[ 58.802910] audit: type=1800 audit(1539238496.831:27): pid=6051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 60.322327] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.532195] random: sshd: uninitialized urandom read (32 bytes read) [ 63.055832] random: sshd: uninitialized urandom read (32 bytes read) [ 65.557034] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. [ 71.487902] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 06:15:11 fuzzer started [ 76.066025] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 06:15:16 dialing manager at 10.128.0.26:39089 2018/10/11 06:15:16 syscalls: 1 2018/10/11 06:15:16 code coverage: enabled 2018/10/11 06:15:16 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 06:15:16 setuid sandbox: enabled 2018/10/11 06:15:16 namespace sandbox: enabled 2018/10/11 06:15:16 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 06:15:16 fault injection: enabled 2018/10/11 06:15:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 06:15:16 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 06:15:16 net device setup: enabled [ 80.994254] random: crng init done 06:17:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x1ff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x6, 0x200}) [ 205.184828] IPVS: ftp: loaded support on port[0] = 21 [ 206.635448] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.642086] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.650769] device bridge_slave_0 entered promiscuous mode [ 206.803279] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.809806] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.818697] device bridge_slave_1 entered promiscuous mode [ 206.970646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.122861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.583126] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.733658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.026713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.033968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 06:17:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xffffffff80000005) clone(0x20000000, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) [ 208.589935] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.598465] team0: Port device team_slave_0 added [ 208.860979] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.869397] team0: Port device team_slave_1 added [ 209.042577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.049685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.059013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.297199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.304485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.313698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.385082] IPVS: ftp: loaded support on port[0] = 21 [ 209.515791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.523556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.532945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.762758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.770513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.779973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.763917] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.770400] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.779324] device bridge_slave_0 entered promiscuous mode [ 212.024135] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.030623] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.039468] device bridge_slave_1 entered promiscuous mode [ 212.337568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.551790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.593018] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.599537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.606670] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.613231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.622365] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.032811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.288509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.558045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.798118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.805379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.979805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.987064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 06:17:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, 0x0) [ 214.854508] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.863034] team0: Port device team_slave_0 added [ 215.206371] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.214868] team0: Port device team_slave_1 added [ 215.343485] IPVS: ftp: loaded support on port[0] = 21 [ 215.496310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.503619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.512750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.865992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.873274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.882590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.134346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.142426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.151800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.445518] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.453361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.462776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.957516] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.964119] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.972822] device bridge_slave_0 entered promiscuous mode [ 218.248260] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.254875] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.263870] device bridge_slave_1 entered promiscuous mode [ 218.611336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.958925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.826405] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.881034] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.887586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.894633] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.901120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.910322] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.139314] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.352364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.417849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.425202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.737059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.744268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.547437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.555816] team0: Port device team_slave_0 added [ 221.793824] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.802228] team0: Port device team_slave_1 added [ 222.118732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.126078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.135348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.416156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.423428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.432588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.759126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.769131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.778348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.146213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.154008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.163399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:17:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, 0x0) [ 224.392690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.723492] IPVS: ftp: loaded support on port[0] = 21 [ 225.840992] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.199483] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.206145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.214637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.358152] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.364750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.371885] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.378375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.387515] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.523239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.549830] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.556512] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.565320] device