ 199.239430] kernel msg: ebtables bug: please report to author: bad policy 02:54:15 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x200003, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x0, 0x7f}, &(0x7f00000001c0)=0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f00000002c0)=0xffff7ffffffffffd, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000300)="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", 0x218, 0x8000, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) close(r2) 02:54:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x16, &(0x7f00000000c0)='mime_type&vmnet1wlan1\x00', 0xffffffffffffffff}, 0x30) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x2, 0x3a, 0x3ff, 0x6, 0x0, 0x0, 0x10000, 0xa, 0x7, 0x4, 0x10000, 0xffff, 0x101, 0x9, 0x0, 0x1, 0x5, 0x2, 0x74e7, 0x4822, 0xcb, 0xffffffffffffff01, 0x2, 0x5, 0x0, 0x5, 0x0, 0x7, 0x5, 0x9, 0x1f, 0x20000000000, 0x1, 0x800, 0x100000001, 0xfff, 0x0, 0x7, 0x2, @perf_config_ext={0x7}, 0x10, 0x8, 0x0, 0x0, 0x8000, 0x7fffffff, 0x9}, r1, 0xd, 0xffffffffffffff9c, 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)) 02:54:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x1ff, 0x1) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="490300090c000000ffffffffffffffff02001300020000000000fcffffff0000030006000000000002004e20e0000001007149169b4c891def54a598b812860000000000002402000100f8ffffff000000020000f79e6494bf0c202e00000300"], 0x60}}, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x100) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x40, 0x7}) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x2000b, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x4e24, @rand_addr=0xffff}}) 02:54:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) accept4(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000100)=0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) personality(0xc40000b) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = gettid() syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) userfaultfd(0x0) getpgrp(0xffffffffffffffff) execveat(r4, &(0x7f0000000380)='./file0\x00', &(0x7f0000000580), &(0x7f0000000640), 0x1000) r5 = semget(0x1, 0x3, 0x20e) semtimedop(r5, &(0x7f00000002c0)=[{0x1, 0x7c6b, 0x8ba1b9736ff61230}, {0x0, 0x3}, {0x0, 0x65, 0x1800}, {0x0, 0x7, 0x1000}, {0x3, 0x8001, 0x1800}, {0x0, 0x7, 0x1000}], 0x6, &(0x7f0000000300)) 02:54:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='ip_vti0\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x0, 0x4, 0x9, 0xb, r1, 0x80000001}, 0x2c) write$binfmt_aout(r2, &(0x7f0000000240)={{0x1cf, 0x1, 0x800, 0x216, 0x36e, 0x0, 0x359, 0x1}, "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", [[], [], [], [], [], []]}, 0x1620) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) lseek(r3, 0x1, 0x0) getdents(r3, &(0x7f0000000040)=""/148, 0xab) [ 199.401641] kernel msg: ebtables bug: please report to author: bad policy 02:54:15 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3f80000, 0x400002) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x7, 0x4) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xfffffffb, 0x200040) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x1000000, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000000), 0x0, [], [0x4]}) 02:54:15 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x100) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x29a3, r0, &(0x7f00000000c0)="25bdce5328bb78234e4ca614326ccd656dc84d39f36e971e58b83c84517ed58920ecb4b2d18c2e1297e889753f8fee799c81199cbfc8ae409e2d5f6878c26853832f3f82912a3b07d06837ab607edca7efcb715472f833cc129f2352472f85", 0x5f, 0x6, 0x0, 0x2, r2}, &(0x7f0000000180)) fcntl$setflags(r0, 0x2, 0x1) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10) [ 199.492843] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:54:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x5b9, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x0) fdatasync(r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x101000, 0x0) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x21, &(0x7f0000000240)=ANY=[@ANYBLOB="00000002e5aec65e"], &(0x7f0000000080)=0x144) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r3, 0xfffffffffffffffe}, 0x8) sendmsg$key(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2, 0x10, 0x1, 0xf, 0xc, 0x0, 0x70bd2b, 0x25dfdbfe, [@sadb_address={0x3, 0x17, 0x6c, 0x20, 0x0, @in={0x2, 0x4e23, @local}}, @sadb_x_nat_t_type={0x1, 0x14, 0x7}, @sadb_ident={0x2, 0xb, 0xfffffffffffffffd, 0x0, 0xfff}, @sadb_lifetime={0x4, 0x7, 0x2, 0x82, 0x1f, 0xa1}]}, 0x60}}, 0x4000) 02:54:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x4f9) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x15}, 0x3b}, {0xa, 0x4e21, 0xfffffffffffffeff, @mcast1, 0x4}, 0x3f, [0x400, 0x7, 0x10001, 0x6, 0x4, 0xf800000000000000, 0x8000, 0x2]}, 0x5c) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) [ 199.737995] kernel msg: ebtables bug: please report to author: bad policy 02:54:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)={0x7, 0xfffe, 0x1}) socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1002}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000080}, 0x8040) sched_setscheduler(r1, 0x5, &(0x7f0000000080)) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0xed4e1c1ceec08bad, 0x70, 0x200, 0x7, 0x8000, 0x1f, 0x0, 0x13, 0x1000, 0x4, 0x29e, 0x3, 0x7, 0x0, 0x7, 0x8, 0xffffffff, 0x8, 0x80000001, 0x80, 0x80000001, 0x4, 0x7, 0x0, 0x3b, 0xfffffffffffffffc, 0xff, 0x7, 0x0, 0x39ea1ee5, 0x401, 0x3ff, 0x9, 0x7f, 0x1, 0x80000000, 0x2, 0x8, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040)}, 0x20, 0x3, 0x2, 0x2, 0x12, 0x400, 0x6}) ioctl$sock_ifreq(r1, 0x89b3, &(0x7f0000000100)={'team0\x00', @ifru_hwaddr=@random="cbd98a751412"}) 02:54:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) accept4(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000100)=0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) personality(0xc40000b) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = gettid() syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) userfaultfd(0x0) getpgrp(0xffffffffffffffff) execveat(r4, &(0x7f0000000380)='./file0\x00', &(0x7f0000000580), &(0x7f0000000640), 0x1000) r5 = semget(0x1, 0x3, 0x20e) semtimedop(r5, &(0x7f00000002c0)=[{0x1, 0x7c6b, 0x8ba1b9736ff61230}, {0x0, 0x3}, {0x0, 0x65, 0x1800}, {0x0, 0x7, 0x1000}, {0x3, 0x8001, 0x1800}, {0x0, 0x7, 0x1000}], 0x6, &(0x7f0000000300)) [ 199.981307] kernel msg: ebtables bug: please report to author: bad policy 02:54:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) accept4(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000100)=0x80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) personality(0xc40000b) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = gettid() syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) userfaultfd(0x0) getpgrp(0xffffffffffffffff) execveat(r4, &(0x7f0000000380)='./file0\x00', &(0x7f0000000580), &(0x7f0000000640), 0x1000) r5 = semget(0x1, 0x3, 0x20e) semtimedop(r5, &(0x7f00000002c0)=[{0x1, 0x7c6b, 0x8ba1b9736ff61230}, {0x0, 0x3}, {0x0, 0x65, 0x1800}, {0x0, 0x7, 0x1000}, {0x3, 0x8001, 0x1800}, {0x0, 0x7, 0x1000}], 0x6, &(0x7f0000000300)) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 200.101805] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 200.177413] kernel msg: ebtables bug: please report to author: bad policy [ 200.260009] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:54:16 executing program 5: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x20000000000000}, {0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffd}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfc8a}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe9c}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x7}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r1, &(0x7f0000000540)="2d92ff7c78f100f0dc910b7eb90cd870d2abc4823c82a968b517708462091c8d3b8ad2d3bac39d5da0cff5124e8f60be2ea5f782de180bbec1428141ad60c4439683c7ac9ccbd0c6508a557cd87b373fa7a90f54be6575bd6d732b3080d72e6afe2e1be32929c4329b1ba8cef5ecda3fc49e2355be2ac3197b7fa34da2d697b2031199e4e6e7cfb880b6563487eb8120a9f9c8b275c711ded9361595fa28abe2fd456a47167f6186e35daf6b52f7a8512df22865380f2aa297d58f3b", 0xbc, 0x8) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000140)=0x7) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x101000) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x100000001, 0x3]}, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x8}, 0xffffffffffffffdb) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x0, 0x1, 0x2, 0xc6d, 0xfffffffffffffff7, 0x400, {0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @loopback}}, 0x9, 0x4, 0x100000001, 0x7, 0x1}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYBLOB="9bf7ff0700e76f3f007f004239d864b18c015275b4909d601139f460dd1717673e68b29cc7bb04f3ca0cad9cb2137576adc490c1bc0b4bbc32"], &(0x7f0000009140)=0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000480)={[], 0x0, 0x1a200}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) 02:54:16 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/cgroup\x00') setns(r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x10001) r2 = memfd_create(&(0x7f0000000080)='ns/cgroup\x00', 0x1) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0xe) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') 02:54:16 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x1, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x2, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500", 'GPL\x00'], 0x13, [], [0x80000001, 0x9, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, r2, 0x0) accept$packet(r7, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@loopback, 0x7, 0x0, 0xff, 0xc, 0xffffffff, 0x1000}, 0x20) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r8, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000007c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x2800000000000, 0xff]}, 0x8) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000740)={0x5, 0x20}) 02:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) [ 200.709601] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 200.788695] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.804404] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.816087] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 02:54:16 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2, 0x10000, 0x80000001, 0x42}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x14000000}, 0x2c) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000140)={0x3, 0x200000, 0xffffffffffffff8a, 0x6, [], [], [], 0xcc, 0x7, 0x6, 0x400, "90b62c7db97b4167aee558f40e28dfe5"}) [ 200.893575] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.900927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.910358] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.917268] bridge0: port 1(bridge_slave_0) entered forwarding state 02:54:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x900) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ff3000/0xc000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0xc000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) waitid(0x2, r1, &(0x7f00000001c0), 0x20000000, &(0x7f0000000200)) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000080)=0x14000) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000580007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) ptrace(0x11, r3) [ 200.958637] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 200.961239] device bridge0 entered promiscuous mode 02:54:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) 02:54:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6, 0x101000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x1, 0x4, [0x9, 0x0, 0x0, 0x9]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x0, 0x8, 0xc000000000000}, &(0x7f0000000200)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2bcd97df5b32d65933dcc8a2b244f3115ddb4c5ae1bb65527fffd5e59adb7697938b8fce2c97d035c62734d4b0c00db025d2a5a8f9a6bf73d5177293047c2b8ae140a98cac522df6c1dac09600000000000000000000", 0x56) [ 201.054709] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 201.064768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.111800] *** Guest State *** [ 201.123021] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 201.127339] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 02:54:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 201.157038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 02:54:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='-bdevtrustedvmnet1\x00', 0x1) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r1 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="b963cf9ba184349ed337e4c74eebe4d6736c4408ead140606431be2826649ca9b9323a2c81c6ea96bfaea62571c2e135a0b520313736122aa09724d7fa2a0bff478ad1718f68269dd13b62f7cfec0b442105cd9b200f13614bf977f94684f60df7c5e045d8d4c710dacaf35b3df4a6e7d3a0089f2b19586cf19caaf7ec7f66d0d6e80872e81082d1ea659936688d4f8b3ef9659d632e1440", 0x98, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000240)=""/128, 