[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.022151] audit: type=1800 audit(1538862066.110:25): pid=5663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 35.041201] audit: type=1800 audit(1538862066.110:26): pid=5663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 35.041221] audit: type=1800 audit(1538862066.110:27): pid=5663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.80' (ECDSA) to the list of known hosts. 2018/10/06 21:41:18 fuzzer started 2018/10/06 21:41:20 dialing manager at 10.128.0.26:34539 2018/10/06 21:41:21 syscalls: 1 2018/10/06 21:41:21 code coverage: enabled 2018/10/06 21:41:21 comparison tracing: enabled 2018/10/06 21:41:21 setuid sandbox: enabled 2018/10/06 21:41:21 namespace sandbox: enabled 2018/10/06 21:41:21 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/06 21:41:21 fault injection: enabled 2018/10/06 21:41:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/06 21:41:21 net packed injection: enabled 2018/10/06 21:41:21 net device setup: enabled 21:43:26 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x303002, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e22, 0xac4, @local, 0x4f29}, @in={0x2, 0x4e22, @multicast1}], 0x5c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e21, 0x3, @loopback, 0x8}}}, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0x0) r5 = getuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000440)=0xfffffffffffff001) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={r0, r0, 0xd, 0x1}, 0x10) readahead(r2, 0x1, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{0x7fffffff, 0x3, 0x8, 0xee}]}, 0x10) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000540)=0x0) ptrace$poke(0x4, r7, &(0x7f0000000580), 0x7) ioctl$KDDELIO(r0, 0x4b35, 0x4) setpgid(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', r0}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x12}, 0x40}}, 0x9, 0x400, 0x7f, "ca2c03eeba7f9b6f252f76ebd3cb86ba5962b2edc4960d299f1a5bdefd9404d318dbcda4c00cc76fb6380c5209734db776a2f00b9069aea6e1185997aa90b3da6567c6caeb405feef847c1274a121ce9"}, 0xd8) ioctl$KDADDIO(r0, 0x4b34, 0xea) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000740)={@dev}, &(0x7f0000000780)=0x14) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000007c0)) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000800), &(0x7f0000000840)=0x4) keyctl$search(0xa, r4, &(0x7f0000000880)='asymmetric\x00', &(0x7f00000008c0)={'syz', 0x0}, r4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000900)={r1, 0x71}, 0x8) prlimit64(r7, 0xa, &(0x7f0000000940)={0x7a6, 0xfff}, &(0x7f0000000980)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000a40)=""/93) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000ac0)={0x2, r0}) syzkaller login: [ 175.094254] IPVS: ftp: loaded support on port[0] = 21 21:43:26 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0x7f, 0x18, [0xffff, 0x80000000, 0xc96, 0x5, 0x5, 0xdad]}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0x5, 0x2, 0x3, 0xa, 0xfffffffffffffffe, 0x5, 0x9}, &(0x7f0000000180)=0x20) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000200)='net/igmp6\x00') ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f00000002c0)={r5, &(0x7f0000000280)=""/30}) readv(r4, &(0x7f0000001700)=[{&(0x7f0000000300)=""/14, 0xe}, {&(0x7f0000000340)=""/207, 0xcf}, {&(0x7f0000000440)=""/71, 0x47}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/180, 0xb4}, {&(0x7f0000001580)=""/66, 0x42}, {&(0x7f0000001600)=""/220, 0xdc}], 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001800)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001900)=0xe8) r7 = getegid() getresuid(&(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)=0x0) mount$fuse(0x0, &(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)='fuse\x00', 0x800, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize'}}], [{@fowner_eq={'fowner', 0x3d, r8}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@audit='audit'}, {@dont_hash='dont_hash'}, {@obj_type={'obj_type', 0x3d, '/proc/self/net/pfkey\x00'}}]}}) shmget(0x2, 0x1000, 0x40, &(0x7f0000ffe000/0x1000)=nil) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000001b80), &(0x7f0000001c00)=0x68) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x6) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000001c40)={r1, 0x0, 0x4, 0x4, 0x8d99}) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x4) r9 = request_key(&(0x7f0000001c80)='syzkaller\x00', &(0x7f0000001cc0)={'syz', 0x2}, &(0x7f0000001d00)='ppp1^\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r9) ustat(0x800, &(0x7f0000001d40)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001d80)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001dc0)={0x0, 0x19, "9a3ad38a2d8f59bfaaf687943a0dc1bb43b1a62aa7a2a26182"}, &(0x7f0000001e00)=0x21) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001e40)={r10, 0x1000, "213ed65d7114b123f11e2ac0d365d13ed607e53dcc95106d7c47273802fcffa083aa75890fca31c2868590594a822dfde9f0c135e436e24d72107ebc7a7104973aa11545aefd7b3c8bbd8e98947e80d2da95adc4a5a3a2494978317b680b6e1136ffe770c07760caa39802df0bf2fa25b9241952b50c279aa7d2b6e6e2fd124b2db1efcc81007cd7d34af5161a3fc697f8dfb5b5f5bc76c8d22b81e71fb601b8dd85ad36ef7f863547321c013ce14b8b1cb1573772d6d12bbf43cf169a0d365a7ed638a0dc0c7fd206cad2b4621d3735fcf7360ab8234bbb7f7806403d95533a8fe7db1488b909785067b0263496b668d9950728cc09a2add6d6a18b490e0b48c60904bf238da0397d3dd1a19d5506c512ff6c4ead24483e320920790fa82566a7ef512d02597b6371373c9f011b50519f0b45ed6eaa1183f0563ef0d79138449c5a2b764b39a508ec6feea47cbc3094f9b440bbfbb3f80a1b92ace51bb9f15a1fedf7477f85f17b57f2080c70a7bb3b8d258ecad91965b4b7073501982d3b9846ed3b785d0f9a2e747c73c7dec695a6c572e2cd678f37cfaedecbd96fa1becfa35b79da1639c566ae16c9a4328708cf1d8d26baf92153dc5dd5dc0ab7c216b6a70421a669c7bbe009503291396813d62cea565ba3446a812246c8d81dbedc1b9eaa4925d1f0ba60d26cb882e3e1649627c09d51b63b9eb8077e77c139a19a7285858885989963de649d5e17351503f0f9ef05bb671ce08d4129154412a435600467ae382a9f80705b33fd83f9e72fc77601ae80c37d8c14c8ffbfba350317b654b8a680c1f8d8a1dcb00035776ccc4606579edc1c75e147aa4df288e1d00a52d3d012b2d0acd6e9294653804becf8c861052ac3dd8ff36dc37f2b0a086f473ee503ae9d940bdbeb3a48607f83c52b2489072320af405c0d3ef238ed39e35dcf47dbb790cbe2cbc28d3d775f57ef73986551201f7eb9830fdedf9131afa0993ecf05fde73259ebf77460b5e8fdb2e7cfdbc157d7b2906263b2bf37158f4cb440871cb7d85b1f1b3dcc175de218e456d4fb545f3ee147b88c8c5353d738e599411cd5f78cd13c71e6eb237fb3a2842cb624ddbcfb5b6ac4222134b4f9246c7081c6318fe1c8e6efe75713dd786149d931583a72675c765bffe862743b184d21beae51163739ccf5dd7b7926f350eb6cf04c5ce0738a63a6af777d3b4a4483b493500b17c16abdaf5f857cee8fdde7951c513f1fc0d619eb09f349bf632870539fb8b3322d1d58f365a5ff1f2c2558c0e64a2bf01d48a68fcc4278383810bb0ac77fb57e6f595448487d2c97b5a9697757848896b343c3ede65539229219494a93865c98a0a56f34db02e7eb01d86adc27635dcfd700970ea3fea9614d15384a2ebd1739b4e64dbfd7df268715db24f27ab369ea1e6792efc91c98f1cc84d6b4f930752f7678a7ae66a256f7865f41b4b7ce4290f1ad2518cebbc82e3675b83bd3bb468325c3174ace7354c6ed6238429c6c1d8d33253268112d1fecfb363e6578dca160435716d72d6ca1e4581c7de4497e4ca2cc72d885fc5bf23a6094ea5ef275d5e1780ced420b4cd59471604773ae8355c67ede4b4af0889bc00033124899840077495f568a463df1cdb94a5838c9a16633f5aaaa6cbc6564b9542f3c0f159ff0abb11521476b7c43aeb0a4dd02111e1e929be43b9cf3956fb47885b4bb4a28963a67601aad162da8b96e7f1112ab98b020762f98ddf75a2df2f4711fa9c12a12fb64e3dc8348eb5f28e413405dd436e137e8f4435afdc91813c0f839f43a556afab60132557c0694f849bbf76f194b5094ad2ffcb78d453487a627f97f83bccc29c34a991d8d2e71b02be85d881695121d36b6267afc8daa6955391679cab923f5e953417034298b0204e08c1260cd3ce0428a10a26381bf781c3db6be001f75d87409e4be7020dba6dce4c1a183cf31d13de2d110643f01cfb9ddd0c93ae013368f65cd32a103651322490d44a1d4f668d3bfbb5672a9b12ce5066c16e71ab89d6dc29f87e8358c570a3f9c2d5b717f633515bcd0bfe9b88df2345970521d35dffd58939a226f84fe92601bd10d89475611814b23a15fec0be2ded2b1ca5ecadd3ecf23fe82f77959184d3206f4ec1b2f440b72a8c6c1249739a01e07dd89b450913d3d8bd72a61cdbd2a709078c2ec1d3d79ee19aab529261193068bf576e4f0391d64d7b974313560110320e3e18ca42a5a583d1b3690bec564338b462dcec7038375fd5a2315c0447a2b912c34a3415c7b420b8ccd1a5786db948643d5fcb259ea387645b97846d85df16d8d43af66869a22b27a384e121c951f955cc9535794542d9f83b805ee31f21f6d35576d465cc1cddf60c1ef614a60ae8620433539c0e996e9c2138d094963eab69533bd841045479be3db6fececf59e8ea23052f8702358c71d947e29ee39a807f3a8e4b4be48a38422bd308532a4a9b4550d0090b6670b9260922da5563a169b533192c087e83cdf63e6b1ce89555c47a5e498cd456553dd25096fd53c16a33026fb1b4f35ccd9302146dfda5371e6bab80efc547d57270446536f97a523a5b123a6975a20d2fa5c32e76625a780bbc44bf6dcf08706dea0297a5f74d206c108c22765b7bc47dd73c77336d5b97d6e65e7962e59428fd1be1220c563137e4aadd29369aae155a1c5bc79411f6dd1dd75295a6d72b11fb7afe1ebe879fb7a1d362a6fe6890ebbcf2a2d2e215b27476be926584d56999e310208ebc3f441d7730f535c2378c4d08cfa6a828caa460022ebd50b0b328ef404b8bbbe824bd0ad96215dd40290db4133bc061e633706be03e2e806df731a8c7b458788d152cf40e84b894c76d45071be7e3b11bf13acc351fdb60bceff83276f2414f03ebb0d2582b8b92548cee3023512c7dd9761099586f54d5cdb18a8c967fb9fa645713b6e42f34400650ed5c97ac864335f527677d57010ee83d52944d07d53ab407e73d986afb1672620fcf9afa4624d129814f00e9f917678f6f4f9d3b59e2841f400290ee728d3b46bd331a97c743b47d7f719094024b684a3c7462d5b3aeeaea13070f1c157b6ff97cd0a5cd3e571aaaedd2e066464f836ea0c83b8294d42ef65d553d9971dca9aaad2dba9becf234249cfd65eb6e4500f7d62fd47d1b4e3c86408376db02e847292ccb0a77ef00ad09ee0f042f3eab02b97e508e1b6750c0c9429262b383a554c3b34e76bdc0677ea1cb37ec6098ebf8636bde75a8092c81a09769779e6317490de45cac3530083dc2ab0abb325e90c1eb8f13bc953a74507859bb19d7a9e311199614b4d89b9d02c7816e423980144901b75e15bdb5a91d9b68c8d1329a1a3ae0bbd652334630579cad3d0212c9449356b8650d7d4add1234eafb720359aadc6aec3cd29f4fc7d029465e6e4c7f6252832c2fa35efcfe4d3ecfa9ccb2ce6bb10a575c2a25f42a0145621ec353db733a7869dabab854d44e67cb59f36c88bc9aff231eaf77f9d8318a8e344b9c02e4b23dd39a39abbdf948756c71a8430494efaf0d303c2044af6023535e5ad970a9bf723b28360896ad883cb18fe276c62d13a3952b4320fe4966734dc950f529187ace6d966ea74c7c96c2cf4268d1a65b1374a0649e1c5031e73600998824ef13da61ed349827f1183cfadd747cc11f9eb9cf9fa24f8d0710b7d0e439e9485807da42b25dd90d5128b22fbb8ff2fade57718e18d345f97ed1aa48579dd8aca346fa331332d8a3724a1c087f05688da51dc17196ebc639fb244322ce436ad6e9175c66e772ac9c99b41ef3d02a8da28c75b33fdfb3dc39a232f364964d00ddb1a699039e9453ff60b831f872fa89be7a5dd54a3804c500dd360ddfb6cc33ec83e04c0a3eb049f96a8de7819d2f12ce293e3b7f70ee21f0ff7266b7e6fd15aa8e7cef1c137005ffdf2f99733a627a6044d0933c52e0e5646fb148761fa1e628c6499bc46bd0bde7f52d3fc3d88b52d2d1c2b317ec28324ba970a133b0253dc726a752f99474e1b96a8cb837b987748b0d363cf72cf7ac87389e221b09e193ab7c225828102dcdb6ddd7ea0a7346fd7cedacdb8d91391b9964dfca7d67a7f08bd6c6badd6c8e8b5f16007231a1df2c4bc3ec44ee8fcf6808abb01cb7033a47b72e670950954370f0ae4b9c9cede81b04ba0a30e28b9c4b38299c7ba06222641db6d5876a9df57191e2cfce5c3d678f9ae7fc9754d9f0c7aa2fb854df35750d42f30da49dbf45821fddef6af8cb38df8d97604b2837115f99c14aa72ddffb6b82207bb157af244d2eff4ca13661b3afd4064f7736784d960a19e064fb91fdb655e38f490d070da94a48be1903c0131e7ee56148bee31b58a7b036b7ce08242755b7840086b225d3e044f1f60db55868426c06465029d0a52658caa01b860460e534cca8781f63003324c0dad3aaec5859d88fc5ed53535ebbf0445b37d3c43c1685687b4923ffd058060b9289cfd07996e6fa3b6b420aaadb810d3682cb39f40b5f9e4e322327f75920e8aaea3b700b5745e82698f2d4d08801661c70d6c720731c944ce34054999c50ebcc3720551d32652863904dd3eee0638d0825ea161422d1e22faa87b29449e44bb0d3d49df2a260c48f3b79757f7d342112393c260fc8a4e3d7229ad3ade95de03e77586d9de807d3ab911b7b5def51e2a147836281618aaf4315cadc3d06c24bd8d7e61bac30a3b8d98111dc1e7680568dcfd003ffa25f316b877f3d14b325a7b844ed1ae24093f2f37174e426c352abb9dd0acaf2e6bf5b2269c03fc08445e24dea8e0074a5c5d7f90b5904d76ff46d36fa8591152ea3645431ce014b53d9300833c326970de938805761564b79d8b74f52aefda7903e39e3dfe023b405584934e01a3fb501418c857b39cfaf2ff742f3b4cbcf2b87899e0046c6b08bae6ffb709fb7d4340e2ff811ee1c5bedfe6c2b6923df10d0f3f92005c01ec92304e0e5ceb9f50651d81f26d0af69ffbb4ff9f102c40e1c5521196a15248efa662db8c0ce0021573ac9c2d5d652bee61bd775d98090a9cc8b54cd8f4e39969d1d40af203eeebf030d795e11f42d0692766cbf272b1e4cf35eaf4e585688c693ebfc65fb4f5908bf919702aa599298ced6d5fddcd5983048ad12bc555a92a5b213160003e21b80aaaf09262681aaa76649ea64aadddfd8446658351ed50008f25f202e0d60f70d940ffa8ffc23374d16a8fb9a810e0057ea8c5e91e9bf328d3536806bcec504bb073013a6849a1da0954a0cd00864caf47b24e9ddf9f4a4ee4a02c3e0c226ae912428f4075f8b539a256c8be2bb234453f3eab9769b3145edeca3f40a0ea5290458b7b7fe348b47dac994a402276889e3f911b1766d68f3d76148dc28a4eb4e441973ab09300317f95f827793d531a4d741ca475e0fc926b758827cb34210a0f5c6fee08d211f8c1d858d70cdb7462904d335df5b8dcc8bdf9adc6ab87ffaffbc4fa5bf63dd83cffe4611201d88347b8f0878367ae9dcf47636b824b63c542e05de30b4f667f6761df3a16508b14b658e021c39a8794c5c76e46d0c263d82c3eb84750a110e9fe6ec2778df76abdd40fb0d466f2beb73926451d9de9352c5eb2b4a2b2041956b2426a408993c15abcfcfbdfdef6ed8ee5a4d71198fff1df2e2cb6920fab1d6f55da9c5a9f73117bcac4fb652dc586b814954e58945cbfaeee67afb01d3f1f6f2a29c29668cbb49514416abf8e5f1e2046b7b8edefcfd470772c998fa533e0bd8a2c37681402f2c69b70d6f90fd491"}, &(0x7f0000002e80)=0x1008) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000002ec0)={0x1, 0x6, {0x57, 0x1, 0x7, {0x0, 0x2}, {0x0, 0xffff}, @const={0xeab, {0x100000001, 0x4, 0x7, 0x767}}}, {0x53, 0x5, 0x1, {0x3, 0x9}, {0x7, 0x3f}, @rumble={0x3, 0x64d31eef}}}) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000002f40)={'bond0\x00', {0x2, 0x4e24, @broadcast}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002fc0)={&(0x7f0000002f80)='proc\x00', r0}, 0x10) [ 175.336719] IPVS: ftp: loaded support on port[0] = 21 21:43:26 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc3, 0x8800) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) fcntl$getflags(r0, 0x40b) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x8, 0x5, 0x1}) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffff4a3) ioctl$TIOCEXCL(r0, 0x540c) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) epoll_pwait(r0, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x100, &(0x7f0000000140)={0x401}, 0x8) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000180)) ioctl$TIOCSTI(r0, 0x5412, 0xff) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000001c0)=""/4096) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000011c0)=0x90, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001200)={0x0, 0xa564}, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001280)=@assoc_value={r1, 0x400}, &(0x7f00000012c0)=0x8) setxattr$security_smack_transmute(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001380)='TRUE', 0x4, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000013c0)={r2, 0x8000000000000000}, &(0x7f0000001400)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001440)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000001480)={0x3, 0x7, 0x101, 0x0, r3}) sendfile(r0, r0, &(0x7f00000014c0), 0xc3) arch_prctl(0x1004, &(0x7f0000001500)="3c6f955a581caf043f09dd90f28c") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001540)=@sack_info={r1, 0xffffffff7fffffff, 