bridge_slave_0 entered promiscuous mode [ 228.676946] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.114611] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.121164] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.130048] device bridge_slave_1 entered promiscuous mode [ 229.456254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.922712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.125132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.480654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.917223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.924501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.259905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.267290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.398875] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.407552] team0: Port device team_slave_0 added [ 233.814483] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.822911] team0: Port device team_slave_1 added 06:17:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) [ 234.180996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.209048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.216309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.225356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.620790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.628162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.637420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.062314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.069925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.079349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.575960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.583786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.593126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.752352] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.014935] IPVS: ftp: loaded support on port[0] = 21 [ 237.549060] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.555636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.563564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:17:56 executing program 0: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0xba) semctl$GETZCNT(0x0, 0x0, 0x11, &(0x7f0000000100)=""/4096) 06:17:56 executing program 0: mount(&(0x7f00000000c0)=ANY=[], &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000000740)) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/235) mq_timedreceive(r0, &(0x7f0000000100)=""/55, 0x37, 0x1, &(0x7f0000000340)) readahead(r0, 0x6, 0x0) [ 239.104831] 8021q: adding VLAN 0 to HW filter on device team0 06:17:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xfb885cb62bedb748, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDGKBLED(r1, 0x5423, &(0x7f0000000240)) [ 240.078482] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.085458] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.094176] device bridge_slave_0 entered promiscuous mode 06:17:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xfb885cb62bedb748, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDGKBLED(r1, 0x5423, &(0x7f0000000240)) 06:17:58 executing program 0: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) socketpair(0x1a, 0x80801, 0x3, &(0x7f0000000040)) [ 240.612694] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.619198] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.628062] device bridge_slave_1 entered promiscuous mode [ 241.007276] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.013892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.020918] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.027578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.036472] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 06:17:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x1) r2 = socket$inet6(0xa, 0x4, 0x3) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @remote}}, [0x0, 0x10000, 0x2, 0x56, 0xffffffffffffffff, 0x51dc414e, 0x2, 0xfffffffffffffffd, 0x3, 0x8000, 0x4, 0x8, 0x8000, 0x4, 0x1000]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={r3, 0x1, 0x1, [0x0]}, &(0x7f0000000240)=0xa) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x2, 0x80100) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x8000, 0x0) r6 = syz_open_pts(r5, 0x80) ioctl$TIOCNXCL(r6, 0x540d) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000340)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000440)={{0x0, 0x7, 0x5a2, 0x3f, '\x00', 0x1f}, 0x2, 0x0, 0xfff, r7, 0x9, 0x7, 'syz1\x00', &(0x7f0000000380)=['/dev/vsock\x00', '/dev/input/mouse#\x00', 'cpuset.cpu_exclusive\x00', './cgroup.cpu\x00', 'cpuset.cpu_exclusive\x00', './cgroup.cpu\x00', '/dev/full\x00', '/dev/input/mouse#\x00', 'cpuset.cpu_exclusive\x00'], 0x92, [], [0x0, 0x5, 0x4270, 0x40]}) [ 241.124920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.439523] Unknown ioctl -1055894255 [ 241.605170] Unknown ioctl -1055894255 [ 241.620109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 241.703655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 06:18:00 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x8042) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000200)) getpeername(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x3ea) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x10, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000240)={0xa5, 0x5, 0xffffffffffffff66, "e7b5a911df003a952ef0acc7a813255fffa8b7d023db50535a49ed991e951ae97780e51f9579cfa4457eaa6d65c42895702a50c63d4342589c873b9c8539094bcd0e7f3cabf46c525cb8061029fabd3ba7020c581728bc161dcd115c30c184baa311fc329137672dae9b7a8bfab57dd78b18ba627ff6d8490dfc79a8672f6059151305857c4ef54bfb58241b072e6898be9e3f529e7628093b223cbd4eaa2af7e89e2fc0f7"}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000300)) 06:18:00 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc0505510, &(0x7f0000000000)={0xfffffffffffffffd, 0x0, 0x0, 0x0, "007f330122637f4bb3f2ad21f89bea89265436faaa4301bff6eefe96de3c7f8bed0ff01b2056dad03b2bd947"}) [ 242.921000] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.324152] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 243.673262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 243.680433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.080430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.087864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.683577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.332371] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.340788] team0: Port device team_slave_0 added [ 245.721467] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.729897] team0: Port device team_slave_1 added [ 246.106631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.114257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.123166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.137840] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.604102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.611307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.620432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.993856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.001752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.010992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.376005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.384033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.393116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.455115] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.462121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.470048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.610507] 8021q: adding VLAN 0 to HW filter on device team0 06:18:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) symlinkat(&(0x7f00000017c0)='./file0\x00', r1, &(0x7f0000001800)='./file0\x00') [ 250.664938] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.671703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.678761] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.685482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.694574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.701306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 06:18:12 executing program 2: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000140)={0x88bffaea79cea58f}, 