0x80) socket$inet6(0xa, 0x202000000802, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={"626f6e643000000001feffff00"}) 02:54:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001100)=[{&(0x7f0000000080)="e1170521cf68a61d6920d06c05b58f20aa8b0ea1a13be733caf2ecf7ddcebf120fcdbe80dcfa824aad9cef31e76f59abf7efe6977d21302698468af94cffec21e85a57a8afeab773140fa436b0675655df2bb943c8c2cf776207f47cbc7c2135889838c21a7e85412bd31b8c4fc10e550916ba27015762b035e486802a87f1423ec74e029091a8a8bd251a1162a37e231af9e07c26668d9446d224cbe0b51e112cbd6d0c0c50a8d155842b16236a4360d4d5e4dc10261545fe497d4cd8ddb4bbc33c4551b597245c5b6dfc32ae90bc05187b0910b43a37dd7bbf133b7678a9ff376f7f6560bfb7b45a41b47c45c43dac0fae109f1ab94390cf463c18640d4ebb1264c1b41db568df0fed22af44c91a26cff73a187ec2701f6bc731547cef3bc92c6df2657fa5bc6b9f4921cfee8fc6b7eff55e8c824a3f5c9f8cd6b4c91fbbc9598f03cbba7ebc0d03b6c1ef931cfaaf93a2b86e4217bf609d8d3da877d88b86448646439229b4f3ca27650cf74777f95cdc880bdbdca7474f2b0f19", 0x17c}], 0x1, &(0x7f0000001240)}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0xf0, 0xf0, 0x1d8, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@rand_addr, @loopback, 0x0, 0x0, 'veth0\x00', 'gre0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@loopback, @broadcast, 0x0, 0x0, 'lo\x00', 'bond0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7f, 0x200000) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000480), 0x4) [ 201.191774] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.198651] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.211043] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 201.228130] device bridge0 left promiscuous mode [ 201.229086] CR3 = 0x0000000000000000 [ 201.255659] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 201.267645] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 201.267903] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 201.292586] RFLAGS=0x0001a202 DR7 = 0x0000000000000400 [ 201.302204] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 201.308995] encrypted_key: master key parameter '176* —$×ú* ÿGŠÑqh&Ñ;b÷Ïì D!Í›' is invalid [ 201.311367] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.318864] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 201.324367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.324627] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.333375] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 201.339629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.365044] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 201.375507] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 201.383908] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 201.392723] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 201.401413] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 201.410321] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 201.419206] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 201.429835] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 201.446193] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 201.447206] device bridge0 entered promiscuous mode [ 201.460517] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 201.475720] Interruptibility = 00000000 ActivityState = 00000000 [ 201.477725] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.485737] *** Host State *** [ 201.492541] RIP = 0xffffffff8121198e RSP = 0xffff88019105f350 [ 201.502207] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 201.508826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 201.520111] FSBase=00007f385aee2700 GSBase=ffff8801dac00000 TRBase=fffffe0000003000 [ 201.539072] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 201.550833] CR0=0000000080050033 CR3=00000001ce99c000 CR4=00000000001426f0 [ 201.570197] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c013a0 [ 201.577548] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 201.583719] *** Control State *** [ 201.596441] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c3 [ 201.604229] EntryControls=0000d1ff ExitControls=002fefff [ 201.610280] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 201.619635] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 201.627858] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 201.637013] reason=80000021 qualification=0000000000000000 [ 201.643432] IDTVectoring: info=00000000 errcode=00000000 [ 201.650998] TSC Offset = 0xffffff91da71e59c 02:54:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x8, 0x11, 0x8001}, 0xfffffffffffffd65) r1 = socket$packet(0x11, 0x1000000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) modify_ldt$write2(0x11, &(0x7f0000000680)={0x97, 0xffffffffffffffff, 0x3000, 0x7, 0x6, 0x9, 0x8, 0x0, 0x1, 0x9}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = creat(&(0x7f0000000640)='./file0\x00', 0x40) ioctl$RTC_WIE_OFF(r3, 0x7010) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r4 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x8, 0x8000) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000600)={0x2, &(0x7f00000003c0)=""/195, &(0x7f00000005c0)=[{0x3, 0x44, 0x5, &(0x7f00000004c0)=""/68}, {0xaa7, 0x49, 0x10000, &(0x7f0000000540)=""/73}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x80, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000340)={0x0, 0x8000, 0x4, &(0x7f0000000300)=0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) rt_tgsigqueueinfo(r5, r7, 0x3a, &(0x7f0000000280)={0xe, 0x3, 0x5, 0x4}) ioctl$RTC_PIE_OFF(r6, 0x7006) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 201.655810] TPR Threshold = 0x00 [ 201.659313] EPT pointer = 0x00000001c754d01e 02:54:17 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0xffffffffffffff3f, &(0x7f0000002480), 0x100000f3, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = socket$inet(0x2, 0x4, 0x2) connect(r0, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x2, 0x0, "e46d3dc27b5b48f5550ee307780a3de4d03f7e822d933236db995856d409dfd51c6159c1f095ab85431a52e8c03877d764087db6d5cba5a1f36e2806864ce8", 0x39}, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x1}, &(0x7f00000004c0)=0x8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r1) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000480)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000080)={0x5, 0x6, 0x4f82, @random="07026bc48ac3", 'sit0\x00'}) ppoll(&(0x7f0000000040)=[{r2, 0x102}, {r2, 0x4041}, {r1, 0x40c0}, {r2, 0x2}, {r1, 0x100}, {r1, 0x200}, {r2, 0x18}], 0x7, &(0x7f0000000100), &(0x7f0000000200)={0x8}, 0x8) keyctl$session_to_parent(0x12) 02:54:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:17 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x1, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x2, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500", 'GPL\x00'], 0x13, [], [0x80000001, 0x9, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, r2, 0x0) accept$packet(r7, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@loopback, 0x7, 0x0, 0xff, 0xc, 0xffffffff, 0x1000}, 0x20) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r8, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000007c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x2800000000000, 0xff]}, 0x8) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000740)={0x5, 0x20}) 02:54:17 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x1, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x2, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500", 'GPL\x00'], 0x13, [], [0x80000001, 0x9, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, r2, 0x0) accept$packet(r7, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@loopback, 0x7, 0x0, 0xff, 0xc, 0xffffffff, 0x1000}, 0x20) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r8, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000007c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x2800000000000, 0xff]}, 0x8) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000740)={0x5, 0x20}) [ 201.733831] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 02:54:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 201.872194] Unknown ioctl 1075359459 [ 201.884375] Unknown ioctl 28678 [ 201.894214] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 201.904461] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 201.904484] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 201.943006] Unknown ioctl 1075359459 [ 201.954908] Unknown ioctl 28678 02:54:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x8, 0x11, 0x8001}, 0xfffffffffffffd65) r1 = socket$packet(0x11, 0x1000000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) modify_ldt$write2(0x11, &(0x7f0000000680)={0x97, 0xffffffffffffffff, 0x3000, 0x7, 0x6, 0x9, 0x8, 0x0, 0x1, 0x9}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = creat(&(0x7f0000000640)='./file0\x00', 0x40) ioctl$RTC_WIE_OFF(r3, 0x7010) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r4 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x8, 0x8000) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000600)={0x2, &(0x7f00000003c0)=""/195, &(0x7f00000005c0)=[{0x3, 0x44, 0x5, &(0x7f00000004c0)=""/68}, {0xaa7, 0x49, 0x10000, &(0x7f0000000540)=""/73}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x80, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000340)={0x0, 0x8000, 0x4, &(0x7f0000000300)=0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) rt_tgsigqueueinfo(r5, r7, 0x3a, &(0x7f0000000280)={0xe, 0x3, 0x5, 0x4}) ioctl$RTC_PIE_OFF(r6, 0x7006) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 202.099460] encrypted_key: master key parameter '176* —$×ú* ÿGŠÑqh&Ñ;b÷Ïì D!Í›' is invalid 02:54:18 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 202.245126] FAULT_INJECTION: forcing a failure. [ 202.245126] name failslab, interval 1, probability 0, space 0, times 1 [ 202.264705] Unknown ioctl 1075359459 [ 202.276417] CPU: 1 PID: 7453 Comm: syz-executor2 Not tainted 4.19.0-rc5+ #252 [ 202.281169] Unknown ioctl 28678 [ 202.283723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.283732] Call Trace: [ 202.283760] dump_stack+0x1c4/0x2b4 [ 202.283785] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.283843] should_fail.cold.4+0xa/0x17 [ 202.312389] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 202.322056] ? release_sock+0x1ec/0x2c0 [ 202.326059] ? release_sock+0x1ec/0x2c0 [ 202.330063] ? graph_lock+0x170/0x170 [ 202.333886] ? lock_acquire+0x1ed/0x520 [ 202.337877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.343441] ? check_preemption_disabled+0x48/0x200 [ 202.348487] ? find_held_lock+0x36/0x1c0 [ 202.352636] ? ___might_sleep+0x1ed/0x300 [ 202.356807] ? arch_local_save_flags+0x40/0x40 [ 202.361433] __should_failslab+0x124/0x180 [ 202.365694] should_failslab+0x9/0x14 [ 202.369512] kmem_cache_alloc_node_trace+0x270/0x740 [ 202.374662] ? __might_fault+0x12b/0x1e0 [ 202.379189] __get_vm_area_node+0x130/0x3a0 [ 202.383536] __vmalloc_node_range+0xc4/0x750 [ 202.387965] ? do_replace+0x23b/0x4c0 [ 202.391791] ? do_replace+0x23b/0x4c0 [ 202.395632] vmalloc+0x6f/0x80 [ 202.398845] ? do_replace+0x23b/0x4c0 [ 202.402666] do_replace+0x23b/0x4c0 [ 202.406307] ? apparmor_cred_transfer+0x590/0x590 [ 202.416594] ? compat_target_to_user+0x340/0x340 [ 202.421391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.426974] ? ns_capable_common+0x13f/0x170 [ 202.431403] do_ebt_set_ctl+0xe7/0x110 [ 202.435312] nf_setsockopt+0x7d/0xd0 [ 202.439043] ip_setsockopt+0x107/0x140 [ 202.442955] tcp_setsockopt+0x93/0xe0 [ 202.446780] sock_common_setsockopt+0x9a/0xe0 [ 202.451335] __sys_setsockopt+0x1ba/0x3c0 [ 202.455505] ? kernel_accept+0x310/0x310 [ 202.459617] ? lockdep_hardirqs_on+0x421/0x5c0 [ 202.464241] ? trace_hardirqs_on+0xbd/0x310 [ 202.468602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.473984] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 202.479455] __x64_sys_setsockopt+0xbe/0x150 [ 202.483887] do_syscall_64+0x1b9/0x820 [ 202.487784] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 202.493860] ? syscall_return_slowpath+0x5e0/0x5e0 [ 202.503572] ? trace_hardirqs_on_caller+0x310/0x310 [ 202.508644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 202.513708] ? recalc_sigpending_tsk+0x180/0x180 [ 202.518476] ? kasan_check_write+0x14/0x20 [ 202.522736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.527609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.532833] RIP: 0033:0x457579 [ 202.536042] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.555429] RSP: 002b:00007f87f2d8bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 202.563156] RAX: ffffffffffffffda RBX: 00007f87f2d8bc90 RCX: 0000000000457579 [ 202.571082] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 202.584080] RBP: 000000000072bf00 R08: 0000000000000250 R09: 0000000000000000 [ 202.591363] R10: 0000000020000340 R11: 0000000000000246 R12: 00007f87f2d8c6d4 [ 202.598642] R13: 00000000004c3993 R14: 00000000004d5948 R15: 0000000000000004 02:54:18 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0xffffffffffffff3f, &(0x7f0000002480), 0x100000f3, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = socket$inet(0x2, 