0xffff}, &(0x7f0000001580)=0xc) setxattr$security_smack_transmute(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001640)='TRUE', 0x4, 0x2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001680)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000001700)={0x0, 0x0}) utimensat(r4, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001740)={{r5, r6/1000+30000}, {0x77359400}}, 0x0) ftruncate(r0, 0x12c00000000) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000017c0)=&(0x7f0000001780)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000001800)={0x10}) [ 175.541797] IPVS: ftp: loaded support on port[0] = 21 21:43:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x228000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000040)={0x90000, 0x0, [0x4, 0x9, 0x8000, 0x6, 0x2a9, 0x0, 0x9]}) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c4c2fd086e09420f01ca48b80b100000000000000f23d00f21f835300000080f23f846dfde65470f01df0f01f68faa701209990b000066baa10066b8000066efc74424009f000000c744240200a00000ff1c24c4a2e8f30e", 0x58}], 0x1, 0x40, &(0x7f0000000180), 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3af3, 0x40000) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000200)) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000240)=""/190, &(0x7f0000000300)=0xbe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r2, 0x0, 0x1, &(0x7f0000000340)='\x00', 0x0}, 0x30) wait4(r3, 0x0, 0x1, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000480)=0x24001) r5 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)='GPLeth1md5sum[)mime_type\x00', r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r3, r2, 0x0, 0x3d, &(0x7f0000000600)='/)selinux]-\\wlan1(securityR\'vboxnet0ppp0cpusetvmnet1system{,\x00', r4}, 0x30) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = inotify_add_watch(r2, &(0x7f00000006c0)='./file0\x00', 0x12000400) inotify_rm_watch(r2, r9) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000700)) r10 = semget(0x1, 0x1, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000980)=0xe8) stat(&(0x7f00000009c0)='\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000a80)={{0xffffffff, r11, r12, r13, r14, 0x4c, 0x6}, 0x1, 0x8, 0x5c86}) getsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) r15 = syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x61020000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x20, r15, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}]}, 0x20}, 0x1, 0x0, 0x0, 0x41}, 0x72392030d9ce5993) ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f0000000cc0)=r3) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/vsock\x00', 0x20000, 0x0) [ 175.914924] IPVS: ftp: loaded support on port[0] = 21 [ 176.027427] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.057648] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.069562] device bridge_slave_0 entered promiscuous mode 21:43:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xffffffffffffff7c, 0x420440) r3 = signalfd(r2, &(0x7f0000000080)={0xfffffffffffffffc}, 0x8) writev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="600941c4b9ae98300134b0654faaa62d1fd6eafdae235ceb9e6ce25372f07f86e45d421656e29c44a03faa85ad59177db3eeb72f67cfedd78260ab4bca8cfa2cd74e9de63119e2f52c6808bc2bd4048df2d8e3a79006c82dbd1cc3b45ab4b1d4e5d6f241b1d7efa6fff17da327d303", 0x6f}, {&(0x7f0000000140)="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", 0xff}, {&(0x7f0000000240)="58d05cf8229ae078a3873c9ee12505fe588523046e37d52ddca252459315bfdc8b044f28b9530a8d29710111dee0e9ce483ad361e4f0e03c1241789f8927c1b123b681565084bf014b", 0x49}, {&(0x7f00000002c0)="7fd1d0d2889cd54f2d5be0e75e3a8f06bcb387f5b1f2f117f230a1d3eebaa4ae5303e29f3f73a34905b1c5769d2f79557efe0ad743bf7f04dd4618f557ea63813510b334e0a41bfd0ad9555259e123e300dd826b84b6d73dc70d6652aa6e3b889de470ac6217", 0x66}], 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000380)={0xa, [0x2, 0x9, 0x0, 0x1c0000000, 0x2, 0xfffffffffffffffc, 0x5, 0x7abc, 0x10000, 0x2]}, &(0x7f00000003c0)=0x18) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000400)={0x80, 0x6, 0x7fffffff}) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text16={0x10, &(0x7f0000000480)="f756bcbaf80c66b8f253cf8066efbafc0cedf3650f01bd1c4fbaf80c66b8f488d48066efbafc0c66edbaf80c66b8d825f18e66efbafc0cb000ee0f213d640f0d5214263e0f213b66b9800000c00f326635001000000f300fc76ae2", 0x5b}], 0x1, 0x14, &(0x7f0000000540)=[@dstype0={0x6, 0x3}], 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000580)=0x99a) r4 = getegid() shmget(0x2, 0x2000, 0x0, &(0x7f0000ffa000/0x2000)=nil) ioctl$sock_proto_private(r0, 0x89ea, &(0x7f00000005c0)="8be1419e7b4befad1d202b32f191a3061daa2c7ceae54c8dda22d5bd8401f86b0e6d1d4124e862f13ac7e316e82338790a02176db964579a915610b3b5fa0602") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000600)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x2}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000640)={0x1, 0x60e442d7, 0x6, 0x1, 0x1ac000000000}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f00000006c0)={0x0, 0xfb, 0xbc, 0x1, 0x6b7, "7eae914c9455e035c4921c5e679788e1", "c5c043e50b7f1b2946cb6f11eccbf86b1a1e187218d06efd3a2575f708c842b77f6efc0c337cd063f7d853cb3401bf9fcff0c5776bc82799486fd4b0ae7dd318fb49f4e8e03f4d414b7881858d1a132078ddcefddd1b9afbfd9f9b4e603e90ea8a6513555bfe47699ceab5e4393544811b8b63506626ddf8682ed38073292a86c1280c0cde001bd57958e3cf90a22df558c8060d37d2bc6c3b7d199ded03f4f024e90e72ce1d1d"}, 0xbc, 0x3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000800)=0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x7, 0x800, 0xffffffff, 0x7fff, 0x0, 0xfffffffffffffffa, 0x4, 0x1, 0xd26b, 0x9, 0x3, 0xdf0e, 0x1, 0x0, 0x0, 0x7, 0x4, 0x2, 0xffffffffffff8000, 0x1, 0x179, 0x2000000000000, 0xa4fc, 0xfffffffffffffffe, 0x100000000, 0x1, 0xfffffffffffffc00, 0x8, 0x80000000, 0x7, 0x7, 0x6, 0x5, 0x2, 0x80000001, 0xffffffffffffffff, 0x0, 0x6, 0x2, @perf_config_ext={0x6, 0x5f66}, 0x221, 0x8, 0x8, 0x7, 0x7a32, 0x4, 0x8}, r5, 0x7ff, r0, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000880)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000840)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000008c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xff, @loopback, 0x3f}, r6}}, 0x30) r7 = syz_open_dev$sndpcmc(&(0x7f0000000900)='/dev/snd/pcmC#D#c\x00', 0x6, 0x1) r8 = creat(&(0x7f0000000940)='./file0\x00', 0x5) ioctl$TUNSETLINK(r7, 0x400454cd, 0x304) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000980)=""/80) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000a00)={0x5, 0x0, 0x3}) r9 = shmget(0x2, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) fstat(r8, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r9, 0x1, &(0x7f0000000b80)={{0x3, r10, r4, r11, r4, 0x4, 0x7fff}, 0x5, 0x0, 0x10000, 0x81, r5, r5, 0x4}) ioctl$NBD_SET_SOCK(r3, 0xab00, r7) [ 176.176826] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.192473] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.199583] device bridge_slave_1 entered promiscuous mode [ 176.306365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.346557] IPVS: ftp: loaded support on port[0] = 21 [ 176.420071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:43:27 executing program 5: r0 = semget$private(0x0, 0x4, 0x2) semop(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x1000}, {0x2, 0x4000000000000000}, {0x3, 0x7, 0x1800}, {0x0, 0x66fc, 0x1000}, {0x7, 0x6, 0x1800}], 0x5) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x0, 0x7}}, 0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={r2, 