0xfffffed3) readv(r0, &(0x7f0000000300), 0x0) write$cgroup_subtree(r0, &(0x7f0000000300), 0x0) [ 254.177850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.997899] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.817393] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.823991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.832193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.399950] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.689435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.253595] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 259.777186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.783677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.791684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:18:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000140)='cgroup\x00', 0x0, 0x0) [ 260.305122] 8021q: adding VLAN 0 to HW filter on device team0 06:18:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000005c0)}) mknod(&(0x7f0000000040)='./file0\x00', 0x60, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000180)={0x0, 0xda3}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x3) 06:18:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8919, &(0x7f0000000080)="153f620500bc80120a10e2") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000176decd000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000e27c56024006d378528b8c8865626f118e83c63183bfeded82da6c"], 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x3}, {{}, 0x0, @in=@loopback}}, 0xe8) 06:18:20 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) tkill(r0, 0x3b) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20001, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = fcntl$dupfd(r1, 0x406, r1) statx(r2, &(0x7f0000000040)='./file0\x00', 0x1000, 0x8, &(0x7f0000000080)) fallocate(r1, 0x10, 0x4, 0x6) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000180)) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101000) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000200)) sync_file_range(r2, 0xf49, 0xfffffffffffffe00, 0x5) r4 = semget$private(0x0, 0x3, 0x309) fsetxattr$security_smack_entry(r2, &(0x7f0000000240)='security.SMACK64\x00', &(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x12, 0x3) write$FUSE_WRITE(r2, &(0x7f00000002c0)={0x18, 0x0, 0x1, {0x8}}, 0x18) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000400)={'bridge0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000440)={'veth1\x00', r5}) semop(r4, &(0x7f0000000480)=[{0x0, 0xff, 0x1800}, {0x6c5ae6b2677e31ff, 0xc1, 0x800}, {0x0, 0x7, 0x800}, {0x0, 0x5, 0x1800}], 0x4) semget(0x1, 0x4, 0x204) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000004c0)={0xf6, ""/246}) r6 = getuid() fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000640)={0xa0, 0xffffffffffffffda, 0x1, {{0x1, 0x2, 0x0, 0x10001, 0x3, 0x3, {0x3, 0x0, 0xb5, 0x3, 0xffffffffffffff80, 0x4, 0x1, 0x401, 0x8, 0xe5ed, 0x7ff, r6, r7, 0x4, 0x4}}, {0x0, 0x4}}}, 0xa0) getsockname$packet(r3, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r3, 0x28, &(0x7f0000000780)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r8, 0x19e, 0x8}, 0xc) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000840)={{0xa, 0x4e22, 0x8, @mcast2}, {0xa, 0x4e22, 0x5, @mcast2, 0x4}, 0x7, [0x6, 0x3, 0x2, 0x6, 0xb9acac3, 0x5, 0xff, 0x3134]}, 0x5c) sendfile(r3, r1, &(0x7f00000008c0), 0x2) arch_prctl(0x1005, &(0x7f0000000900)="84953b85145a9247a17d0b41384ba74d1d55f2878f077957a8620f2db41861f9df9d0772c126c3aebf6f371c50235fe8855bc707f4c1995b68e103f94db270905e0a304a4df5bd8b71a5c71d92731e911bb799c454ccff6e3bcfc0c0cdc66c210d4945626a3362ff07858e0ed01b5783cb5ec6139040e80d794b0a229aeee4ed59f4459ef6c33a2c15ff921c4e19d4c461ad94aa4bdad9333253f51733a977d3238af68f81a9624d5e3c6ab2e525999b4eeca1222cab6d33becbd56e77831daf3d609392aaf1f00248ad58f9ea60582d48515a771d8f3426") r9 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/mixer\x00', 0x20202, 0x0) getsockopt$packet_buf(r9, 0x107, 0x1, &(0x7f0000000a40)=""/138, &(0x7f0000000b00)=0x8a) 06:18:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f000001d000)={0x200000002, 0x4d, 0x6, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) 06:18:20 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x3, 0x240, [0x0, 0x200002c0, 0x200004d0, 0x20000500], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x6, 0x88be, 'irlan0\x00', 'veth0_to_bond\x00', '\x00', 'syz_tun\x00', @dev={[], 0x21}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x110, [@rateest={'rateest\x00', 0x48, {{'gretap0\x00', 'team0\x00', 0x20, 0x1, 0x9, 0x9, 0x2, 0x0, 0xfffffffffffffffe, 0x1613}}}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'tunl0\x00', 'veth0_to_team\x00', 'lo\x00', 'veth0_to_team\x00', @random="0b759a3c7098", [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x2b8) 06:18:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 262.359400] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 262.543094] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 06:18:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, &(0x7f0000000200)=@generic={0x0, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) 06:18:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'bridge0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@remote, @loopback, @remote, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000004, r3}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000380)={@mcast1, @loopback}) 06:18:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/126) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:18:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x10, 0x80, 0x1}, 0x360) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000000), &(0x7f0000000540)}, 0x20) 06:18:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='sysfs\x00', 0x0, &(0x7f0000000300)="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") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) 06:18:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 06:18:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 06:18:22 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, &(0x7f0000c5bff8), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000380)={&(0x7f0000000080)=""/48, 0x30}}, 0x10) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000100)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x100000000000004c) r3 = dup2(r0, r0) signalfd4(r3, &(0x7f00000000c0)={0xffff}, 0x8, 0x0) tgkill(r1, r2, 0x1) [ 264.696295] IPVS: ftp: loaded support on port[0] = 21 [ 266.573282] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.579791] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.588745] device bridge_slave_0 entered promiscuous mode [ 266.742589] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.749062] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.757879] device bridge_slave_1 entered promiscuous mode [ 266.892894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 267.065059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 267.310528] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 267.393829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 267.783016] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.790660] team0: Port device team_slave_0 added [ 267.869624] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.877398] team0: Port device team_slave_1 added [ 267.969098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 267.976382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.985432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.104257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 268.111245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.120223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.194252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.201777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.210684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.283785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.291100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.300417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.183627] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.190039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.197033] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.203487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.211180] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 