0x4, 0x2) connect(r0, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x2, 0x0, "e46d3dc27b5b48f5550ee307780a3de4d03f7e822d933236db995856d409dfd51c6159c1f095ab85431a52e8c03877d764087db6d5cba5a1f36e2806864ce8", 0x39}, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x1}, &(0x7f00000004c0)=0x8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r1) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000480)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000080)={0x5, 0x6, 0x4f82, @random="07026bc48ac3", 'sit0\x00'}) ppoll(&(0x7f0000000040)=[{r2, 0x102}, {r2, 0x4041}, {r1, 0x40c0}, {r2, 0x2}, {r1, 0x100}, {r1, 0x200}, {r2, 0x18}], 0x7, &(0x7f0000000100), &(0x7f0000000200)={0x8}, 0x8) keyctl$session_to_parent(0x12) [ 202.654280] syz-executor2: vmalloc: allocation failure: 256 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 202.694577] syz-executor2 cpuset=syz2 mems_allowed=0 [ 202.706516] CPU: 1 PID: 7453 Comm: syz-executor2 Not tainted 4.19.0-rc5+ #252 [ 202.714292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.724251] Call Trace: [ 202.726864] dump_stack+0x1c4/0x2b4 [ 202.731007] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.736219] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 202.742275] warn_alloc.cold.119+0xb7/0x1bd [ 202.746620] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 202.751475] ? __get_vm_area_node+0x130/0x3a0 [ 202.756477] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.761522] ? __might_fault+0x12b/0x1e0 [ 202.766099] ? __get_vm_area_node+0x2e5/0x3a0 [ 202.770865] __vmalloc_node_range+0x472/0x750 [ 202.775389] ? do_replace+0x23b/0x4c0 [ 202.779219] vmalloc+0x6f/0x80 [ 202.782422] ? do_replace+0x23b/0x4c0 [ 202.786242] do_replace+0x23b/0x4c0 [ 202.789881] ? apparmor_cred_transfer+0x590/0x590 [ 202.794737] ? compat_target_to_user+0x340/0x340 [ 202.799528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.805096] ? ns_capable_common+0x13f/0x170 [ 202.809547] do_ebt_set_ctl+0xe7/0x110 [ 202.813448] nf_setsockopt+0x7d/0xd0 [ 202.817173] ip_setsockopt+0x107/0x140 [ 202.821073] tcp_setsockopt+0x93/0xe0 [ 202.824890] sock_common_setsockopt+0x9a/0xe0 [ 202.829393] __sys_setsockopt+0x1ba/0x3c0 [ 202.833544] ? kernel_accept+0x310/0x310 [ 202.837616] ? lockdep_hardirqs_on+0x421/0x5c0 [ 202.842199] ? trace_hardirqs_on+0xbd/0x310 [ 202.846524] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.851889] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 202.857349] __x64_sys_setsockopt+0xbe/0x150 [ 202.861767] do_syscall_64+0x1b9/0x820 [ 202.865670] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 202.871037] ? syscall_return_slowpath+0x5e0/0x5e0 [ 202.875974] ? trace_hardirqs_on_caller+0x310/0x310 [ 202.880995] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 202.886019] ? recalc_sigpending_tsk+0x180/0x180 [ 202.890777] ? kasan_check_write+0x14/0x20 [ 202.895020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.899880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.905070] RIP: 0033:0x457579 [ 202.908268] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.927194] RSP: 002b:00007f87f2d8bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 202.934907] RAX: ffffffffffffffda RBX: 00007f87f2d8bc90 RCX: 0000000000457579 [ 202.942178] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 202.949451] RBP: 000000000072bf00 R08: 0000000000000250 R09: 0000000000000000 [ 202.956722] R10: 0000000020000340 R11: 0000000000000246 R12: 00007f87f2d8c6d4 [ 202.963992] R13: 00000000004c3993 R14: 00000000004d5948 R15: 0000000000000004 [ 202.983669] bridge0: port 2(bridge_slave_1) entered disabled state 02:54:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mem_hardwall\x00', 0x2, 0x0) read(r1, &(0x7f0000000140)=""/144, 0x90) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000000c0), 0x2) [ 202.990422] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.096100] Mem-Info: [ 203.098830] active_anon:104717 inactive_anon:370 isolated_anon:0 [ 203.098830] active_file:4181 inactive_file:10460 isolated_file:0 [ 203.098830] unevictable:3205 dirty:549 writeback:0 unstable:0 [ 203.098830] slab_reclaimable:9677 slab_unreclaimable:104796 [ 203.098830] mapped:55154 shmem:378 pagetables:1074 bounce:0 [ 203.098830] free:1307183 free_pcp:866 free_cma:0 [ 203.133955] Node 0 active_anon:418868kB inactive_anon:1480kB active_file:16724kB inactive_file:41840kB unevictable:12820kB isolated(anon):0kB isolated(file):0kB mapped:220616kB dirty:2196kB writeback:0kB shmem:1512kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 203.175683] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 203.217109] lowmem_reserve[]: 0 2815 6319 6319 [ 203.225961] Node 0 DMA32 free:2886284kB min:30040kB low:37548kB high:45056kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2887692kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1408kB local_pcp:68kB free_cma:0kB [ 203.285851] lowmem_reserve[]: 0 0 3503 3503 [ 203.290428] Node 0 Normal free:2328356kB min:37376kB low:46720kB high:56064kB active_anon:416752kB inactive_anon:1472kB active_file:16732kB inactive_file:41840kB unevictable:12820kB writepending:2208kB present:4718592kB managed:3587532kB mlocked:0kB kernel_stack:5728kB pagetables:4152kB bounce:0kB free_pcp:2140kB local_pcp:880kB free_cma:0kB [ 203.323689] lowmem_reserve[]: 0 0 0 0 [ 203.328190] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 203.342634] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 1*16kB (M) 1*32kB (M) 3*64kB (M) 3*128kB (M) 4*256kB (M) 2*512kB (M) 2*1024kB (M) 3*2048kB (M) 702*4096kB (M) = 2886284kB [ 203.358724] Node 0 Normal: 4847*4kB (UME) 519*8kB (M) 371*16kB (UME) 281*32kB (UME) 118*64kB (UME) 18*128kB (UM) 41*256kB (UME) 18*512kB (UME) 5*1024kB (UME) 5*2048kB (UME) 548*4096kB (M) = 2328004kB [ 203.377573] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 203.387133] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 203.396473] 18225 total pagecache pages [ 203.400648] 0 pages in swap cache [ 203.404272] Swap cache stats: add 0, delete 0, find 0/0 [ 203.410310] Free swap = 0kB [ 203.413507] Total swap = 0kB [ 203.417102] 1965979 pages RAM [ 203.420919] 0 pages HighMem/MovableOnly [ 203.425062] 343196 pages reserved [ 203.429259] 0 pages cma reserved [ 203.493568] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.505728] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.512637] device bridge0 left promiscuous mode [ 203.519944] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.526431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.533369] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.539860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.547453] device bridge0 entered promiscuous mode [ 203.554953] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.561392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.568121] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.574498] bridge0: port 1(bridge_slave_0) entered forwarding state 02:54:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='-bdevtrustedvmnet1\x00', 0x1) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r1 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="b963cf9ba184349ed337e4c74eebe4d6736c4408ead140606431be2826649ca9b9323a2c81c6ea96bfaea62571c2e135a0b520313736122aa09724d7fa2a0bff478ad1718f68269dd13b62f7cfec0b442105cd9b200f13614bf977f94684f60df7c5e045d8d4c710dacaf35b3df4a6e7d3a0089f2b19586cf19caaf7ec7f66d0d6e80872e81082d1ea659936688d4f8b3ef9659d632e1440", 0x98, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000240)=""/128, 0x80) socket$inet6(0xa, 0x202000000802, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={"626f6e643000000001feffff00"}) [ 203.586318] device bridge0 entered promiscuous mode [ 203.595270] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.602548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:54:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001a0004082dbd7000fb000000001420e944b3778374e8a38a"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x13e) sendfile(r0, r2, &(0x7f0000000040), 0x8001) 02:54:19 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000080)=0x40000000001800, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x91, 0x1b) timer_create(0x3, &(0x7f0000000040)={0x0, 0x22, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000180)={{r2, r3+30000000}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10) recvfrom$inet(r0, &(0x7f00000002c0)=""/248, 0xf8, 0x40012003, 0x0, 0x0) 02:54:19 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x1, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x2, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500", 'GPL\x00'], 0x13, [], [0x80000001, 0x9, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, r2, 0x0) accept$packet(r7, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@loopback, 0x7, 0x0, 0xff, 0xc, 0xffffffff, 0x1000}, 0x20) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r8, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000007c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x2800000000000, 0xff]}, 0x8) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000740)={0x5, 0x20}) 02:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x242) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000100)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000, 0x0) clone(0x48000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 02:54:19 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4002, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000100)='/dev/nullb0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000001c0)={0x5}) io_setup(0x5b3, &(0x7f0000000040)=0x0) socketpair(0x0, 0x80000, 0x3, &(0x7f0000000200)) munmap(&(0x7f0000ff6000/0x4000)=nil, 0x4000) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) 02:54:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xd8010000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:19 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000437000/0x1000)=nil, 0x1000, 0x8, 0x40010, r0, 0xfffffffffffffffe) ioctl$EVIOCGEFFECTS(r0, 0x40284504, &(0x7f0000000000)=""/62) [ 203.760685] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.767261] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.783276] encrypted_key: master key parameter '176* —$×ú* ÿGŠÑqh&Ñ;b÷Ïì D!Í›' is invalid 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x40000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 203.887887] device bridge0 left promiscuous mode 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x200000000000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 204.009119] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600000000000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 204.525701] syz-executor1 (7498) used greatest stack depth: 15640 bytes left 02:54:20 executing program 4: r0 = socket(0x40000000015, 0x5, 0x80000000000) r1 = socket$inet6(0xa, 0x1, 0x100000001) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="ba", 0x1, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvfrom$inet(r0, &(0x7f0000000180)=""/85, 0x55, 0x0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x705000) sendto$inet6(r1, &(0x7f0000000080)="5899e5e2ad3633c7935ce50a00479439b53bf633bc4e35179512e2326d5e86a968fc53c7ea907068ea93f5328fe327772753f5868059257a0037e38d2851e403e2de35a37b1ab56b72ca6eff71ceaed87c82a07ecf9960013d413120c99eff3b44f990924648fd03429991993c25131bd668299c3978b49c69c21fbd04b9184100c98e055b1e2aef3e07cd13428bb83c53cbc3ad65f3d07824ae75f56762005d8451662e39aa1353e6e62d3584fc399234e81450f0f4515a258db826b250a77bb81fb18cc1f41802267931de46921bd682cc0eaff66495fdbf94d196c6884334cdfc629d5422879eb618b0d270c97ce3828ec421d2db83", 0xf7, 0x4000, &(0x7f0000000240)={0xa, 0x4e24, 0x4, @local, 0x5}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0xca56, @dev={0xfe, 0x80, [], 0x1a}, 0x1}}, [0x4, 0xffff, 0x2, 0x2, 0x0, 0xb7, 0x1, 0x6, 0x1ff, 0x7, 0x0, 0x3b, 0x2, 0xfffffffffffffff7, 0x3]}, &(0x7f0000000400)=0x100) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}}, &(0x7f0000000500)=0x84) 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 204.596625] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.603089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.619750] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.626193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.634988] device bridge0 entered promiscuous mode 02:54:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @mcast1, 0x4}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x1, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x2, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500", 'GPL\x00'], 0x13, [], [0x80000001, 0x9, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, r2, 0x0) accept$packet(r7, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000003c0)={@loopback, 0x7, 0x0, 0xff, 0xc, 0xffffffff, 0x1000}, 0x20) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r8, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003a40)={0x0, @broadcast, @loopback}, &(0x7f0000003a80)=0xc) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000007c0)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x2800000000000, 