0x6c, "9a4dd4814bf7d3cd048fd6b076cfb2aedbdf8b97c58e809183042090b01e3d268326877c5b0c150d587908b6785aae9f42ad73cf446df1fbc4c48eb7005931739768ed0b7824fde49a434312e7df00a79965cd3186e762e48a20118a05aae40be81522ea9d1becff97c923d4"}, &(0x7f00000001c0)=0x74) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0xff, 0x400000) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'bond0\x00', {0x2, 0x4e24, @remote}}) r4 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x797, 0x8000) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000002c0), 0x4) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', r5}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) timerfd_settime(r4, 0x1, &(0x7f00000004c0)={{}, {r6, r7+10000000}}, &(0x7f0000000500)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000540)={0x2, "2bad"}, 0x3) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000001580)=@get={0x1, &(0x7f0000000580)=""/4096, 0x7ff}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f00000015c0)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000001700)={0xfffffffffffffffb, 0x101, 0x7, 0x1, 0x100000001}, 0x14) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000001740)) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000001780)) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000001940)={0xa920, 0x7, 0x40, 0x3}) fcntl$setpipe(r3, 0x407, 0x7fffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000019c0)={0x0, r1, 0x0, 0x1, &(0x7f0000001980)='\x00'}, 0x30) fcntl$setownex(r4, 0xf, &(0x7f0000001a00)={0x1, r8}) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000001a40)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000001a80), &(0x7f0000001ac0)=0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000001b00), &(0x7f0000001b40)=0x4) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000001b80)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/kvm\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001c40)={0x4, &(0x7f0000001c00)=[{}, {}, {}, {}]}) [ 176.707832] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.791748] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.798197] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.808132] device bridge_slave_0 entered promiscuous mode [ 176.828037] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.866727] IPVS: ftp: loaded support on port[0] = 21 [ 176.912285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 176.922216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.978581] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.001513] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.008462] device bridge_slave_1 entered promiscuous mode [ 177.019333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.059926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.089933] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.102373] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.111793] device bridge_slave_0 entered promiscuous mode [ 177.132601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.226515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.239419] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.248788] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.267956] device bridge_slave_1 entered promiscuous mode [ 177.403780] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.411052] team0: Port device team_slave_0 added [ 177.429089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.452421] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.510834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.538129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.554101] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.571913] team0: Port device team_slave_1 added [ 177.607707] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.621952] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.629869] device bridge_slave_0 entered promiscuous mode [ 177.648797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.704993] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.721861] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.729020] device bridge_slave_1 entered promiscuous mode [ 177.752343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 177.771200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.785612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.802273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.825978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.846578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.860494] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.891714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.901947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.909815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.945377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.962725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.971052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.990271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.004428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.054556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.068723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.095680] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.111700] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.118930] device bridge_slave_0 entered promiscuous mode [ 178.152809] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.160692] team0: Port device team_slave_0 added [ 178.176435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.202175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.218551] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.245362] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.252688] device bridge_slave_1 entered promiscuous mode [ 178.270518] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.280132] team0: Port device team_slave_1 added [ 178.294314] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.357851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.384514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.414393] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.460212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.492375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.503052] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.516418] team0: Port device team_slave_0 added [ 178.539663] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.565041] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.572811] device bridge_slave_0 entered promiscuous mode [ 178.580780] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.608495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.628214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.653236] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.660338] team0: Port device team_slave_1 added [ 178.671025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.684492] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.690872] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.702323] device bridge_slave_1 entered promiscuous mode [ 178.708916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.718735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.768848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.802284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.813894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 