269.873034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.432680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.736995] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.036414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.042770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.050777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.356891] 8021q: adding VLAN 0 to HW filter on device team0 06:18:33 executing program 5: 06:18:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000001400)=@ipv4_delrule={0x20, 0x21, 0x401}, 0x20}}, 0x0) 06:18:33 executing program 1: 06:18:33 executing program 2: 06:18:33 executing program 4: 06:18:33 executing program 0: [ 275.520424] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 06:18:33 executing program 2: 06:18:33 executing program 4: 06:18:33 executing program 1: 06:18:33 executing program 5: 06:18:33 executing program 0: 06:18:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000001400)=@ipv4_delrule={0x20, 0x21, 0x401}, 0x20}}, 0x0) 06:18:34 executing program 2: 06:18:34 executing program 1: 06:18:34 executing program 4: 06:18:34 executing program 5: [ 276.374061] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 06:18:34 executing program 0: 06:18:34 executing program 4: 06:18:34 executing program 3: 06:18:34 executing program 2: 06:18:34 executing program 1: 06:18:35 executing program 5: 06:18:35 executing program 4: 06:18:35 executing program 0: 06:18:35 executing program 3: 06:18:35 executing program 1: 06:18:35 executing program 2: 06:18:35 executing program 5: 06:18:35 executing program 4: 06:18:35 executing program 0: 06:18:35 executing program 3: 06:18:35 executing program 1: 06:18:35 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000026c0)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)=""/200, 0xc8}, 0x8}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:18:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000001600)=@sco, 0x80, &(0x7f00000016c0), 0x0, &(0x7f0000001700)=""/62, 0x3e}, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1, &(0x7f0000000000)}, 0x0) 06:18:36 executing program 5: 06:18:36 executing program 3: 06:18:36 executing program 0: 06:18:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7433, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 06:18:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = getpgrp(0x0) capget(&(0x7f0000000040)={0x19980330, r2}, &(0x7f0000003840)) 06:18:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000cd8000)=""/1, 0x2e171c03}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x16) 06:18:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000001c0012000c00905baa8e50f67fd8f1010069c736746e6c00000c0002000800090004000000"], 0x1}}, 0x0) [ 278.592456] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 06:18:36 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) [ 278.842015] IPVS: ftp: loaded support on port[0] = 21 06:18:37 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x4020000) 06:18:37 executing program 1: socket$kcm(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ff8dff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000600)=""/143}, 0x28) 06:18:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) 06:18:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x566}, 0xfffffffffffffff3) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) write$P9_ROPEN(r1, &(0x7f0000000440)={0x18, 0x71, 0x0, {{0x0, 0x3}, 0x9}}, 0x18) syz_open_pts(r1, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) [ 279.220782] IPVS: ftp: loaded support on port[0] = 21 [ 279.406244] IPVS: ftp: loaded support on port[0] = 21 06:18:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x101000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x1106, 'lblc\x00'}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r5 = socket$l2tp(0x18, 0x1, 0x1) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000600)=""/160) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000500)={r2, 0x4}, 0x8) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) ioctl$NBD_SET_SOCK(r1, 0xab00, r4) sendmmsg(r5, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 06:18:37 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/119, 0x77) 06:18:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='comm\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:18:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) r2 = dup(r0) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0xb7) [ 280.143472] IPVS: ftp: loaded support on port[0] = 21 06:18:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:40 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) dup2(r2, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000540)=[{}, {}], 0x2) 06:18:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) unshare(0x8000400) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f00000000c0)='c', &(0x7f0000000140)=""/126}, 0x18) 06:18:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x566}, 0xfffffffffffffff3) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) write$P9_ROPEN(r1, &(0x7f0000000440)={0x18, 0x71, 0x0, {{0x0, 0x3}, 0x9}}, 0x18) syz_open_pts(r1, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 06:18:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x101000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000006c0)=ANY=[@ANYBLOB="0500d600c46b78d786d2a600bede2ff8c08bdffb56cefd36d03629e6befa55d52439cea0f80312a519461b51a9be4944856836b1d899367ffa35047b4e034cf268bd3a710d2c05982355f5a10f7b9ae4246c12349a557f010100000000000063beaaa517f27f7c68c219d40728d6167fd1b44b8421d26e2e0410505d2f9246e1d5fd97a59aa646e2e789f5c495b987c5872563b7d2c0183ecaeb3b388ee9bc0d0639de4c6ed3f1b6837bcf8cd2f86dbe4793990b05834cece045b2332389c469d0cfeff94be9792a3b0f182e14a9e8bb7a735ceb6c200002000034cf5a8ddde4673f45ba659014ba41b5fbed96ef70231859b0d104e5ab5d856312b7830b48f2"], 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x1106, 'lblc\x00'}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r5 = socket$l2tp(0x18, 0x1, 0x1) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000600)=""/160) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000500)={r2, 0x4}, 0x8) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) ioctl$NBD_SET_SOCK(r1, 0xab00, r4) sendmmsg(r5, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 06:18:40 executing program 4: r0 = socket(0x2000000000010, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000000)=0x182) [ 282.295505] IPVS: ftp: loaded support on port[0] = 21 [ 282.429974] IPVS: ftp: loaded support on port[0] = 21 06:18:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/251, 0xfb}], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 06:18:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180), 0x8) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0x40045108, &(0x7f0000000040)) [ 282.870613] IPVS: ftp: loaded support on port[0] = 21 06:18:41 executing program 4: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/249) 06:18:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 06:18:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x566}, 0xfffffffffffffff3) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x44801) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0xd, &(0x7f0000000340)='/dev/binder#\x00'}, 0x30) write$P9_ROPEN(r2, &(0x7f0000000440)={0x18, 0x71, 0x1, {{0x2, 0x3, 0x5}, 0x9}}, 0x18) syz_open_pts(0xffffffffffffffff, 0xc00) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x100) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 06:18:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) [ 283.501624] hrtimer: interrupt took 109219 ns 06:18:41 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') 06:18:41 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 283.865593] IPVS: ftp: loaded support on port[0] = 21 06:18:42 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)) [ 283.966013] IPVS: ftp: loaded support on port[0] = 21 06:18:42 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000026c0)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000480)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f00000001c0)=""/149, 0x95}, {&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)=""/142, 0x8e}, {&(0x7f0000000380)=""/185, 0xb9}, {&(0x7f0000000440)=""/8, 0x8}], 0x7, &(0x7f0000000500)=""/200, 0xc8, 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000600)=""/201, 0xc9}, {&(0x7f0000000700)=""/216, 0xd8}, {&(0x7f0000000800)=""/63, 