0xff]}, 0x8) ioctl$TCSETAF(r0, 0x5404, &(0x7f00009d4000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000740)={0x5, 0x20}) 02:54:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4002, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000100)='/dev/nullb0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000001c0)={0x5}) io_setup(0x5b3, &(0x7f0000000040)=0x0) socketpair(0x0, 0x80000, 0x3, &(0x7f0000000200)) munmap(&(0x7f0000ff6000/0x4000)=nil, 0x4000) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) 02:54:20 executing program 3: prctl$intptr(0x400000000005, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000740)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000000c0)}) io_setup(0x0, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000900)='/dev/admmidi#\x00', 0x0, 0x0) open(&(0x7f0000000b00)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000c00), 0x0) io_submit(0x0, 0x0, &(0x7f0000000c80)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000340)={0x4, 0x8}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 02:54:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff07, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000680)=0x1000000008004) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x20000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000005e000000ffee5d10d2e614143992050272a9882cc6de0a58a7d4e17c85b78e104cbcba6e8b75b62f43ef185c774423376c7fd33a26bef489faa689dc2e8218dfdb34816222ce8b0d3f777baba8946dbc7b69cc1039415053ecb5cdc4a22e771bd7a2"], &(0x7f0000000200)=0x82) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 204.862562] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.869174] bridge0: port 1(bridge_slave_0) entered disabled state 02:54:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'ip_vti0\x00', 0x201e}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000040)=0xffffffffffffff7b) 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7fffffe, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:21 executing program 4: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)=""/6, 0x6}], 0x1, &(0x7f0000000500)=""/159, 0x9f}, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg(r2, &(0x7f0000000e80)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, 0x3, 0x1, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000240)="54bb202900e4caa9bedb8c4634fbad99fba6ec4a12d6fa5eaa5b39c29720117cfd035ad9e696d7a7f0b9cb6f23e9e4984c0b0e74e755614161cbf797b416", 0x3e}, {&(0x7f0000000600)="68037b3660a704ec092dc64f83c71adc8ef6829d2d3a8acf1ab18288140e89556b6312b7a79357f45febd202782829ed8173f15da7e79ee717e910ca8f23af437b63823fa5919714cb7d2d165965dbf3fda31ffed59d72bc45143a245b6bce9dcf57b07b81db0ac48fb23e0f1d664a4c4c000e3079994c8f23c8afb39702d1dd61252454ad85cc7de8f758de5e846fe1cb8b8cc1d666b383024cb770173a7467", 0xa0}, {&(0x7f00000003c0)="5d1a956afeb05c20d9f59ca914d61dae50287ae9d1", 0x15}, {&(0x7f00000006c0)="781ff2823aa5e6f55d7ce36b33c5a8581f0efff65757e2995ade2a5cc5945d5955e3f2112ff966801ca89d83a1df293624347534049cb9738ab906a123d43b593344bbc01cc6e7de6bc2e4731ab5cad6f1ba77b9937384828562033c266514e681da326e1758e465367b2abb1b4497d787dba9b1e37328d2f4618be7ca3f7d7e4e9113f7f9df565d5d89faa39bd788adb4a92c42bf9ffa8a0ae1c6a36c40351d47fb022c3e19b6c65941117e6e03d7f48b607bbf9c9da5cbd674f0908e9a3e637ba79a7fd3aab57566eb393a0e4cf9d15209b4033428bd3d8d9adc", 0xdb}, {&(0x7f00000007c0)="c9ad429f9b16a0365b61b866e4d24a3b862a53a654088ed5ca6c26cadfe9d8432fe740db44e5688875fe0b77a583db184a16a4d248b63e9cdad67671e18a61c215018070c5db43dc4ba5bd82aaf055b141c82fd67af9f896e08bad24a7f05a7053f0982435f86bcbbfac697752348815380a5cc12d0581846c3d0e864e2e6352234c14f3f8cb75b39d85664f0bc117b3ac49e22e742e1504a3f63c31dad51655072ef89958a6b43d4d0f68cb087ca096aea067332a5f0208533eb2becb5c6f936f3dc476cccdaac31a31ea", 0xcb}, {&(0x7f00000008c0)="ad990785a10e15dfbb359c53f493cbe0991f855f089ae9d12a00af5d7369cbe5ef7a6c41dba3d18700479c131c4e8a2052f75cc36075b8f77f98abfde21e31f019e4f8e007a77a8e1444555a3755d9a1175e75aa85bf74f1d8e58546ee01d5a3798b813e04a62691316897a677a4c334a7a4c7fdada7a4251764c12f83fc3d5e72591af35f04dfa7a6cf680d7b24362df3a269b2df6a4ae27903ab3ea6428fa6a1b6912ce635cd49ce897910d5e46023f4a3", 0xb2}, {&(0x7f0000000400)="4e4468ab6779c9baf2f181f40baa435a14e94f23574df76390acd055750d012cd43fa4277b84c09ed9", 0x29}, {&(0x7f0000000980)="3f8c2c626dcd5c436eb0d7c86e6d2b50dcf0e2e522f34626e9e7bf019732e5113a6a61f73b3060412f45a093eeee0c18c27f8960d37d2d379f9ad3cf1f4ee62530f60d3bb14ccd4453d2a3befe5196246cf8bbd2ee9bcb6657a4f99c16f226f8daa4116d8db878977a22b5dfa9c29d314e0240db09d4b8a8ca0aae9b48d447a5ef53010a017f118e7db15bbade92633eb7eefde69e25fa3be7ddfd91b0dfd281a075190762aad94ed5a14ec96049a4293b075c92fa", 0xb5}, {&(0x7f0000000a40)="013121745ff7816879ccbd583373d9b74470d208852c68e9d09dd1082a1a36d2438785877a673c3c3eba948372048305853def3a9b7c5343090c2bb420ef2c2b6ffd0b7a0e810182973d3cd7a7ce373a080732e546c90fec0830255098653928021b1a4e1aa2f54189e64ca4132874cb9227f5454fc6953835867f54ef07a614deb4abef9eaf06c0c40b61b7d4019331db96d604a9f4653c2c5feea79358000a91623a6fc77bf12cd30d5feefd4e9dd3ba9657b7677261b967176888395b633cb2ab0d67c55b6f3639d4a34ef1e98fee441efe4266286e662a4f5c9bf4d2", 0xde}, {&(0x7f00000004c0)="da24c586c381ddabf8c9a1b7262641d7fafa4c1bd131c9dd63d68ec0592971f9d2846dfb516288221c0f040d8930c4345b68774d000fe0dd23527dcd254b", 0x3e}], 0xa, &(0x7f0000000c00)=[{0x110, 0x10f, 0x1000, "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"}, {0x50, 0x119, 0x0, "9d28f8337d677baf091e30af561c44cae601e6f18a157f22351d232ab4ba8f664c13a6972db6f1d72632a4ed70a9a1511afa428cacb84e33a1ddd53b644f3d41"}, {0xb0, 0x1ff, 0x80, "6c80591a34967d648915c3ad0f2d02826a6b99fb6c5126be9ef29cb90a9ce0042fb33015e8817b7ac812b2d5eea959c1ae189e8ad6b7454cd23454b5695905a9560f07aeb0bfe7b57f86b922a31cfeaa5ead7b462e42ddab5b92383d177a09785f50fcc5601d9712f68a7afe4bdf1e66e8cca95e1e51609e0849bbfc3455c807d95647143c88fe839ffb3023d6780abfaa75a34ea2167789a0cfbc852eb1e8"}, {0x60, 0x1, 0x505f6266, "8f7a2226a6f0f2a4955ecb00e81d1256ab0aac67c469cf2d77b397803ae70e132cab04240f72dfc40e827a7498a64646c4be9cf07cd8daf3962d3ed835128211c2266e7666b97f170a8b2c5c47"}], 0x270, 0x8000}, 0x4) statx(r3, &(0x7f0000000180)='./file0\x00', 0x6400, 0x800, &(0x7f00000002c0)) socket$nl_crypto(0x10, 0x3, 0x15) r4 = socket(0x1e, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000ec0)='tls\x00', 0x4) sendmsg(r4, &(0x7f0000f36fc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000d19000)}, 0x0) 02:54:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x2c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000000c0)=0xe, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000300)=0x10001) write(r0, &(0x7f0000000340)="416c8c0acfcc122573973e398cfa73784b6fa7449e16", 0x16) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000002c0)={0x0, 0x6, 0x200, &(0x7f0000000240)=0x7}) fcntl$setlease(r0, 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), 0x0) [ 205.060013] device bridge0 left promiscuous mode 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1d8, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 205.122546] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 02:54:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000022000200a2f16b2de293f957"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xbc, "2ee97e818f99e09dbf16d278fd01ffa4a6c4322d38b567e6153fc48f13a8cc10671cbe89bc0fd2dbb2118201dcde900c8071e76eacf2c2209301fbef4b01817d493224a69cf2ae77100ba80db1e4cc5facfd5d9e3f4c8e161d9653984525165f3094e4848d7d3eb04aae30bbbcbd96c0632a3b3d19c9091b77482529302104db6562f9f91076446211e829f28a9506cefd32246a4d4dcc742b0204622015d4f6aba38479c373e99ee7fdc0d4efd890c6453538fae92d5923060bbeca"}, &(0x7f0000000380)=0xc4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[], &(0x7f0000009140)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[], 0x0, 0x1a200}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000003c0)={0x4, 0x7, 0x8, 0x3, 0x100000000, 0xfff, 0x4, 0x2, r2}, &(0x7f0000000400)=0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f0000000540)={{0x4, 0x6, 0x0, 0xffffffff, 'syz1\x00', 0x7fff}, 0x0, 0x4, 0x9, r5, 0x2, 0x7, 'syz1\x00', &(0x7f0000000300)=['eth0\x00', "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"], 0x31, [], [0x9, 0x2, 0x20, 0x5]}) 02:54:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000000000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 205.506662] *** Guest State *** [ 205.541219] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 205.589384] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 205.642811] CR3 = 0x0000000000000000 [ 205.665688] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 205.675871] RFLAGS=0x0001a202 DR7 = 0x0000000000000400 [ 205.693866] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 205.715219] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 205.743176] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 205.766340] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 205.787963] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 205.817174] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 205.829445] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 205.838645] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 205.845920] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.847591] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 205.853089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.862299] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 205.868183] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.876796] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 205.882435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.882748] device bridge0 entered promiscuous mode [ 205.891221] EFER = 0x0000000000000000 PAT = 0x0007040600070406 02:54:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0xc5, 0x29, 0x2, {0x4, [{{0x44, 0x1, 0x6}, 0x3, 0x8, 0x7, './file0'}, {{0x20, 0x1}, 0x80000000, 0x7fffffff, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0xe699, 0x7, 0x7, './file0'}, {{0x1, 0x4, 0x1}, 0x7ff, 0x1, 0x7, './file0'}, {{0x48, 0x1, 0x2}, 0xfffffffffffffff8, 0x1000, 0x7, './file0'}, {{0x21, 0x3, 0x8}, 0xcd, 0x38e, 0x7, './file0'}]}}, 0xc5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x5, 0xfa00, @id_afonly={&(0x7f0000000040), r1, 0x0, 0x2, 0x182}}, 0x176) 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4002, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000100)='/dev/nullb0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000001c0)={0x5}) io_setup(0x5b3, &(0x7f0000000040)=0x0) socketpair(0x0, 0x80000, 0x3, &(0x7f0000000200)) munmap(&(0x7f0000ff6000/0x4000)=nil, 0x4000) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) 02:54:22 executing program 5: r0 = socket$inet6(0xa, 0x100000803, 0x29) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000000c0)=0x6b) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) eventfd2(0x6, 0x1) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) [ 205.915737] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 205.923208] Interruptibility = 00000000 ActivityState = 00000000 [ 205.936866] *** Host State *** [ 205.946121] RIP = 0xffffffff8121198e RSP = 0xffff880190717350 02:54:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='irlan0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x1, 0x800000000000000a}, {}, {0x0, 0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f00000008c0)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r4, &(0x7f0000000300)={0x2c, 0x0, r3}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000800)=ANY=[], 0x0) socketpair$inet(0x2, 0x0, 0x7, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000900)={0x0, 0x80000001}, &(0x7f0000000940)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000780)={r7, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @remote}, 0x7}}, 0x2, 0x200000000000002, 0x6c, 0x9, 0x50}, &(0x7f0000000840)=0xffffffffffffffa8) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x400) socketpair$inet6(0xa, 0x7, 0x2, &(0x7f0000000580)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000880)={r8, 0x5}, 0xfffffffffffffe70) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/mixer\x00', 0x210000, 0x0) setsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f0000001d40)={@multicast1, @loopback}, 0x8) recvmmsg(r10, &(0x7f0000000200)=[{{&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000340)=""/143, 0x8f}, {&(0x7f0000000700)=""/37, 0xfffffffffffffe2c}, {&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/19, 0xfffffffffffffd54}, {&(0x7f0000000400)=""/169, 0xa9}], 0x6, 0x0, 0x0, 0x7}, 0x7ff}], 0x1, 0x40000000, &(0x7f0000000540)) ioctl$FICLONE(r9, 0x40049409, r6) [ 205.981836] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 206.015026] FSBase=00007fa8a8049700 GSBase=ffff8801dac00000 TRBase=fffffe0000003000 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 206.046982] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 206.057160] CR0=0000000080050033 CR3=00000001c3642000 CR4=00000000001426f0 [ 