178.827022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.842419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.864020] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.882740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.940955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.957465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.965642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.979517] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.987573] team0: Port device team_slave_0 added [ 179.008742] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.025104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.044369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.076656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.090984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.102256] team0: Port device team_slave_1 added [ 179.141672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.156313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.185864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.196408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.209568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.240813] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.263138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.279987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.305121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.315907] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.322313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.328900] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.335284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.343062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.349857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.361705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.397914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.411814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.434749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.455247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.481973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.571727] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.579438] team0: Port device team_slave_0 added [ 179.657045] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.668517] team0: Port device team_slave_1 added [ 179.728198] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.734626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.741259] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.747667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.768085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.789633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.810868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.832213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.840856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.853965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.901444] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.921735] team0: Port device team_slave_0 added [ 179.929545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.944898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.954890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.966589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.976784] team0: Port device team_slave_1 added [ 180.007487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.045365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.059598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.099271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.111713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.119484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.145128] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.164979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.176262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.196578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.209646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.232495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.285129] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.291558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.298247] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.304641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.321101] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.332959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.341107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.358583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.453346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.476782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.490362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.659338] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.665763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.672433] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.679343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.705881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.791719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.803803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.187320] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.193808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.200385] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.206771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.252223] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.539574] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.547023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.554531] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.560889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.568940] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.801587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.814590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.452117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.801912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.819695] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.901118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.114556] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.149478] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.156357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.170506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.275487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.294231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.476301] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.492046] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.505778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.512868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.623168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.632337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.639301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.658078] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.813032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.862626] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.958776] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.972855] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.980331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.993803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.104550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.182500] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.221992] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.444808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.485732] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.501818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.520525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.805014] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.828699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.842408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.863707] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.145897] 