0x3f}, {&(0x7f00000052c0)=""/4096, 0x1000}, {&(0x7f0000000840)=""/135, 0x87}, {&(0x7f0000000900)=""/98, 0x62}], 0x6, &(0x7f0000000a00)=""/49, 0x31, 0x1}, 0x1}, {{&(0x7f0000000a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/44, 0x2c}, {&(0x7f0000000b00)=""/131, 0x83}, {&(0x7f0000000bc0)=""/211, 0xd3}, {&(0x7f0000000cc0)=""/98, 0x62}, {&(0x7f0000000d40)=""/27, 0x1b}, {&(0x7f0000000d80)=""/104, 0x68}, {&(0x7f0000000e00)=""/151, 0x97}, {&(0x7f0000000ec0)=""/108, 0x6c}, {&(0x7f0000000f40)=""/48, 0x30}], 0xa, &(0x7f0000001040)=""/229, 0xe5, 0xffffffff}, 0x9044}, {{&(0x7f0000001140)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000001280)=[{&(0x7f00000011c0)=""/92, 0x5c}, {&(0x7f0000001240)=""/9, 0x9}, {&(0x7f00000042c0)=""/4096, 0x1000}], 0x3, &(0x7f00000012c0)=""/16, 0x10, 0xfffffffffffffff8}, 0x5}], 0x4, 0x400000000000, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:18:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xdae7) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x10000}, 0x8) close(r0) 06:18:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 06:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000086c0a00000000000000003f0000000000fb02000038000000ae020000000101000000200400006000000000000000000100000020000000bddfb3de320598bf1b186c6762f897a07327ab9268f0abffc77022b0e49f8c5497f0fedf324e39e9621ec45b0022c25fd80500f2a872b1e4f94e875487b772e28875c2b9b1f09fb717c5d0dea55318c52c7edefdad91f078cba017df92c99290ce3cb40121358817f5211baf860442f3718c61a372ac5817c9a7de9aeaed794d37aedd000000000000000000"], 0xcb) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendto(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x4, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x2, 0x1, {0xa, 0x4e20, 0x2, @empty, 0x3}}}, 0x80) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 #'], 0xc) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=[&(0x7f0000000280)='*\x00']) unshare(0x0) socket(0x0, 0x6, 0x0) 06:18:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) [ 285.210996] IPVS: ftp: loaded support on port[0] = 21 06:18:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000240), 0x0, 0xfffffffffffffffd) 06:18:43 executing program 1: 06:18:46 executing program 0: 06:18:46 executing program 5: 06:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:46 executing program 1: 06:18:46 executing program 4: 06:18:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000086c0a00000000000000003f0000000000fb02000038000000ae020000000101000000200400006000000000000000000100000020000000bddfb3de320598bf1b186c6762f897a07327ab9268f0abffc77022b0e49f8c5497f0fedf324e39e9621ec45b0022c25fd80500f2a872b1e4f94e875487b772e28875c2b9b1f09fb717c5d0dea55318c52c7edefdad91f078cba017df92c99290ce3cb40121358817f5211baf860442f3718c61a372ac5817c9a7de9aeaed794d37aedd000000000000000000"], 0xcb) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendto(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x4, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x2, 0x1, {0xa, 0x4e20, 0x2, @empty, 0x3}}}, 0x80) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 #'], 0xc) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=[&(0x7f0000000280)='*\x00']) unshare(0x0) socket(0x0, 0x6, 0x0) [ 288.882803] IPVS: ftp: loaded support on port[0] = 21 06:18:47 executing program 5: 06:18:47 executing program 4: 06:18:47 executing program 1: 06:18:47 executing program 0: 06:18:47 executing program 5: 06:18:47 executing program 4: 06:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000086c0a00000000000000003f0000000000fb02000038000000ae020000000101000000200400006000000000000000000100000020000000bddfb3de320598bf1b186c6762f897a07327ab9268f0abffc77022b0e49f8c5497f0fedf324e39e9621ec45b0022c25fd80500f2a872b1e4f94e875487b772e28875c2b9b1f09fb717c5d0dea55318c52c7edefdad91f078cba017df92c99290ce3cb40121358817f5211baf860442f3718c61a372ac5817c9a7de9aeaed794d37aedd000000000000000000"], 0xcb) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) sendto(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x4, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x2, 0x1, {0xa, 0x4e20, 0x2, @empty, 0x3}}}, 0x80) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 #'], 0xc) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)=[&(0x7f0000000280)='*\x00']) unshare(0x0) socket(0x0, 0x6, 0x0) 06:18:47 executing program 1: 06:18:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() unshare(0x40000000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:49 executing program 0: 06:18:49 executing program 5: 06:18:49 executing program 4: 06:18:49 executing program 1: 06:18:49 executing program 3: 06:18:49 executing program 0: [ 291.759904] IPVS: ftp: loaded support on port[0] = 21 06:18:49 executing program 1: 06:18:49 executing program 5: 06:18:49 executing program 4: 06:18:50 executing program 3: 06:18:50 executing program 1: 06:18:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:50 executing program 0: 06:18:50 executing program 5: 06:18:50 executing program 4: 06:18:50 executing program 1: 06:18:50 executing program 3: 06:18:51 executing program 1: 06:18:51 executing program 4: 06:18:51 executing program 3: 06:18:51 executing program 0: 06:18:51 executing program 5: 06:18:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:51 executing program 1: 06:18:51 executing program 4: 06:18:51 executing program 3: 06:18:51 executing program 0: add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000002c0)='7', 0x1, 0xffffffffffffffff) 06:18:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001600)={'syz_tun\x00', &(0x7f0000001500)=@ethtool_drvinfo={0x3, "3054222b40bd7d652aa2dbabd0ca06d1abe041fd08e82046729afc12425b02d9", "6fe60e6a4dcf038ab6bbb723c940fa422756e840d38402972cd2b637ab187416", "0fb9b4bbe4ec6a2329235b3ef32575c17a4c85532041608e2913b35c057b9ef7", "8dc14a412e5d82055e02451e1b40bb9f9450e68ad16e9c747b4ec77aa2a251b1", "bb8eed0b7987f57285d8b4588aa1ef5dcda8ee3e143a5bfca3ca15c7457d4b77", "cf91c7d8c68b2063ab071145"}}) [ 293.897409] encrypted_key: insufficient parameters specified [ 293.939264] encrypted_key: insufficient parameters specified 06:18:52 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f6970365f6d725f636163686500d3f43df9e5cce51c9592ea641acf9847fa82bae338e744e20ca799e2ec0ab64e5563c1baba61f4f1d561f4be03f1312f0100010026da30e412a0bc22651095511dfca2551bc8005782d8ff3b27f764130482a9c7e8eca9ea7806c37c11f5251fc89b268f79555675c451dad9fa7891639fcd0d3db63f0cfb28b8972cbb255207dbfbfede398e140001993726752554f55b9298500824d3300d1623ca") preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:18:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:52 executing program 1: add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000100)="f9", 0x1, 0xffffffffffffffff) 06:18:52 executing program 0: 06:18:52 executing program 3: [ 294.354185] encrypted_key: insufficient parameters specified [ 294.416045] encrypted_key: insufficient parameters specified 06:18:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001600)={'syz_tun\x00', &(0x7f0000001500)=@ethtool_drvinfo={0x3, "3054222b40bd7d652aa2dbabd0ca06d1abe041fd08e82046729afc12425b02d9", "6fe60e6a4dcf038ab6bbb723c940fa422756e840d38402972cd2b637ab187416", "0fb9b4bbe4ec6a2329235b3ef32575c17a4c85532041608e2913b35c057b9ef7", "8dc14a412e5d82055e02451e1b40bb9f9450e68ad16e9c747b4ec77aa2a251b1", "bb8eed0b7987f57285d8b4588aa1ef5dcda8ee3e143a5bfca3ca15c7457d4b77", "cf91c7d8c68b2063ab071145"}}) 06:18:52 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x0, 0x0, &(0x7f000000dff8), 0x0, 0x0, &(0x7f0000000f4d)}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x7, &(0x7f0000000000)=[@dead_binder_done], 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 06:18:52 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000180)=""/134, 0x86}, {&(0x7f0000000240)=""/145, 0x91}], 0x3, 0x0) 06:18:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:52 executing program 1: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) dup2(r2, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[{0xf, 0x5}, {0xb}, {}], 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x0, 0x2}, 0x20) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 06:18:52 executing program 3: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r0 = memfd_create(&(0x7f00000002c0)="9ede7a8c5ae95e48000000000000007f4f1306000000000000006bd314566cd2a3fcb42fa5285d6cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d00024226da55a8fa88cea20bfda0edab8d804346a075ba81d607930af123f51ecb8621ee942b3d5118a727cf564f541cf91", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) [ 