206.093402] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c013a0 [ 206.118615] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 02:54:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x2f9, 0xfffffffffffffffb, 0x5, 0x5, 0xdc26}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x80000, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000200)={'filter\x00', 0xe1, "4ae73654b0feb9b6f031462bb94e083d6ac23c8bb2fa4b0f8bdd6f262d50ae5258d39ef352a6fb8be4e5dcf9ce4b244351e27801fcf41e9d46007604c53ed4a12635fb145ed667d9eec6727ac40f7db769c6f83f53f91044236ad7ed171b2cc3a3af25e330d8a96899d32a243e2bb6c35e67fe43fc36b1d0d5ac6bde75fe91a32cd576f76aed8a27834e095fe821cc2ded3becec9f38700a1113d6a06bd8bd2ca47249220115e9c3eba4dae7cd974f57b3af86792d1d6d00ac3c77cf6d43460097f241316d4d6dbf12e523b2d4d318e060f2320786fae483b16a4cf693cc4b4d91"}, &(0x7f0000000040)=0x105) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xffffffff) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0x101) socket$inet_sctp(0x2, 0x5, 0x84) linkat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x0) setsockopt$inet_buf(r0, 0x11, 0x0, &(0x7f0000000300), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x18}, 0x10) [ 206.140729] *** Control State *** [ 206.149679] PinBased=0000003f CPUBased=b5a06dfe SecondaryExec=000000c3 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff0700000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:22 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003500)='/dev/vga_arbiter\x00', 0x240401, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000003580)={0x7, {0x2, 0x4e23, @local}, {0x2, 0x4e22, @remote}, {0x2, 0x4e21, @multicast2}, 0x104, 0x100000000, 0xc39, 0x1000, 0x7, &(0x7f0000003540)='tunl0\x00', 0x1000, 0x8, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x309000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x6, 0x0, 0x8, 0x200, 'syz0\x00', 0x4}) unshare(0x20000000) unshare(0x24020400) [ 206.189627] EntryControls=0000d1ff ExitControls=002fefff [ 206.208150] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 206.245619] VMEntry: intr_info=8000009f errcode=00000000 ilen=00000000 [ 206.269815] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 206.278694] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure [ 206.296168] reason=80000021 qualification=0000000000000000 02:54:22 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00000009000000de27ff52"], 0xc) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000001200)='lp\x00', 0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000180)=0x4) r3 = open(&(0x7f0000001140)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 206.336836] IDTVectoring: info=00000000 errcode=00000000 [ 206.364233] TSC Offset = 0xffffff8f87dcfaff [ 206.379924] TPR Threshold = 0x00 [ 206.397285] EPT pointer = 0x00000001c6dee01e [ 206.417443] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:54:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000022000200a2f16b2de293f957"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xbc, "2ee97e818f99e09dbf16d278fd01ffa4a6c4322d38b567e6153fc48f13a8cc10671cbe89bc0fd2dbb2118201dcde900c8071e76eacf2c2209301fbef4b01817d493224a69cf2ae77100ba80db1e4cc5facfd5d9e3f4c8e161d9653984525165f3094e4848d7d3eb04aae30bbbcbd96c0632a3b3d19c9091b77482529302104db6562f9f91076446211e829f28a9506cefd32246a4d4dcc742b0204622015d4f6aba38479c373e99ee7fdc0d4efd890c6453538fae92d5923060bbeca"}, &(0x7f0000000380)=0xc4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[], &(0x7f0000009140)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[], 0x0, 0x1a200}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000003c0)={0x4, 0x7, 0x8, 0x3, 0x100000000, 0xfff, 0x4, 0x2, r2}, &(0x7f0000000400)=0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f0000000540)={{0x4, 0x6, 0x0, 0xffffffff, 'syz1\x00', 0x7fff}, 0x0, 0x4, 0x9, r5, 0x2, 0x7, 'syz1\x00', &(0x7f0000000300)=['eth0\x00', "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"], 0x31, [], [0x9, 0x2, 0x20, 0x5]}) 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffffffff00000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='irlan0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x1, 0x800000000000000a}, {}, {0x0, 0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f00000008c0)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r4, &(0x7f0000000300)={0x2c, 0x0, r3}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000800)=ANY=[], 0x0) socketpair$inet(0x2, 0x0, 0x7, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000900)={0x0, 0x80000001}, &(0x7f0000000940)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000780)={r7, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @remote}, 0x7}}, 0x2, 0x200000000000002, 0x6c, 0x9, 0x50}, &(0x7f0000000840)=0xffffffffffffffa8) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x400) socketpair$inet6(0xa, 0x7, 0x2, &(0x7f0000000580)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000880)={r8, 0x5}, 0xfffffffffffffe70) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/mixer\x00', 0x210000, 0x0) setsockopt$inet_mreq(r5, 0x0, 0x20, &(0x7f0000001d40)={@multicast1, @loopback}, 0x8) recvmmsg(r10, &(0x7f0000000200)=[{{&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000340)=""/143, 0x8f}, {&(0x7f0000000700)=""/37, 0xfffffffffffffe2c}, {&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/19, 0xfffffffffffffd54}, {&(0x7f0000000400)=""/169, 0xa9}], 0x6, 0x0, 0x0, 0x7}, 0x7ff}], 0x1, 0x40000000, &(0x7f0000000540)) ioctl$FICLONE(r9, 0x40049409, r6) 02:54:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4002, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000100)='/dev/nullb0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000001c0)={0x5}) io_setup(0x5b3, &(0x7f0000000040)=0x0) socketpair(0x0, 0x80000, 0x3, &(0x7f0000000200)) munmap(&(0x7f0000ff6000/0x4000)=nil, 0x4000) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf0000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) 02:54:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0xe) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000002c0)={0x8000, 0x20b, 0x2, 0x81, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000340)={r2, 0x763f}, &(0x7f0000000380)=0x8) accept(0xffffffffffffffff, &(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000000c0)=0x80) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001700)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001800)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000001a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001840)=@getsa={0x194, 0x12, 0x8, 0x70bd25, 0x25dfdbfe, {@in6=@mcast1, 0x4d5, 0xa, 0xff}, [@mark={0xc, 0x15, {0x35075d, 0x7}}, @lastused={0xc, 0xf, 0x3}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd27, 0x5}}, @policy={0xac, 0x7, {{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x4e23, 0x3, 0x4e21, 0x9, 0xa, 0x80, 0x20, 0x2f, r3, r4}, {0x2, 0x8000, 0x3, 0xc1eb, 0x7e9, 0x3, 0x0, 0x1}, {0xff, 0x5, 0x6, 0xff}, 0x7, 0x6e6bb8, 0x1, 0x1, 0x2, 0x3}}, @algo_comp={0x80, 0x3, {{'deflate\x00'}, 0x1a8, "ced36a18088fb2aa564ffdfe294b8236b0ea9a0c2f2053b02e44ecbca2acf6577256524d6962110ae52592f37947f3de8ac63719ce"}}, @mark={0xc, 0x15, {0x35075d, 0x5}}, @offload={0xc, 0x1c, {r5, 0x2}}]}, 0x194}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="b40000000000000015000000000000005700000000000000000000000000000095000000000000006871c94b98fcce35b6202fd7acfc0b5fb31cfe1a466534bd3ede3a118dff7ffab1b12ec7bf16b9e925f37da921cdc023fed0fd6c86d63db8efe29717eae3fe7ae532fd0c9666c54949ffed87ebbaa616b7b8052b95a7299cddfffd15e80b0a3999f5b7fa"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 02:54:23 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003500)='/dev/vga_arbiter\x00', 0x240401, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000003580)={0x7, {0x2, 0x4e23, @local}, {0x2, 0x4e22, @remote}, {0x2, 0x4e21, @multicast2}, 0x104, 0x100000000, 0xc39, 0x1000, 0x7, &(0x7f0000003540)='tunl0\x00', 0x1000, 0x8, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x309000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x6, 0x0, 0x8, 0x200, 'syz0\x00', 0x4}) unshare(0x20000000) unshare(0x24020400) 02:54:23 executing program 4: setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) syz_extract_tcp_res(&(0x7f0000000280), 0x8, 0x5) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000180)=0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, &(0x7f0000000400)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="006340400000000000000000000d000000400086cf3b32000000000000000000000000000262334218000000000700000000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="852a01770000f200", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f0000000340)}) 02:54:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x26}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x7ffffffef000}, 0x1}) [ 207.450802] binder_alloc: binder_alloc_mmap_handler: 7674 20001000-20004000 already mapped failed -16 [ 207.494586] binder: 7674:7686 Acquire 1 refcount change on invalid ref 0 ret -22 [ 207.528103] binder: 7674:7678 transaction failed 29189/-22, size 104189878786-1792 line 2855 [ 207.587582] binder: undelivered TRANSACTION_ERROR: 29189 02:54:24 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0xb) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101040) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000000c0)=""/107) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x4}, 0x0, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 02:54:24 executing program 5: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x10000) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000002c0)=0xbf, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000280)={0x6, 0xe28, 0x0, 0xcf65, 0x3}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x7, 0x80200) sendmmsg(r1, &(0x7f0000000440), 0x400000000000211, 0x810) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x400, 0x402, &(0x7f0000000400)) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000003c0)=0x200) 02:54:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xd801, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000002c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2730a49b3ad5b9cf2723fbc45101d1811cb28e97ea5b85f2740cdf52f1f170a710a2d3b7f8bc1f7ef2f37f5bd31b12adcf4aff0279ad227b6b39728f341db0fd776ad7aca8e3359f1cd3a3a4c259113a93239b6d1aae83d44b11cb923bd4e1656019624d531d28"], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c2134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa684020000", 0x0, &(0x7f0000000200)) chroot(&(0x7f00000003c0)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xdf62, 0x40800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x12}, 0x1ff}, {0xa, 0x4e23, 0x400, @empty, 0x3ff}, r3, 0x2}}, 0x48) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000040)="3e0f22450f2b520066b9860a00000f323e0f0019baa00066b80700008066ef646424abb87d008ee80f01cff466b858c687c80f23d00f21f86635000000080f23f8"}], 0x0, 0x0, &(0x7f0000000080), 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000740)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000540)=[{}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) 02:54:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x2c) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000300)="3d20f3df242dbd1cee6ebae14ce83c52ffbabf2c4d48a3af02d64d88fa0efc7fce32cd786005b9c5a96f577ca386297d404d906a9a5552a035d283ef19758a9fce6e71417d1a6a0326a0e25ec9cf140087be8bcfca", &(0x7f0000000400)=""/104}, 0x3bd) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000140)="7fb9a67d0723973d8f07ecb7ab27595809d89d62e33da3d5d43db874e7e9d6f3792264462ff4424fa0c388f2d9494555fee490f23c15b3068f753cb212f74a31a83edd97622378a7bdea4679d37e3345613f15234d2a2f2a185c47f26cc4a4b2a93e476595f5f37083ddf75a054c25229b5686e8e700adde5c8dfe552c9b7ceb2d50808cd4", &(0x7f0000000200)=""/148}, 0x18) 02:54:24 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e20, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x2d21]}, 0x5c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000280)="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", &(0x7f0000000080)=""/88}, 0x18) r3 = semget$private(0x0, 0x3, 0x200) semctl$GETPID(r3, 0x2, 0xb, &(0x7f0000000380)=""/241) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'lo\x00@\x00', 0x8902}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0)={0x0, 0x9d, "3a6ac5cf1139749817adfee25c4e292b3590310b810be1a8c8a150b5defeb4d713a304aae2efba2db9eec034fb8b0ac3ea3a5d137ea4f6edec0138b0a1b5ed7f0ebab88e6e0349ffa7e65b6f41031bf02571736ad230677850dcdd355d5485c0dbc0cf27685e4347251aa2fb98f7c66971bb7cb15feb7815f0e88719f8ed99942792f1d794df53220c603e5f665c4ac11185893c42cb396326fc625a19"}, &(0x7f0000000040)=0xa5) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r4, 0x4) 02:54:24 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000080)=[0x1ff], 0x1, 0x1f, 0x6, 0x6, 0x0, 0x101, {0x100, 0x8, 0x80000001, 0x2, 0x1f, 0x7, 0x7, 0x0, 0x20, 0x1f, 0x1000, 0x1ff, 0xd0, 