8021q: adding VLAN 0 to HW filter on device team0 21:43:37 executing program 1: inotify_init1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000400)={0x0, 0x0, 0x4, 0x0, 0x0, [], [], [], 0x100, 0xff}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000100)=["3249b67840c1"], 0xfffffffffffffe37}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='vlan0\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x20000, 0x0) socketpair(0x13, 0x7, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000140)="f9f6a8bffa4f0b59baf0552020bfdfe82d84d32a0c6ecc64a720245cafaeb3663a84cc47d10ff3510f09d9648c8ed63c4c67580b5dbc2269950fd3d356a48798eb92c9bdadbf7e9e49c95cf165534411821a27f200497c477038b46f988228fac79ef1c90fb724cdc07af2", 0x6b) socketpair$inet_sctp(0x2, 0xfffffffffffffffd, 0x84, &(0x7f00000000c0)) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x8) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)) 21:43:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x2, 0x80) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000040)) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x1, 0x900) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000380)={@multicast1, @multicast1, r2}, 0xc) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') mmap$binder(&(0x7f000028c000/0x3000)=nil, 0x3000, 0x2000004, 0x10010, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x2000000, 0x48113, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98, 0x0, &(0x7f0000000100)="be2203a9d766e44a8c93922ac67d0acf32c58041e41a1ff6ba4990a23d4ce0f6ceac86d6d8558ec3a33ac8f3b8aef10a95a0bbc88ed9ad5a7f694e4561b6011a85d9f5328de6642e71c8396b366b769e18274ad8ed106bee5773f80774f313760c80bb8d83e030bfb302645b32c5846debfb5f71cc11d398845387a88bb796eedce7eee009396a4d7df20e027e33856020917b967886fe05"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000440)) mlock(&(0x7f00004c5000/0x1000)=nil, 0x1000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) r5 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000003c0)={0x5, 0x7, 0x4}) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046208, 0x0) [ 186.897076] hrtimer: interrupt took 34427 ns [ 186.900435] mmap: syz-executor0 (7315) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:43:38 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0xfffffffffffffffc) ioctl$SG_SCSI_RESET(r0, 0x2286, 0x7fffffffefff) 21:43:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72af6f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c003d5a06000000c34b982e72fb4e93fde7106f188de420ec9b59b16dbfaefe94d5b6bd9b9f086e59e8160ccd544ed196d3fbdecc176048d21329c58e4035037331838fe2e2dfc7a0fd42994c1a4ce4ae28b9a95e04339d67887dc1d0ab859ecc27b03d7a20558900ba62d400"]) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffeb5) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x40000000, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0xfffffffffffffc01}}}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='cpu.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000008c0)={&(0x7f0000000880)=[0x9, 0x0, 0x0], 0x3, 0x4, 0xd87, 0x8, 0xfffffffffffffffb, 0x9, {0x8, 0x9, 0x7fffffff, 0xfffffffffffffffa, 0xffff, 0x5b60, 0x5, 0x0, 0x7, 0x8, 0x5, 0xcb8, 0xa6, 0x2, "c8ddfd79c51a6e6c35dbb1d92f577e6d81b24af0afed4f86aeca2c5c0c9fc9ad"}}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)=0x0) process_vm_writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/55, 0x37}, {&(0x7f00000003c0)=""/73, 0x49}, {&(0x7f0000000440)=""/80, 0x50}], 0x3, &(0x7f0000000740)=[{&(0x7f0000000500)=""/206, 0xce}, {&(0x7f0000000600)=""/94, 0x5e}, {&(0x7f0000000700)=""/7, 0x7}], 0x3, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x400000) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000000180)={&(0x7f00000000c0)=[0x8, 0x3f, 0x1000, 0x0, 0x925a, 0x0], 0x6, 0x5, 0x401, 0x40, 0x9, 0x1, {0x203, 0xfffffffffffffff9, 0x9, 0x9, 0x0, 0x8, 0x9, 0xd401, 0x9, 0x0, 0xf3c, 0x1f, 0x2, 0x3, "c03de1dc1f6788adceb8c8cb3c3ff37c6bd682351f538a354aa5e815c16316f7"}}) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000800)='system_u:object_r:auditd_unit_file_t:s0\x00', 0x28, 0x1) 21:43:38 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x8020000) restart_syscall() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x1aa) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f00000003c0)={0x2, 0x0, @remote}, &(0x7f0000000400)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000480)={0x0, 0xc29}, &(0x7f00000004c0)=0x8) msgget$private(0x0, 0x40) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={r1, @in={{0x2, 0x0, @multicast2}}, 0x0, 0x8, 0x0, 0x5}, 0x98) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x2, 0x30}, 0xf) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x800, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x200000, 0x0) setns(r3, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6cf0) clone(0x10062101, &(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000000), &(0x7f0000000200)) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000040)={r1, 0x6, 0x9, 0x9, 0x6, 0x8}, &(0x7f0000000180)=0x14) 21:43:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\x00\x00\x00\x00\x00\x00\t0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x7a00, &(0x7f0000000300)=ANY=[]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1025, &(0x7f0000000240)=ANY=[]) r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@sco, &(0x7f0000000040)=0x80) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000300)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000000340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', r1}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000001c0)={@remote, r2}, 0x14) 21:43:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu\x00', 0x200002, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = gettid() ioprio_get$pid(0x1, r1) fcntl$getown(r0, 0x9) r2 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0x430800, 0x108) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) renameat2(r2, &(0x7f00000002c0)='./file0/../file0/file0\x00', r2, &(0x7f0000000340)='./file0/../file0\x00', 0x7) r4 = socket(0x11, 0x2, 0x9) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x10, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={'syz_tun\x00', {0x2, 0x4e22, @multicast1}}) bind(r4, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000280)={'lo\x00', 0x200}) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r7, 0x28}, 0x10) fsetxattr(0xffffffffffffffff, &(0x7f0000000480)=@known='trusted.overlay.upper\x00', &(0x7f00000004c0)='syz_tun\x00', 0x8, 0x2) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x200, 0x8}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) fremovexattr(r3, &(0x7f0000000440)=@random={'user.', '(cpusetself[cgroup\x00'}) ioctl$PIO_SCRNMAP(r7, 0x4b41, &(0x7f0000000540)="b5846fb4f96c0ba2e54536ba0ca49e49764372be96d07c0074573be3fc830619ff3fa0f6527fd33a999645d69fe4bb1ff3ef2aac1264aac65baa82f368dd1f653a419d70dea49fe7f65513a3b8fc599c64f2c726a05ca2f9357721e19ae6da6c180e75cb70582e8e206f2e42610b1468be64430d123ac3a359df7757aea1d61c9c6b76cf4f8b925c5a7b8e2fb58a845f71a5098d37a6b4d5d68e755569d491664b6170ee4ff6b31dab85f5f9602986d02ef90ef281abf827941291d93a276bad1536432f61880104f0e3b9bf5d1082a5a585695f26c8b7a7") setxattr$security_smack_entry(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000003c0)='security.SMACK64IPIN\x00', &(0x7f0000000400)='keyring\x00', 