294.866422] binder: 8172:8173 unknown command 0 [ 294.871439] binder: 8172:8173 ioctl c0306201 200005c0 returned -22 [ 295.115794] IPVS: ftp: loaded support on port[0] = 21 06:18:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000000800)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000b40), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000001140)='dns_resolver\x00', &(0x7f0000001180)={'syz', 0x3}, &(0x7f00000011c0)='ppp1)proc\\\x00', 0xfffffffffffffffe) 06:18:53 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f00003efff0)={0x0, 0x0, 0x40000}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdf0}, 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(r2, &(0x7f0000000140)=""/128, 0x80) 06:18:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001600)={'syz_tun\x00', &(0x7f0000001500)=@ethtool_drvinfo={0x3, "3054222b40bd7d652aa2dbabd0ca06d1abe041fd08e82046729afc12425b02d9", "6fe60e6a4dcf038ab6bbb723c940fa422756e840d38402972cd2b637ab187416", "0fb9b4bbe4ec6a2329235b3ef32575c17a4c85532041608e2913b35c057b9ef7", "8dc14a412e5d82055e02451e1b40bb9f9450e68ad16e9c747b4ec77aa2a251b1", "bb8eed0b7987f57285d8b4588aa1ef5dcda8ee3e143a5bfca3ca15c7457d4b77", "cf91c7d8c68b2063ab071145"}}) 06:18:53 executing program 0: 06:18:53 executing program 3: 06:18:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001600)={'syz_tun\x00', &(0x7f0000001500)=@ethtool_drvinfo={0x3, "3054222b40bd7d652aa2dbabd0ca06d1abe041fd08e82046729afc12425b02d9", "6fe60e6a4dcf038ab6bbb723c940fa422756e840d38402972cd2b637ab187416", "0fb9b4bbe4ec6a2329235b3ef32575c17a4c85532041608e2913b35c057b9ef7", "8dc14a412e5d82055e02451e1b40bb9f9450e68ad16e9c747b4ec77aa2a251b1", "bb8eed0b7987f57285d8b4588aa1ef5dcda8ee3e143a5bfca3ca15c7457d4b77", "cf91c7d8c68b2063ab071145"}}) 06:18:54 executing program 0: 06:18:54 executing program 4: 06:18:54 executing program 1: 06:18:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 06:18:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x1, @dev={[], 0x1e}}, 0xfffffffffffffffe, {0x2, 0x0, @rand_addr}, "00000000000010000000000000000004"}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) 06:18:54 executing program 4: 06:18:54 executing program 3: [ 296.442267] IPVS: ftp: loaded support on port[0] = 21 06:18:54 executing program 1: 06:18:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) 06:18:55 executing program 4: 06:18:55 executing program 3: 06:18:55 executing program 4: 06:18:55 executing program 1: 06:18:55 executing program 0: 06:18:55 executing program 2: unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:55 executing program 3: 06:18:55 executing program 5: close(0xffffffffffffffff) 06:18:55 executing program 1: [ 297.826262] IPVS: ftp: loaded support on port[0] = 21 06:18:55 executing program 4: 06:18:56 executing program 5: socket$nl_route(0x10, 0x3, 0x0) close(0xffffffffffffffff) 06:18:56 executing program 3: 06:18:56 executing program 0: 06:18:56 executing program 4: 06:18:56 executing program 1: 06:18:56 executing program 4: 06:18:56 executing program 3: 06:18:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:56 executing program 5: 06:18:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000002c0)='7', 0x1, 0xffffffffffffffff) 06:18:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x8}) write$cgroup_int(r0, &(0x7f0000000080), 0x38000) 06:18:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50}, 0x50) [ 299.044630] encrypted_key: insufficient parameters specified [ 299.055543] IPVS: ftp: loaded support on port[0] = 21 06:18:57 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000240), 0xc) 06:18:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) 06:18:57 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000000), 0x142, 0x0) close(r2) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x6}, 0x1c) close(r1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) 06:18:57 executing program 4: 06:18:57 executing program 1: 06:18:58 executing program 0: 06:18:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:18:58 executing program 3: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:18:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 300.322716] IPVS: ftp: loaded support on port[0] = 21 06:18:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)=ANY=[]) 06:18:58 executing program 1: 06:18:58 executing program 4: 06:18:58 executing program 5: 06:18:59 executing program 1: 06:18:59 executing program 4: 06:18:59 executing program 1: 06:18:59 executing program 3: 06:18:59 executing program 1: 06:19:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:00 executing program 4: 06:19:00 executing program 3: [ 303.945513] clocksource: timekeeping watchdog on CPU1: Marking clocksource 'tsc' as unstable because the skew is too large: [ 303.956885] clocksource: 'acpi_pm' wd_now: a5274d wd_last: e9999b mask: ffffff [ 303.966286] clocksource: 'tsc' cs_now: a88fa1dfc9 cs_last: a6b8e3339c mask: ffffffffffffffff [ 303.976934] tsc: Marking TSC unstable due to clocksource watchdog [ 303.991357] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 304.000202] sched_clock: Marking unstable (304049847533, -58504842)<-(304116873476, -125528365) [ 304.011104] clocksource: Switched to clocksource acpi_pm 06:19:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'bridge0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@remote, @loopback, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000007, r3}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000380)={@mcast1, @loopback}) 06:19:02 executing program 1: 06:19:02 executing program 3: 06:19:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000180)) ptrace(0x10, r0) ptrace$poke(0x2, r0, &(0x7f00000000c0), 0x705000) 06:19:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x1, r2}) 06:19:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:02 executing program 4: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000580)={0x2, 0x4e20, @dev}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) request_key(&(0x7f0000001c80)='keyring\x00', &(0x7f0000001d80)={'syz'}, &(0x7f0000001dc0)='filter\x00', 0xfffffffffffffffb) request_key(&(0x7f0000001e00)='logon\x00', &(0x7f0000001e40)={'syz'}, &(0x7f0000001e80)='syzkaller\x00', 0xffffffffffffffff) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000002600)={"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"}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x40, &(0x7f00000065c0)={0x0, r3+30000000}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) [ 304.880863] IPVS: ftp: loaded support on port[0] = 21 06:19:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timerfd_create(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d03010000000000950000000000000071260000000000006706000002000000bf25000000000000720500000e0000006b65000000000000bf540000000000000704000004faff003d2001000000000095000000000000005d54000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf02000000000000070500000e0000001f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 06:19:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x9, &(0x7f0000000000)=r1, 0x4) [ 305.161098] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:19:03 executing program 4: 06:19:04 executing program 4: 06:19:04 executing program 4: 06:19:04 executing program 0: 06:19:04 executing program 3: 06:19:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timerfd_create(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d03010000000000950000000000000071260000000000006706000002000000bf25000000000000720500000e0000006b65000000000000bf540000000000000704000004faff003d2001000000000095000000000000005d54000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf02000000000000070500000e0000001f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 06:19:04 executing program 5: 06:19:05 executing program 4: 06:19:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:06 executing program 3: 06:19:06 executing program 0: 06:19:06 executing program 1: 06:19:06 executing program 5: 06:19:06 executing program 4: 06:19:06 executing program 1: 06:19:06 executing program 4: 06:19:06 executing program 0: [ 308.930672] IPVS: ftp: loaded support on port[0] = 21 06:19:07 executing program 5: 06:19:07 executing program 3: 06:19:07 executing program 1: 06:19:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:07 