0xffff, "21ddf15247a47e6af9a7912b7e100bd002323304b21e7ecd7b2e34635f0449e5"}}) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000000)) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') sendfile(r1, r2, &(0x7f0000000040)=0xa3, 0x80000002) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000200)={r3, 0x3, 0x3, 0x2}, &(0x7f0000000240)=0x10) [ 208.245565] device lo entered promiscuous mode 02:54:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0x1e) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10002}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r2, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x97490a754851e0d5}, 0x0) 02:54:24 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x24100, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x180, 0x40, 0x81, 0xff, 0x9, 0x0, 0x100000000, 0x101, 0x4}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x5b6190bffcf854fc}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000340)={0x4, 0x8, r1, 0x2, r5, 0x1, 0x1, 0x3cc7}) kcmp(r0, r1, 0x7, r3, r4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x5}, 0x1c) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r7, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"c9773dc976706a1bf974f7409716c141"}}}}, 0x90) 02:54:24 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r0, 0x0) unshare(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xb, 0x100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0x2, 0x0, 0x9e, 0x0, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffff37, 0x3f, 0x2, 0x9, 0x6, 0x3ff, 0x9, 0x7, 0x0, 0xfff, 0x7, 0x2, 0x4, 0x8, 0x3, 0x0, 0x4, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x20210, 0x2, 0x1, 0x3, 0x7, 0x3f, 0x8000}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) close(r1) getdents(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0)={{0x0, 0x2710}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x5, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1ff, @mcast1, 0x82}, {0xa, 0x4e23, 0xffffffff, @remote, 0xfff}, r3, 0xfffffffffffffffb}}, 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0xdefcc6608d3e4836, 0xb637, 0xfffffffffffffd64, {0x7f, 0x80000000}, {0x6, 0x20}, @period={0x5b, 0x80, 0x20, 0x3f, 0x2, {0x8, 0x7fffffff, 0x9, 0x178d}, 0x1, &(0x7f0000000080)=[0x1ff]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@int=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) 02:54:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4100, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2b280c36}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r2, 0x0, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xbf}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$apparmor_exec(r3, &(0x7f0000000000)={'exec ', '&:\x00'}, 0x8) read(r3, &(0x7f0000000440)=""/4096, 0x1000) ioctl$void(r3, 0x5451) r4 = gettid() ioprio_set$pid(0x2, r4, 0x5) 02:54:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @rand_addr}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x4, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x0, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x5, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000defffc), 0x4) sendto$inet(r0, &(0x7f0000000040)="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", 0x7f9, 0x800, 0x0, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df5f6e)=""/146, 0x92}, {&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f00007a7f19)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x0) bind$inet(r0, &(0x7f0000000ac0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0xffffffb6) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000840)='/dev/rtc0\x00', 0x2200, 0x0) umount2(&(0x7f0000000b00)='./file0\x00', 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/null\x00', 0x80, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)=0x0) write$FUSE_ENTRY(r1, &(0x7f0000000a00)={0x90, 0xffffffffffffffda, 0x5, {0x3, 0x3, 0x7352, 0x101, 0x318949cc, 0x2, {0x5, 0x3, 0x5, 0x80000001, 0x7, 0x800, 0x8000, 0x51, 0x10001, 0x8000, 0x9, r2, r3, 0x3, 0x1ff}}}, 0x90) tee(r0, r1, 0x7, 0x5) 02:54:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000000000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x1, &(0x7f0000000380)=""/84, &(0x7f0000000700)=""/5, &(0x7f0000000400)=""/162}) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x8825, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000006c0)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)=""/193, &(0x7f0000000540)=""/97, &(0x7f00000004c0)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000000c0)=ANY=[]) 02:54:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xd801000000000000, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:24 executing program 5: socket$inet6(0xa, 0x80005, 0x100) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$void(0xf) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) [ 208.642323] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:54:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x2000000800004c36) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) r2 = accept4(r0, &(0x7f0000000180)=@nl, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x14}, 0xf}}, 0x2, 0x766, 0x40, 0x101, 0x18}, &(0x7f00000003c0)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r3, 0x7, 0x1, 0xfffffffffffffe00}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000240)={{0x9, 0xba, 0x1, 0x0, 0x3ff, 0x3}, 0x4, 0x7, 0x100, 0x9, 0x4, "4b0f2eca035d7e29faf6c77b24e054a86544334e6584f23d66a1a3f689ede6db54a889cd69826e03991dd32f28dec2794103bdae2ead9e05e162b5f7032e67daa3e25e2b95945c4337a7484938547be47627dd3c8e2ae3a4df08c02d780780e90289860b50d2d289f237d22764b168178cfe7f826d0c8ba587ee9b4406f78bb5"}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="000500000000000000001e3a89badf41d2ec30408d6552b1b67a969601c4c246fc2beb5733c0d002f73bc48a2f9f759806b36b924c0001baea82b887c5e8e0e5f98dbcc240711d27f1eaa81a36a2fcd67c51d90495aa80ada6644f08000000d6646f6ae543436be4d727da71e5af01784a51"], 0xb) 02:54:24 executing program 4: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1ff, 0x101000) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40505412, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0xfffffdfd}}) 02:54:24 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x20c000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r2, r3, r4}, 0xc) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400000000032, 0xffffffffffffffff, 0x0) 02:54:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x3, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:25 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x400000, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xfffffffffffffffd, 0x40000) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f0000000540)=r8) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000440)={{0x1, r1, r2, r3, r4, 0x2, 0x6221}, 0x7f, 0x9, 0x100, 0x3, r5, r6, 0x7fffffff}) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) ioctl(r9, 0x8000000000009371, &(0x7f00000000c0)="010000000000000018") ioctl$RTC_WIE_OFF(r7, 0x7010) 02:54:25 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r0, 0x0) unshare(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xb, 0x100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0x2, 0x0, 0x9e, 0x0, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffff37, 0x3f, 0x2, 0x9, 0x6, 0x3ff, 0x9, 0x7, 0x0, 0xfff, 0x7, 0x2, 0x4, 0x8, 0x3, 0x0, 0x4, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x20210, 0x2, 0x1, 0x3, 0x7, 0x3f, 0x8000}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) close(r1) getdents(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0)={{0x0, 0x2710}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x5, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1ff, @mcast1, 0x82}, {0xa, 0x4e23, 0xffffffff, @remote, 0xfff}, r3, 0xfffffffffffffffb}}, 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0xdefcc6608d3e4836, 0xb637, 0xfffffffffffffd64, {0x7f, 0x80000000}, {0x6, 0x20}, @period={0x5b, 0x80, 0x20, 0x3f, 0x2, {0x8, 0x7fffffff, 0x9, 0x178d}, 0x1, &(0x7f0000000080)=[0x1ff]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@int=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) 02:54:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x13, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x2000021c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d137663b, 0x10800a}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000140)=0x3) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:54:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000007c0)={'team0\x00'}) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) poll(&(0x7f0000006540), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x0, @empty, 'ip6gretap0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x100000001, 0x8}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) select(0x40, &(0x7f0000000140)={0x7, 0x100000000, 0x2, 0xd413, 0x1000, 0x0, 0xc3}, &(0x7f0000000180)={0x20, 0x3, 0x200, 0x1, 0x5, 0x2, 0x2, 0x80000001}, &(0x7f00000001c0)={0x0, 0x9, 0x6, 0x9, 0x0, 0x4, 0x3, 0x5b8}, &(0x7f0000000280)={r2, r3/1000+10000}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x5, 0x2a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x1) 02:54:25 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000080)=0x0) close(r2) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) io_submit(r3, 0x12b, &(0x7f00000001c0)=[&(0x7f0000000140)={0x405000, 0x0, 0x2, 0x8, 0x0, r0, &(0x7f0000000100), 0x14d, 0x0, 0x0, 0x0, r4}]) [ 209.254420] ion_buffer_destroy: buffer still mapped in the kernel 02:54:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x14, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000007c0)={'team0\x00'}) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) poll(&(0x7f0000006540), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, {0x0, @empty, 'ip6gretap0\x00'}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x100000001, 0x8}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) select(0x40, &(0x7f0000000140)={0x7, 0x100000000, 0x2, 0xd413, 0x1000, 0x0, 0xc3}, &(0x7f0000000180)={0x20, 0x3, 0x200, 0x1, 0x5, 0x2, 0x2, 0x80000001}, &(0x7f00000001c0)={0x0, 0x9, 0x6, 0x9, 0x0, 0x4, 0x3, 0x5b8}, &(0x7f0000000280)={r2, r3/1000+10000}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x5, 0x2a, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x1) 02:54:25 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r0, 0x0) unshare(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xb, 0x100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0x2, 0x0, 0x9e, 0x0, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffff37, 0x3f, 0x2, 0x9, 0x6, 0x3ff, 0x9, 0x7, 0x0, 0xfff, 0x7, 0x2, 0x4, 0x8, 0x3, 0x0, 0x4, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x20210, 0x2, 0x1, 0x3, 0x7, 0x3f, 0x8000}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) close(r1) getdents(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0)={{0x0, 0x2710}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x5, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1ff, @mcast1, 0x82}, {0xa, 0x4e23, 0xffffffff, @remote, 0xfff}, r3, 0xfffffffffffffffb}}, 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0xdefcc6608d3e4836, 0xb637, 0xfffffffffffffd64, {0x7f, 0x80000000}, {0x6, 0x20}, @period={0x5b, 0x80, 0x20, 0x3f, 0x2, {0x8, 0x7fffffff, 0x9, 0x178d}, 0x1, &(0x7f0000000080)=[0x1ff]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@int=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) 02:54:25 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r0, 0x0) unshare(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xb, 0x100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0x2, 0x0, 0x9e, 0x0, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffff37, 0x3f, 0x2, 0x9, 0x6, 0x3ff, 0x9, 0x7, 0x0, 0xfff, 0x7, 0x2, 0x4, 0x8, 0x3, 0x0, 0x4, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x20210, 0x2, 0x1, 0x3, 0x7, 0x3f, 0x8000}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) close(r1) getdents(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0)={{0x0, 0x2710}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x5, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1ff, @mcast1, 0x82}, {0xa, 0x4e23, 0xffffffff, @remote, 0xfff}, r3, 0xfffffffffffffffb}}, 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0xdefcc6608d3e4836, 0xb637, 0xfffffffffffffd64, {0x7f, 0x80000000}, {0x6, 0x20}, @period={0x5b, 0x80, 0x20, 0x3f, 0x2, {0x8, 0x7fffffff, 0x9, 0x178d}, 0x1, &(0x7f0000000080)=[0x1ff]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@int=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) 02:54:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x2000000800004c36) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) r2 = accept4(r0, &(0x7f0000000180)=@nl, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x14}, 0xf}}, 0x2, 0x766, 0x40, 0x101, 0x18}, &(0x7f00000003c0)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r3, 0x7, 0x1, 0xfffffffffffffe00}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000240)={{0x9, 0xba, 0x1, 0x0, 0x3ff, 0x3}, 0x4, 0x7, 0x100, 0x9, 