0x8, 0x0) 21:43:38 executing program 2: sysfs$1(0x1, &(0x7f00000000c0)="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") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000900)=ANY=[@ANYBLOB="3800000090000105000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c00020008000a00", @ANYRES32=0x0], 0x38}}, 0x0) [ 187.259283] device lo entered promiscuous mode 21:43:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@migrate={0x58, 0x21, 0x0, 0x70bd2b, 0x25dfdbff, {{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x4e22, 0xab, 0x4e21, 0x6, 0xa, 0x80, 0x80, 0x62, 0x0, r1}, 0x0, 0x1}, [@ipv6_hthresh={0x8, 0x4, {0x3e, 0x5a}}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x4000004) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x80000) fcntl$getflags(r2, 0x1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000080)={0x11, 0x7, 0x2, {{0x4, 'eth0'}, 0x1}}, 0x11) [ 187.380722] device lo left promiscuous mode [ 187.412677] device lo entered promiscuous mode 21:43:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cpuset\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000013c0)=@sack_info={r1, 0x7, 0x1}, 0xc) readv(r0, &(0x7f0000001340)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/10, 0xa}, {&(0x7f0000001280)=""/103, 0x67}, {&(0x7f0000001300)=""/15, 0xf}], 0x4) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000200)={0x0, 0xcfd2}, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x9, 0x7ff, 0x3f}, &(0x7f0000001400)=0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r2 = userfaultfd(0x800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000001440)={0x0, 0x6}, 0x2) r3 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000001380)={0xffff}) setrlimit(0x9, &(0x7f00000001c0)={0xff, 0xba7}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000006ffc)={{&(0x7f0000009000/0x4000)=nil, 0x7ffffffef000}, 0x1}) 21:43:38 executing program 4: exit_group(0x6) r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x10013c93e) 21:43:38 executing program 5: mkdir(&(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) renameat2(r0, &(0x7f0000000280)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000380)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x1) 21:43:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000001500010100000a070000", @ANYRES32=r1, @ANYBLOB="1400020000000000000000000000000000000000"], 0x2c}}, 0x0) 21:43:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x9, @empty, 0x6}}, 0x9, 0x40, 0x6, 0x2, 0x100}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r1, 0x0, 0x0, 0x54}, &(0x7f0000000400)=0x10) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034000030302c757365725f69643defdc2ff691d17691f2b43023953dac2f7f4dfa17dfc9fb16b568369bf352d5e3f4c8b724208dde6cbcb039e0e2f61f51c7ebeb6d1385bd6d17a7e36768632fa3be4eab05f7d82e49cf5eb0d55be4263f66361fdf3eb7ee9ca94c7339c5bf255a176c5c41", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000600)=r2) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 21:43:38 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x26}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00003e2000/0x2000)=nil, 0x2000}, 0x1}) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0x81076214, 0x0, 0x0) socketpair(0x9, 0xe, 0x101, &(0x7f0000000000)={0xffffffffffffffff}) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x40000000) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a3025134d10abe4bd658d447f33020000000000000099c595966a94bced2c400c250c9193edf3745addcc7cc5c02fe6c1d5459e2b8dc1e5d36fc0b8094f2e615162535f8e43922e2c7fc12517132f478a31e4ec7b5b6341938de95973124e5ce15812760076fa7c7c28d5e196e5c496208a10894f66b54f4c809c5d48746a7656f66789298d41"], 0x64f146992c19e244) prctl$intptr(0x29, 0x0) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000001000), &(0x7f0000000200)) read(r0, &(0x7f0000000400)=""/100, 0x64) 21:43:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='attr\x00') mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x9a000, 0x0) renameat2(r2, &(0x7f0000000140)='./file0\x00', r3, &(0x7f00000001c0)='./file0\x00', 0x2) chdir(&(0x7f0000000000)='./file0\x00') r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) connect$l2tp(r4, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @broadcast}, 0x3, 0x2, 0x2, 0x2}}, 0x2e) ftruncate(r1, 0x28007f) getuid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) sendfile(r4, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:43:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="f9bd612334099ef9696a702afe7b095f92dc91576300aa6b0d619f6fd9384055ddc6f81f13e3fbc333c406fd958b64c5a6dc1d069f3b0d9c75214f49b3af45d444edda01476ffe4619950fc155f366bce4fbb0b3264caa1ec10a6cc70c332d9b9d"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 187.876331] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:43:39 executing program 0: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getgid() setgid(r2) read(r0, &(0x7f0000000000)=""/126, 0x1c) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000180)={0x7, 0x4, 0x7a, &(0x7f0000000100)="e7605ce1a09d8dc1d8f979df1bdabd8094c0a1371a2f6ac18c1c7939925c3d992ff03e1942e5a24448481982fe459ad13c1ec58816f78bcbba2e62dd805476fbe24b1da51c12c9400aa5476710ac505e84524599fc0dc5142f42a6b97e5e0e585e3d5a515a2c6e921c28ae3d650ffb5a26318d768eb0447caa67"}) 21:43:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x1000000080081) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x30, {0x2, 0x4e22, @multicast2=0xe0006c00}, {0x2, 0x4e22, @remote}, {0x2, 0x4e22, @loopback}, 0x9f783104a14e79fd, 0x0, 0x9, 0x200}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r2, 0x95bb}, &(0x7f00000003c0)=0x8) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000440)=0x20) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) sendto$inet(r0, &(0x7f0000000140)="6f255b6fb6fdf214bfc28e01138727e0c27d695cf5b04434f33f0642444d18db5d57eb71c155694a1b37a867f70ec81c2abe84068c0ff2b2d594bb953460db80b291d0c9ba3c2b9b5c6e017ae731ef0c44ccd3ce1e9a79d449fa837b9a65ca948df6bd47d2b036f98cf228378faa116885dfa01823f32b586919f0a24dd3af40dd38166176491aa6527c4b58f676f82b68041ea2a465b3b7e9018a78406d96f3ff5951bcd8d88b", 0xa7, 0x0, &(0x7f0000000200)={0x2, 0x4e21, @remote}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r5, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r5, &(0x7f0000000080)=""/101, 0xfffffffffffffd90, 0x2, 0x0, 0xfffffffffffffcd4) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) ioprio_get$uid(0x3, r6) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000480)={0x92c, 0xffffffffffff76c0, 0x3, 0x80000001, 0xd3b, 0xcebc, 0x100000000, 0x8, r3}, &(0x7f00000004c0)=0x20) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x71, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 21:43:39 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/167, &(0x7f00000000c0)=0xa7) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) socket$inet(0x2, 0x0, 0x2) 21:43:39 executing program 5: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) r0 = gettid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000500)=""/167, 0xa7}], 0x1, &(0x7f0000000240)=[{&(0x7f00000005c0)=""/172, 0xac}], 0x1, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140)) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x40c842) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) open(&(0x7f0000000040)='./file0\x00', 0x401, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7fff, 