executing program 0: 06:19:07 executing program 4: 06:19:07 executing program 5: 06:19:07 executing program 1: 06:19:07 executing program 3: [ 310.082024] IPVS: ftp: loaded support on port[0] = 21 06:19:08 executing program 0: 06:19:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) 06:19:08 executing program 3: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:19:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10f}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000300)) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}, 0x10) shmctl$SHM_LOCK(r1, 0xb) 06:19:08 executing program 5: clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) geteuid() sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x10, 0x829, 0x0, 0x0, {0x3}, [@nested={0xc, 0x2, [@typed={0x8, 0x0, @str='\x00'}]}]}, 0x20}}, 0x0) unshare(0x8020400) 06:19:08 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) 06:19:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:09 executing program 5: r0 = epoll_create(0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) dup2(r1, r0) 06:19:09 executing program 4: 06:19:09 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:19:09 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) [ 311.315014] IPVS: ftp: loaded support on port[0] = 21 06:19:09 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040), 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000dffc0c00000000000000000000005b659a62290ffce80c2dbfdc5e9f13e1a04810d464fbc3f4c1520e5da983dffd75b50e9bb129b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x20b) 06:19:09 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 06:19:09 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 06:19:09 executing program 3: mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c2134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa684020000", 0x0, &(0x7f0000000200)) chroot(&(0x7f00000003c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) 06:19:09 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8110000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 06:19:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 06:19:10 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 06:19:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) [ 312.295657] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 06:19:10 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 06:19:10 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r0, 0x1000000000013) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 312.562016] IPVS: ftp: loaded support on port[0] = 21 06:19:10 executing program 4: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd5, 0x0) 06:19:10 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 312.970343] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 06:19:11 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=@sg0='/dev/sg0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000002c0)='debugfs\x00', 0x0, &(0x7f00000001c0)) 06:19:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0}, 0xfdef) 06:19:11 executing program 1: getpgrp(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x800, 0x0, 0x2, 0x1}, 0x20) 06:19:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_user\x00', 0xf0, 0x0) 06:19:11 executing program 4: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd5, 0x0) 06:19:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 06:19:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000200)) 06:19:11 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000600), 0x1000) 06:19:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) [ 313.940896] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:12 executing program 4: socket(0xa, 0x1, 0x0) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000780)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x3}]) [ 314.139019] IPVS: ftp: loaded support on port[0] = 21 06:19:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x100000003, 0x80000000000006) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x6, 0x0, @loopback={0x0, 0x8}}, 0x1c) 06:19:12 executing program 4: socket(0xa, 0x1, 0x0) io_setup(0x3, &(0x7f0000000080)=0x0) r1 = memfd_create(&(0x7f0000000240)='#[\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000780)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x3, r1}]) 06:19:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000200)) 06:19:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 06:19:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) [ 314.947657] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x6609, 0x0) 06:19:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) 06:19:13 executing program 2: 06:19:13 executing program 4: 06:19:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000200)) 06:19:13 executing program 2: 06:19:13 executing program 1: 06:19:13 executing program 4: [ 315.838356] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:14 executing program 3: 06:19:14 executing program 0: 06:19:14 executing program 2: 06:19:14 executing program 1: 06:19:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0x541b, &(0x7f0000000200)) 06:19:14 executing program 4: 06:19:14 executing program 2: 06:19:14 executing program 1: 06:19:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x6612, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000500)=""/186) [ 316.754465] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:14 executing program 3: 06:19:15 executing program 4: 06:19:15 executing program 1: 06:19:15 executing program 2: 06:19:15 executing program 0: 06:19:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 06:19:15 executing program 4: 06:19:15 executing program 1: 06:19:15 executing program 0: 06:19:15 executing program 3: [ 317.709854] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:15 executing program 2: 06:19:16 executing program 4: 06:19:16 executing program 0: 06:19:16 executing program 1: 06:19:16 executing program 3: 06:19:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r1, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r1, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) listen(r0, 0x0) 06:19:16 executing program 1: 06:19:16 executing program 2: 06:19:16 executing program 0: 06:19:16 executing program 4: [ 318.728695] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:16 executing program 3: 06:19:17 executing program 1: 06:19:17 executing program 0: 06:19:17 executing program 2: 06:19:17 executing program 3: 06:19:17 executing program 4: 06:19:17 executing program 1: 06:19:17 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000080)) 06:19:17 executing program 2: 06:19:17 executing program 0: 06:19:17 executing program 1: [ 319.911156] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:18 executing program 3: 06:19:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:18 executing program 4: add_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000002c0)="a8", 0x1, 0xfffffffffffffffd) 06:19:18 executing program 0: 06:19:18 executing program 1: 06:19:18 executing program 3: 06:19:18 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), 0x4) 06:19:18 executing program 4: 06:19:18 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141048, 0x0) close(r0) r1 = memfd_create(&(0x7f00000000c0)="56b8d0de9ad9", 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000240)="80", 0x1}], 0x1, 0x81003) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write(r2, &(0x7f00000001c0), 0xfffffef3) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x9) 06:19:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup2(r0, r1) [ 320.909341] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:19 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:19 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x1, &(0x7f0000e4b000)=0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000007d000)}]) 06:19:19 executing program 3: r0 = msgget$private(0x0, 0x100) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgrcv(r0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 321.350778] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 321.673186] tls_set_device_offload_rx: netdev lo with no TLS offload 06:19:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0'}, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x7ffff000) 06:19:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup2(r0, r1) 06:19:20 