0x4, "4b0f2eca035d7e29faf6c77b24e054a86544334e6584f23d66a1a3f689ede6db54a889cd69826e03991dd32f28dec2794103bdae2ead9e05e162b5f7032e67daa3e25e2b95945c4337a7484938547be47627dd3c8e2ae3a4df08c02d780780e90289860b50d2d289f237d22764b168178cfe7f826d0c8ba587ee9b4406f78bb5"}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="000500000000000000001e3a89badf41d2ec30408d6552b1b67a969601c4c246fc2beb5733c0d002f73bc48a2f9f759806b36b924c0001baea82b887c5e8e0e5f98dbcc240711d27f1eaa81a36a2fcd67c51d90495aa80ada6644f08000000d6646f6ae543436be4d727da71e5af01784a51"], 0xb) 02:54:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x200000a45, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r0, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @local}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x4000) write$eventfd(r1, &(0x7f0000000140)=0x200, 0x8) recvfrom$inet6(r0, &(0x7f0000000080)=""/49, 0x31, 0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x709000) 02:54:25 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fchmod(r0, 0x0) unshare(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xb, 0x100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x4, 0x2, 0x0, 0x9e, 0x0, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffff37, 0x3f, 0x2, 0x9, 0x6, 0x3ff, 0x9, 0x7, 0x0, 0xfff, 0x7, 0x2, 0x4, 0x8, 0x3, 0x0, 0x4, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x20210, 0x2, 0x1, 0x3, 0x7, 0x3f, 0x8000}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) close(r1) getdents(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x1000) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0)={{0x0, 0x2710}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x5, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1ff, @mcast1, 0x82}, {0xa, 0x4e23, 0xffffffff, @remote, 0xfff}, r3, 0xfffffffffffffffb}}, 0x48) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0xdefcc6608d3e4836, 0xb637, 0xfffffffffffffd64, {0x7f, 0x80000000}, {0x6, 0x20}, @period={0x5b, 0x80, 0x20, 0x3f, 0x2, {0x8, 0x7fffffff, 0x9, 0x178d}, 0x1, &(0x7f0000000080)=[0x1ff]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@int=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) [ 209.708576] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:54:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2c, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0)=0xd, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/225, &(0x7f0000000040)=0xe1) 02:54:26 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0xffffffffffffffff, 0xa8, 0x8, @buffer={0x0, 0xef, &(0x7f00000000c0)=""/239}, &(0x7f0000000280)="ba8ee7126d7a22200f3d4de41a90223d7b8b486244cf2ec29f46708253b32b199b9a77bc78b30ef8dfaf58f61982deb45467b235186944ddcd69b994f94730a7cfda3e0b7b92ce4ed2cd3923292abbcbf232b5402ba78496c25bd154787fde66dfb63d94136a925b7e94978edfd52ab788cacb36e4845dcee9fa90db13fa34052c4c25b48723f5f3d63861482ae8e5ca404f7789f55f6e0817afcf6740d684a51e072e1aa1dfc2da", &(0x7f0000000340)=""/124, 0x7f, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(0xffffffffffffffff) ptrace$cont(0x9, r3, 0x80000001, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000200), &(0x7f0000000380)) 02:54:26 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20, 0xa2c00) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f0000000040)="ba175fbfc84416295ccb512073391f27bbe581c3b1e5367e896dbc57d003bd92b138742e394385a1a65e3b470be24f0553efe47e652d000c67f9ac48720be423c0d033d96ef4abb7b36184c8c4d3d982f9c59df667ac720ba9f0611c4d8b2238a497b0cb1c28100138b1078c306e0e4c9805a1", 0x73) 02:54:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) [ 209.959532] IPVS: length: 225 != 24 [ 209.994461] IPVS: length: 225 != 24 02:54:26 executing program 1: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000027, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)) write$eventfd(r1, &(0x7f00000001c0)=0xffffffffffffff00, 0x8) 02:54:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x26, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x3, &(0x7f0000000140)=""/20) 02:54:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) r2 = socket$inet6(0xa, 0x803, 0x9010000000000088) sendto$inet6(r2, &(0x7f0000000000), 0x3, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c) [ 210.395407] ================================================================== [ 210.402978] BUG: KASAN: use-after-free in _free_event+0x49a/0x1610 [ 210.409303] Write of size 4 at addr ffff880199ff23a0 by task syz-executor4/7861 [ 210.416764] [ 210.418411] CPU: 0 PID: 7861 Comm: syz-executor4 Not tainted 4.19.0-rc5+ #252 [ 210.425689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.435051] Call Trace: [ 210.437762] dump_stack+0x1c4/0x2b4 [ 210.441478] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.446699] ? printk+0xa7/0xcf [ 210.449999] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 210.454771] print_address_description.cold.8+0x9/0x1ff [ 210.460206] kasan_report.cold.9+0x242/0x309 [ 210.464633] ? _free_event+0x49a/0x1610 [ 210.468631] check_memory_region+0x13e/0x1b0 [ 210.473076] kasan_check_write+0x14/0x20 [ 210.477163] _free_event+0x49a/0x1610 [ 210.480985] ? kasan_check_read+0x11/0x20 [ 210.485186] ? ring_buffer_attach+0x840/0x840 [ 210.489704] ? __perf_remove_from_context+0x1ec/0x470 [ 210.494949] ? do_raw_spin_lock+0xc1/0x200 [ 210.499213] ? kasan_check_write+0x14/0x20 [ 210.503467] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 210.508424] ? event_function_call+0x343/0x600 [ 210.513026] ? wait_for_completion+0x8a0/0x8a0 [ 210.517622] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 210.522578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.528142] free_event+0xb4/0x180 [ 210.531701] ? _free_event+0x1610/0x1610 [ 210.535795] perf_event_release_kernel+0x7d8/0xfa0 [ 210.540745] ? lockdep_hardirqs_on+0x421/0x5c0 [ 210.545350] ? put_event+0x60/0x60 [ 210.548907] ? kasan_check_write+0x14/0x20 [ 210.553194] ? do_raw_spin_lock+0xc1/0x200 [ 210.557502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.563076] ? __call_rcu.constprop.69+0x429/0xbc0 [ 210.568016] ? lockdep_hardirqs_on+0x421/0x5c0 [ 210.572620] ? trace_hardirqs_on+0xbd/0x310 [ 210.576958] ? call_rcu+0x12/0x20 [ 210.580434] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 210.585933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.591487] ? check_preemption_disabled+0x48/0x200 [ 210.596537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.602097] ? fsnotify+0xaef/0x1330 [ 210.605828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.611549] ? locks_remove_file+0x3c6/0x5c0 [ 210.616001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.621564] ? ima_file_free+0x132/0x650 [ 210.625659] ? fsnotify_first_mark+0x350/0x350 [ 210.630255] ? ima_file_check+0x130/0x130 [ 210.634423] ? fsnotify+0x1330/0x1330 [ 210.638253] ? perf_event_release_kernel+0xfa0/0xfa0 [ 210.644544] perf_release+0x37/0x50 [ 210.648333] __fput+0x385/0xa30 [ 210.651664] ? get_max_files+0x20/0x20 [ 210.655586] ? ___might_sleep+0x1ed/0x300 [ 210.659751] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 210.665207] ? arch_local_save_flags+0x40/0x40 [ 210.669808] ? kasan_check_write+0x14/0x20 [ 210.674059] ? do_raw_spin_lock+0xc1/0x200 [ 210.678319] ____fput+0x15/0x20 [ 210.681617] task_work_run+0x1e8/0x2a0 [ 210.685525] ? task_work_cancel+0x240/0x240 [ 210.689866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 210.695420] ? switch_task_namespaces+0x9d/0xd0 [ 210.700118] do_exit+0x1ad7/0x2610 [ 210.703681] ? __put_cred+0x28c/0x360 [ 210.707511] ? mm_update_next_owner+0x990/0x990 [ 210.712194] ? prepare_creds+0x4d0/0x4d0 [ 210.716267] ? kasan_check_write+0x14/0x20 [ 210.720518] ? do_raw_spin_lock+0xc1/0x200 [ 210.724756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.730320] ? do_coredump+0x477/0x4001 [ 210.734318] ? unwind_get_return_address+0x61/0xa0 [ 210.739270] ? __save_stack_trace+0x8d/0xf0 [ 210.743623] ? dump_align+0xa0/0xa0 [ 210.747271] ? save_stack+0xa9/0xd0 [ 210.750913] ? save_stack+0x43/0xd0 [ 210.754554] ? __kasan_slab_free+0x102/0x150 [ 210.758979] ? kasan_slab_free+0xe/0x10 [ 210.762995] ? kmem_cache_free+0x83/0x290 [ 210.767160] ? __sigqueue_free.part.27+0x7d/0xa0 [ 210.771934] ? __dequeue_signal+0x530/0x7d0 [ 210.776274] ? dequeue_signal+0xbd/0x630 [ 210.780350] ? get_signal+0x3ec/0x1980 [ 210.784262] ? do_signal+0x9c/0x21e0 [ 210.788037] ? exit_to_usermode_loop+0x2e5/0x380 [ 210.792836] ? prepare_exit_to_usermode+0x342/0x3b0 [ 210.797872] ? trace_hardirqs_off+0xb8/0x310 [ 210.802421] ? kasan_check_read+0x11/0x20 [ 210.806657] ? do_raw_spin_unlock+0xa7/0x2f0 [ 210.811105] ? trace_hardirqs_on+0x310/0x310 [ 210.815565] ? kasan_check_write+0x14/0x20 [ 210.819815] ? graph_lock+0x170/0x170 [ 210.823640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.829208] ? __lock_is_held+0xb5/0x140 [ 210.833292] ? __sigqueue_free.part.27+0x7d/0xa0 [ 210.838066] ? graph_lock+0x170/0x170 [ 210.841892] ? __sigqueue_free.part.27+0x7d/0xa0 [ 210.846668] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.851704] ? kmem_cache_free+0x24f/0x290 [ 210.855958] ? __sigqueue_free.part.27+0x7d/0xa0 [ 210.860739] ? find_held_lock+0x36/0x1c0 [ 210.864827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.870496] ? proc_coredump_connector+0x4f8/0x630 [ 210.875430] ? proc_comm_connector+0x520/0x520 [ 210.880040] do_group_exit+0x177/0x440 [ 210.883947] ? __ia32_sys_exit+0x50/0x50 [ 210.888036] get_signal+0x8b0/0x1980 [ 210.891784] ? ptrace_notify+0x130/0x130 [ 210.895866] ? force_sig_info+0x281/0x310 [ 210.900041] ? force_sigsegv+0x3d/0x110 [ 210.904044] ? signal_setup_done+0xc1/0x2f0 [ 210.908403] ? set_current_blocked+0x40/0x40 [ 210.912849] do_signal+0x9c/0x21e0 [ 210.916621] ? setup_sigcontext+0x7d0/0x7d0 [ 210.921052] ? __bad_area_nosemaphore+0x311/0x3f0 [ 210.925932] ? bad_area+0x69/0x80 [ 210.929419] ? exit_to_usermode_loop+0x8c/0x380 [ 210.934139] exit_to_usermode_loop+0x2e5/0x380 [ 210.938914] ? syscall_slow_exit_work+0x520/0x520 [ 210.943834] ? trace_hardirqs_off_caller+0xbb/0x310 [ 210.948879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.953739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.958609] prepare_exit_to_usermode+0x342/0x3b0 [ 210.963473] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 210.969124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.974016] ? page_fault+0x8/0x30 [ 210.977576] retint_user+0x8/0x18 [ 210.981043] RIP: 0033: (null) [ 210.984938] Code: Bad RIP value. [ 210.988319] RSP: 002b:0000000020000088 EFLAGS: 00010217 [ 210.993782] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 211.001066] RDX: 0000000020000240 RSI: 0000000020000080 RDI: 0000000000000000 [ 211.008355] RBP: 000000000072bf00 R08: 0000000020000380 R09: 0000000000000000 [ 211.015639] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f350266f6d4 [ 211.022923] R13: 00000000004bd9fa R14: 00000000004cc3a8 R15: 00000000ffffffff [ 211.030225] [ 211.031854] Allocated by task 7857: [ 211.035493] save_stack+0x43/0xd0 [ 211.038958] kasan_kmalloc+0xc7/0xe0 [ 211.042685] kasan_slab_alloc+0x12/0x20 [ 211.046676] kmem_cache_alloc_node+0x144/0x730 [ 211.051270] copy_process+0x1ff4/0x8780 [ 211.055256] _do_fork+0x1cb/0x11d0 [ 211.058806] __x64_sys_clone+0xbf/0x150 [ 211.062794] do_syscall_64+0x1b9/0x820 [ 211.066720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.071916] [ 211.073553] Freed by task 7857: [ 211.076849] save_stack+0x43/0xd0 [ 211.080312] __kasan_slab_free+0x102/0x150 [ 211.084567] kasan_slab_free+0xe/0x10 [ 211.088467] kmem_cache_free+0x83/0x290 [ 211.092453] free_task+0x16e/0x1f0 [ 211.096003] copy_process+0x1d9a/0x8780 [ 211.099989] _do_fork+0x1cb/0x11d0 [ 211.103539] __x64_sys_clone+0xbf/0x150 [ 211.107527] do_syscall_64+0x1b9/0x820 [ 211.111430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.116652] [ 211.118291] The buggy address belongs to the object at ffff880199ff2380 [ 211.118291] which belongs to the cache task_struct(33:syz4) of size 6080 [ 211.131834] The buggy address is located 32 bytes inside of [ 211.131834] 6080-byte region [ffff880199ff2380, ffff880199ff3b40) [ 211.143745] The buggy address belongs to the page: [ 211.148693] page:ffffea000667fc80 count:1 mapcount:0 mapping:ffff8801d7dc7e00 index:0x0 compound_mapcount: 0 [ 211.158683] flags: 0x2fffc0000008100(slab|head) [ 211.163370] raw: 02fffc0000008100 ffffea0006f4b988 ffff8801cd7eda48 ffff8801d7dc7e00 [ 211.171269] raw: 0000000000000000 ffff880199ff2380 0000000100000001 ffff880195f5e140 [ 211.179153] page dumped because: kasan: bad access detected [ 211.184871] page->mem_cgroup:ffff880195f5e140 [ 211.189369] [ 211.191006] Memory state around the buggy address: [ 211.195951] ffff880199ff2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 211.203320] ffff880199ff2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 211.210720] >ffff880199ff2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 211.218095] ^ [ 211.222514] ffff880199ff2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 211.229888] ffff880199ff2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 211.237300] ================================================================== [ 211.244666] Disabling lock debugging due to kernel taint 02:54:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x2000000800004c36) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x4) r2 = accept4(r0, &(0x7f0000000180)=@nl, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x14}, 0xf}}, 0x2, 0x766, 0x40, 0x101, 0x18}, &(0x7f00000003c0)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r3, 0x7, 0x1, 0xfffffffffffffe00}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000240)={{0x9, 0xba, 0x1, 0x0, 0x3ff, 0x3}, 0x4, 0x7, 0x100, 0x9, 0x4, "4b0f2eca035d7e29faf6c77b24e054a86544334e6584f23d66a1a3f689ede6db54a889cd69826e03991dd32f28dec2794103bdae2ead9e05e162b5f7032e67daa3e25e2b95945c4337a7484938547be47627dd3c8e2ae3a4df08c02d780780e90289860b50d2d289f237d22764b168178cfe7f826d0c8ba587ee9b4406f78bb5"}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="000500000000000000001e3a89badf41d2ec30408d6552b1b67a969601c4c246fc2beb5733c0d002f73bc48a2f9f759806b36b924c0001baea82b887c5e8e0e5f98dbcc240711d27f1eaa81a36a2fcd67c51d90495aa80ada6644f08000000d6646f6ae543436be4d727da71e5af01784a51"], 0xb) 02:54:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2b, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'yam0\x00', 'veth1\x00', 'syzkaller1\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x250) 02:54:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x14, 0x0, 0x0, 0x1ac, 0x0, 0x2, 0x0, 0x5]}}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x141000, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x8, 0x40000000000, 0xfff, 0x10200, 0x0, 0x6, 0x10200, 0x8, 0x22, 0x7ff, 0x0, 0x8, 0x100, 0x10000, 0x1, 0x1, 0x1, 0x5, 0x1ff, 0x2, 0x24f08000, 0x5, 0x0, 0x7fffffff, 0x3, 0x7, 0x5768, 0x25fa, 0x6, 0x75, 0x7, 0xfffffffffffffc01, 0x5, 0x101, 0x100000001, 0xffb, 0x0, 0xfffffffffffffff7, 0x7, @perf_config_ext={0x3, 0x81}, 0x101, 0xc67, 0x401, 0x7, 0x0, 0x37b, 0x4}, r2, 0x6, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@loopback, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000380)={0x3001, 0x2000}) fcntl$getflags(r3, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r4, &(0x7f00000000c0)=@known='user.syz\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="240000009a57fe710d67ba2901ec4b3f22409798f22fa6d02fe9818253da33500d69816751ef271f720d0df1bb51d48d7d5436fd56edc67088876d33d75d82c56e742effd74362e597704293f80dc2758e8f14938fcfa2205bfd6e47119c99bd1e13"], &(0x7f0000000400)=0x32) 02:54:27 executing program 3: r0 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x400000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') ioctl$FICLONE(r1, 0x40049409, r0) sendfile(r0, r3, &(0x7f00000000c0), 0x80000002) 02:54:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x80000001, 0x200000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@remote, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xffffffffffffff6b) r3 = socket(0xa, 0x1, 0x0) fanotify_mark(r2, 0x10, 0x1, r2, &(0x7f00000001c0)='./file0\x00') setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1d, 0x0, 0x0, 'team_slave_0\x00', 'bridge_slave_0\x00', 'bond_slave_1\x00', 'veth1_to_bridge\x00', @empty, [], @dev, [], 0xe0, 0x12f, 0x150, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @local, [], 0x0, 0x0, 0x0, 0x0, @local}}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @snat={'snat\x00', 0x10, {{@random="5f5a1fad6899"}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x258) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x34e7) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000100)=0xc) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180), 0x4) 02:54:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) unshare(0x20400) r1 = memfd_create(&(0x7f0000000040)="00000600", 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 211.316258] Kernel panic - not syncing: panic_on_warn set ... [ 211.316258] [ 211.323673] CPU: 0 PID: 7861 Comm: syz-executor4 Tainted: G B 4.19.0-rc5+ #252 [ 211.332334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.341691] Call Trace: [ 211.344300] dump_stack+0x1c4/0x2b4 [ 211.347939] ? dump_stack_print_info.cold.2+0x52/0x52 [ 211.353165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.357965] panic+0x238/0x4e7 [ 211.361181] ? add_taint.cold.5+0x16/0x16 02:54:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="0ad0cf84") r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000002c0)='teql0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setstatus(r2, 0x4, 0x4800) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x600, 0x100000133) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000540)={0x3}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f75702e6370752f2e797a30f6", 0x1ff) prctl$seccomp(0x16, 0x1, &(0x7f0000000380)={0x2, &(0x7f0000000300)=[{0x1, 0x7fff, 0x42a019b2, 0x7f800}, {0x3, 0xfffffffffffff000, 0x4, 0xfffffffffffffff9}]}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000480)='ip6gre0\x00') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000440)=0x1000, 0x4) write$P9_RSETATTR(r1, &(0x7f0000000280)={0x7, 0x1b, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x80, 0x0) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040), &(0x7f0000000080)='wlan1securitywlan0\x00', 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x7) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 02:54:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0xfffffffffffff67c, 0x4) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x10062, &(0x7f0000003640)=@hci, 0x707000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000240)={{0x7, 0x2, 0x2, 0x8000, '\x00', 0x4}, 0x2, 0x3, 0x3, r3, 0x3, 0x10001, 'syz1\x00', &(0x7f0000000080)=['[\x00', ':bdevppp1procself\x00', '\x00'], 0x15, [], [0xab9d, 0x401, 0x5, 0x379]}) [ 211.365344] ? preempt_schedule+0x4d/0x60 [ 211.369508] ? ___preempt_schedule+0x16/0x18 [ 211.373964] ? trace_hardirqs_on+0xb4/0x310 [ 211.378417] kasan_end_report+0x47/0x4f [ 211.382390] kasan_report.cold.9+0x76/0x309 [ 211.386720] ? _free_event+0x49a/0x1610 [ 211.390700] check_memory_region+0x13e/0x1b0 [ 211.395135] kasan_check_write+0x14/0x20 [ 211.399203] _free_event+0x49a/0x1610 [ 211.403045] ? kasan_check_read+0x11/0x20 [ 211.407205] ? ring_buffer_attach+0x840/0x840 [ 211.411725] ? __perf_remove_from_context+0x1ec/0x470 02:54:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) unshare(0x20400) r1 = memfd_create(&(0x7f0000000040)="00000600", 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 211.416942] ? do_raw_spin_lock+0xc1/0x200 [ 211.421190] ? kasan_check_write+0x14/0x20 [ 211.425451] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 211.430388] ? event_function_call+0x343/0x600 [ 211.434989] ? wait_for_completion+0x8a0/0x8a0 [ 211.439583] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 211.444531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.450096] free_event+0xb4/0x180 [ 211.453649] ? _free_event+0x1610/0x1610 [ 211.457733] perf_event_release_kernel+0x7d8/0xfa0 [ 211.462685] ? lockdep_hardirqs_on+0x421/0x5c0 [ 211.465288] audit: type=1326 audit(1537844067.408:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7886 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 [ 211.467294] ? put_event+0x60/0x60 [ 211.467308] ? kasan_check_write+0x14/0x20 [ 211.467331] ? do_raw_spin_lock+0xc1/0x200 [ 211.500509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.506064] ? __call_rcu.constprop.69+0x429/0xbc0 [ 211.511052] ? lockdep_hardirqs_on+0x421/0x5c0 02:54:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) unshare(0x20400) r1 = memfd_create(&(0x7f0000000040)="00000600", 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 02:54:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0xfffffffffffff67c, 0x4) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x10062, &(0x7f0000003640)=@hci, 0x707000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000240)={{0x7, 0x2, 0x2, 0x8000, '\x00', 0x4}, 0x2, 0x3, 0x3, r3, 0x3, 0x10001, 'syz1\x00', &(0x7f0000000080)=['[\x00', ':bdevppp1procself\x00', '\x00'], 0x15, [], [0xab9d, 0x401, 0x5, 0x379]}) [ 211.515677] ? trace_hardirqs_on+0xbd/0x310 [ 211.520059] ? call_rcu+0x12/0x20 [ 211.523537] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 211.529000] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.534562] ? check_preemption_disabled+0x48/0x200 [ 211.539624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.545173] ? fsnotify+0xaef/0x1330 [ 211.548899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.554454] ? locks_remove_file+0x3c6/0x5c0 [ 211.558865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.564415] ? ima_file_free+0x132/0x650 [ 211.568488] ? fsnotify_first_mark+0x350/0x350 [ 211.573092] ? ima_file_check+0x130/0x130 [ 211.577254] ? fsnotify+0x1330/0x1330 [ 211.581073] ? perf_event_release_kernel+0xfa0/0xfa0 [ 211.586195] perf_release+0x37/0x50 [ 211.589841] __fput+0x385/0xa30 [ 211.593166] ? get_max_files+0x20/0x20 [ 211.597072] ? ___might_sleep+0x1ed/0x300 [ 211.601240] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 211.606702] ? arch_local_save_flags+0x40/0x40 02:54:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) unshare(0x20400) r1 = memfd_create(&(0x7f0000000040)="00000600", 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 211.614709] ? kasan_check_write+0x14/0x20 [ 211.618985] ? do_raw_spin_lock+0xc1/0x200 [ 211.623242] ____fput+0x15/0x20 [ 211.626539] task_work_run+0x1e8/0x2a0 [ 211.630936] ? task_work_cancel+0x240/0x240 [ 211.635276] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 211.640839] ? switch_task_namespaces+0x9d/0xd0 [ 211.645523] do_exit+0x1ad7/0x2610 [ 211.649091] ? __put_cred+0x28c/0x360 [ 211.652917] ? mm_update_next_owner+0x990/0x990 [ 211.657594] ? prepare_creds+0x4d0/0x4d0 [ 211.661669] ? kasan_check_write+0x14/0x20 [ 211.665919] ? do_raw_spin_lock+0xc1/0x200 [ 211.670171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.675718] ? do_coredump+0x477/0x4001 [ 211.679918] ? unwind_get_return_address+0x61/0xa0 [ 211.684875] ? __save_stack_trace+0x8d/0xf0 [ 211.689218] ? dump_align+0xa0/0xa0 [ 211.692879] ? save_stack+0xa9/0xd0 [ 211.696527] ? save_stack+0x43/0xd0 [ 211.700165] ? __kasan_slab_free+0x102/0x150 [ 211.704586] ? kasan_slab_free+0xe/0x10 [ 211.708575] ? kmem_cache_free+0x83/0x290 [ 211.712751] ? __sigqueue_free.part.27+0x7d/0xa0 [ 211.717519] ? __dequeue_signal+0x530/0x7d0 [ 211.721850] ? dequeue_signal+0xbd/0x630 [ 211.725915] ? get_signal+0x3ec/0x1980 [ 211.729803] ? do_signal+0x9c/0x21e0 [ 211.733522] ? exit_to_usermode_loop+0x2e5/0x380 [ 211.738266] ? prepare_exit_to_usermode+0x342/0x3b0 [ 211.743286] ? trace_hardirqs_off+0xb8/0x310 [ 211.747703] ? kasan_check_read+0x11/0x20 [ 211.751866] ? do_raw_spin_unlock+0xa7/0x2f0 [ 211.756286] ? trace_hardirqs_on+0x310/0x310 [ 211.760710] ? kasan_check_write+0x14/0x20 [ 211.764958] ? graph_lock+0x170/0x170 [ 211.768776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.774329] ? __lock_is_held+0xb5/0x140 [ 211.778404] ? __sigqueue_free.part.27+0x7d/0xa0 [ 211.783175] ? graph_lock+0x170/0x170 [ 211.786984] ? __sigqueue_free.part.27+0x7d/0xa0 [ 211.791751] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.796794] ? kmem_cache_free+0x24f/0x290 [ 211.801030] ? __sigqueue_free.part.27+0x7d/0xa0 [ 211.805790] ? find_held_lock+0x36/0x1c0 [ 211.809907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.815459] ? proc_coredump_connector+0x4f8/0x630 [ 211.820401] ? proc_comm_connector+0x520/0x520 [ 211.824997] do_group_exit+0x177/0x440 [ 211.828900] ? __ia32_sys_exit+0x50/0x50 [ 211.832979] get_signal+0x8b0/0x1980 [ 211.836714] ? ptrace_notify+0x130/0x130 [ 211.840788] ? force_sig_info+0x281/0x310 [ 211.844952] ? force_sigsegv+0x3d/0x110 [ 211.848944] ? signal_setup_done+0xc1/0x2f0 [ 211.853277] ? set_current_blocked+0x40/0x40 [ 211.857701] do_signal+0x9c/0x21e0 [ 211.861267] ? setup_sigcontext+0x7d0/0x7d0 [ 211.865631] ? __bad_area_nosemaphore+0x311/0x3f0 [ 211.870488] ? bad_area+0x69/0x80 [ 211.873962] ? exit_to_usermode_loop+0x8c/0x380 [ 211.878666] exit_to_usermode_loop+0x2e5/0x380 [ 211.883259] ? syscall_slow_exit_work+0x520/0x520 [ 211.888120] ? trace_hardirqs_off_caller+0xbb/0x310 [ 211.893140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.897987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.902866] prepare_exit_to_usermode+0x342/0x3b0 [ 211.907725] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 211.913363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.918224] ? page_fault+0x8/0x30 [ 211.921776] retint_user+0x8/0x18 [ 211.925235] RIP: 0033: (null) [ 211.929123] Code: Bad RIP value. [ 211.932494] RSP: 002b:0000000020000088 EFLAGS: 00010217 [ 211.937870] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 211.945147] RDX: 0000000020000240 RSI: 0000000020000080 RDI: 0000000000000000 [ 211.952426] RBP: 000000000072bf00 R08: 0000000020000380 R09: 0000000000000000 [ 211.959703] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f350266f6d4 [ 211.966979] R13: 00000000004bd9fa R14: 00000000004cc3a8 R15: 00000000ffffffff [ 211.975207] Kernel Offset: disabled [ 211.978835] Rebooting in 86400 seconds..