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:20 executing program 3: r0 = msgget$private(0x0, 0x100) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgrcv(r0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:19:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440), 0x0, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) dup2(r0, r1) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 06:19:20 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 06:19:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000003c0), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="db04", 0x2) 06:19:21 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:21 executing program 3: r0 = msgget$private(0x0, 0x100) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgrcv(r0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:19:21 executing program 1: ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 06:19:21 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0xe) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 06:19:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000b00)={&(0x7f00000001c0), 0xff4a, &(0x7f0000000100)={&(0x7f0000000140)=@ipv6_getnetconf={0x14, 0x52, 0x7c5fd5fa6bcda905}, 0x14}}, 0x0) [ 323.562077] netlink: 180 bytes leftover after parsing attributes in process `syz-executor1'. [ 323.635640] netlink: 180 bytes leftover after parsing attributes in process `syz-executor1'. 06:19:21 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:22 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d5c6070") r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000220007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 06:19:22 executing program 3: r0 = msgget$private(0x0, 0x100) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgrcv(r0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:19:22 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) socket$inet6_udplite(0xa, 0x2, 0x88) 06:19:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:22 executing program 1: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000ffffffff) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7}, 0xff7f) syncfs(r2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4}) 06:19:22 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0xe) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 06:19:22 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080), &(0x7f0000000180)=0x8) 06:19:23 executing program 3: r0 = msgget$private(0x0, 0x100) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgrcv(r0, &(0x7f0000000000)={0x0, ""/13}, 0x15, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="03"], 0x1, 0x0) gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) 06:19:23 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)="6370757365742e6d656d5f6578636c757369766500cb4216a20f71f4d6bffde2e1e7471194d233b9e76bbb1cce6e9c384607e5f42eb0e95e82c9742184b9b481b0e79cf9a82f549969a8af7ec191294e53ce2b2571c479c5c61a2d85ec6d122ab31d07c7fc0153d63c7a261f01f2970473469a1ef7eb9fc55073d6ad5da600101bd140ce59206f849cff212c96a04c658c9beb7c0d2bee2b333741fe16694a1b8ee9ee0d9ac9dbb32d1dec550632e2e9e24ea8044f9da02fdc41d9614cfcc743c546b7f5b65ac14280df6fa68313a02d71f369", 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x12) 06:19:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) 06:19:23 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 06:19:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 06:19:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0xc0a, 0x1ff, 0x0, 0x9}, 0x14) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000080)={0x0, 0x6, 0x1f}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x35c, 0x0, &(0x7f0000000100), 0x100001d7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000000)={0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:19:23 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc4c85513, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x36a}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 06:19:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="cc0f2b"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000002c0)="66b99408000066b81e111ee366ba25b5a6000f303681950d00918e66b80b0000000f23c80f21f86635080060000f23f83e0f009125000f381ee594360f320f019dfc32f20f01c98395008800", 0x4c}], 0x1, 0x57, &(0x7f0000000100), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:19:24 executing program 5: socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) [ 326.173641] ================================================================== [ 326.181066] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 326.181574] CPU: 0 PID: 8925 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #66 [ 326.181574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.181574] Call Trace: [ 326.181574] dump_stack+0x306/0x460 [ 326.181574] ? vmx_set_constant_host_state+0x1778/0x1830 [ 326.181574] kmsan_report+0x1a2/0x2e0 [ 326.181574] __msan_warning+0x7c/0xe0 [ 326.181574] vmx_set_constant_host_state+0x1778/0x1830 [ 326.181574] vmx_create_vcpu+0x3e6f/0x7870 [ 326.181574] ? vmx_vm_init+0x340/0x340 [ 326.181574] kvm_arch_vcpu_create+0x25d/0x2f0 [ 326.181574] kvm_vm_ioctl+0x13fd/0x33d0 [ 326.181574] ? __msan_poison_alloca+0x17a/0x210 [ 326.181574] ? do_vfs_ioctl+0x18a/0x2810 [ 326.181574] ? __se_sys_ioctl+0x1da/0x270 [ 326.181574] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 326.181574] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 326.181574] do_vfs_ioctl+0xcf3/0x2810 06:19:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) [ 326.181574] ? security_file_ioctl+0x92/0x200 [ 326.181574] __se_sys_ioctl+0x1da/0x270 [ 326.181574] __x64_sys_ioctl+0x4a/0x70 [ 326.285941] do_syscall_64+0xbe/0x100 [ 326.285941] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.285941] RIP: 0033:0x457519 [ 326.285941] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.285941] RSP: 002b:00007f3e34a18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.285941] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 326.285941] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 326.285941] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.285941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e34a196d4 [ 326.285941] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 326.285941] [ 326.285941] Local variable description: ----dt@vmx_set_constant_host_state [ 326.285941] Variable was created at: [ 326.285941] vmx_set_constant_host_state+0x2b0/0x1830 [ 326.285941] vmx_create_vcpu+0x3e6f/0x7870 [ 326.285941] ================================================================== [ 326.285941] Disabling lock debugging due to kernel taint [ 326.285941] Kernel panic - not syncing: panic_on_warn set ... [ 326.285941] [ 326.285941] CPU: 0 PID: 8925 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #66 [ 326.285941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.285941] Call Trace: [ 326.285941] dump_stack+0x306/0x460 [ 326.285941] panic+0x54c/0xafa [ 326.285941] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 326.285941] kmsan_report+0x2d3/0x2e0 [ 326.285941] __msan_warning+0x7c/0xe0 [ 326.285941] vmx_set_constant_host_state+0x1778/0x1830 [ 326.285941] vmx_create_vcpu+0x3e6f/0x7870 [ 326.285941] ? vmx_vm_init+0x340/0x340 [ 326.285941] kvm_arch_vcpu_create+0x25d/0x2f0 [ 326.285941] kvm_vm_ioctl+0x13fd/0x33d0 [ 326.285941] ? __msan_poison_alloca+0x17a/0x210 [ 326.285941] ? do_vfs_ioctl+0x18a/0x2810 [ 326.285941] ? __se_sys_ioctl+0x1da/0x270 [ 326.285941] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 326.285941] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 326.285941] do_vfs_ioctl+0xcf3/0x2810 [ 326.285941] ? security_file_ioctl+0x92/0x200 [ 326.497758] __se_sys_ioctl+0x1da/0x270 [ 326.497758] __x64_sys_ioctl+0x4a/0x70 [ 326.497758] do_syscall_64+0xbe/0x100 [ 326.497758] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.497758] RIP: 0033:0x457519 [ 326.497758] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.497758] RSP: 002b:00007f3e34a18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.497758] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 326.497758] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 326.497758] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.497758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e34a196d4 [ 326.497758] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 326.497758] Kernel Offset: disabled [ 326.497758] Rebooting in 86400 seconds..