0x20000) fsetxattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)='eth1md5sumu', 0xb, 0x1) 21:43:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x68, 0x200000000000200, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x0, @multicast1}], 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000364000/0x2000)=nil, 0x2000) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6f73326d6d6964692300b5cdb5cb484331c6228ed4e5377ae142e0eb6315b8be468bc98e1911b9fd4e044d9644964a1551c423d8ff04d4818b0ea1489991c09dfa2a6a354e32501898c6d9ad1e8ef1242123c396dc7d4a254b3ba813c74f99c40f4694ecd7f007fe3385b4f165445a254ea7ae2231ccfc3be9b9a6e423d1fecb000000000000000000000000000000"]) io_submit(r2, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x4000000000000000, 0xf0000000000000, 0x1, 0xfffffff4, r1, &(0x7f0000000000), 0xfffffce4}]) 21:43:39 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000100)="8d7b76626f786e657431707070315b2d6c6f00"}, 0x30) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000180)=r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200001, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) socket(0xa, 0x1, 0x8) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) 21:43:39 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x414800, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000080000000000200ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000002004e23ffffffff000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000"], 0x110) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB="00000000000200000000534d4b8aa119130e00524fd23cb200c57d86acd89fb5a59661541f6bcda9f986aa02824da84c9b68d37f026bf5468967c6110200000045b9762d0000000000000000", @ANYRESDEC=r4, @ANYBLOB=',blksize=0x0000000000000800,default_permissions,max_read=0x00000000000000f8,allow_other,default_permissions,dont_appraise,smackfshat=/dev/vhci\x00,fscontext=root,dont_measure,\x00']) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x8000}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={r2, r5, 0x2}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r6, &(0x7f0000000000), 0xfffffffffffffe4e, 0x0, &(0x7f00000000c0), 0x6) [ 188.067699] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:43:39 executing program 0: setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x2f1) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'irlan0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000140)={0x2c, 0x7, r3, 0x15, 0xffffffffffffff9c}, 0x10) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000280)="b0", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x224) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') rt_sigpending(&(0x7f0000000300), 0x8) ioctl$TCSETSF(0xffffffffffffffff, 0x402c582a, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x3553800000}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1f, &(0x7f0000000180)=0x2, 0x4) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 21:43:39 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e24, 0x93, @dev={0xfe, 0x80, [], 0x20}, 0x69f}}, 0x8, 0x7fff, 0x101, "c0746168708bf6d4e53b315f7faa66d42fec80e85834b384b58b8b2693e96ce74c4e3d9b6fbf19844e20530a4d4c070b0d5ad9068f74228c9cd5df9dc1b1a493dfa2a345a6cac37cc8f0c7e9a398f0f2"}, 0xd8) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='GPL\x00', 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1c", 0xd) accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfd06) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000002c0)={r2, 0x1}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7f, 0x9dc2}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xc000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x4000, 0x0) ptrace$setregs(0xe, r3, 0x0, &(0x7f0000000340)) 21:43:39 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x8, 0x1) pwrite64(r0, &(0x7f0000000040)="776eb9c7c8b19b3042ea511e485e6c2d378151bd4009ae1a626e88a5380755b0da70a6900e78c01de75e776938ab15fe7e4dbf4cbf3966ce13b75a4e39d8b67fe64a056a220a4601a45b2e714ec9cb74e9ec3b05d81e38084ff0c2750e208b525bbe8f526789dfee69f5b7e7db32ec4f757675a0d3cf16dbdca4a0dd009274071582dd7fdaca574554074d5d6514", 0x8e, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0xc008551c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "1ef4bc48491acd5e0c4b976cba7eef36c40efce39f2b9c125ba7a77d8dd019d6041e65648e7f165944391be5"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x3) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000140)={0xffffffff80000000, 0xfffffffffffffffb, 0x8, 0x662}) 21:43:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r1, r2, &(0x7f00000002c0), 0x10000000000445) 21:43:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/94, 0x5e) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x4, &(0x7f0000013ff4)={@local, @rand_addr, @multicast2}, 0xc) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000004000000a0cd8f01"], &(0x7f0000000000)=0x1) close(r3) dup3(r1, r2, 0x0) 21:43:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4b04ab328898a8a7d87a53e52ad4c29e28eb4d399c866f1d23950688223119a7095ae157cdddc7d2fb714a3dda9d9d3bd5724b84c8bb1b901600566481cddec008b9d28c1e4f7bf30f199a64b0007f026986d08b241dcf155bce2100cc756d5feb1d9b40ad02"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x4413fcf12466f4d}}, 0x50) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getdents64(r1, &(0x7f0000000240)=""/105, 0x69) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) getdents(r2, &(0x7f0000000540)=""/185, 0xfffffd62) read$FUSE(r0, &(0x7f0000003000), 0x1201) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 21:43:39 executing program 3: msgget(0x3, 0x4) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000440)=0x7fff, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x100000000, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x2}, 0x100000063) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e0000001000000009b000000000000000000000000000000000a000000000000005701ce7dc9829704e052b9965e9ef7192b3df7fb", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ba0171a27f9dbfbc700000000e9ffffffffffffff00000000c42784ae37af7050c1a0f3d11c96e25643d99b740e68828d465d1b80aebf80740e7887569d31366ad561c5836b0c375a3fa3eb3333e35daabba3603070bc508f53cb5f197c6d94c5b5772f6c5a8d1d301cd555a14340c09d15f216f37ecbd1e95b0023b90c9dd5f96a7928ed1b39b0712bdf9b9e85b9a9e860d4516be713"], 0x4}}, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000480)="675bccbc4a4abaa1cbf1d4916b44079aa0c0a393a4d73edd44fc34599a234a37a72294a989785c09911bb5c0d666992804dc487d58f898054c1a4c58b2ef59388afd7201a6b0aef12322524903c560c129d0f3125275a30c5ead84f6679efa", 0x5f, 0x4000, &(0x7f0000000400)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x11, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="2259ce37bc6a4436ca880768f7ca1e91f92e8b6c4324cc9f2beef3487a021e93e612a2ec4dfffb874727d9fbbf193d6f43dd22aa1c103e6bb3cf645560a99f0919e3f0e1b7793ecac5b1a3793c2bf94d4ac720d1ef41e68d9de90c6d5557cc3dee3f1b4268890a21ed38102e82e18a303c126a7828e1a1d89b9956c70330bb71f02b78981d9d805829944cd62c13bc93e0d6e0111b1726279f757dd12f5a3684d6dacd82d1e9dc79aa9094f312f0643494c4a1aac86c578ca6e73e7858d1ccb2b9a1678c71c099a942823ecbd40d7eddd7eb510194f8463426ad707aca4587603cb05dedd76b86b6a061b9afd36092c3d010c4d28e") 21:43:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000100)) 21:43:39 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r2 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x14, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {{0x4, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ptr={0x70742a85, 0x0, &(0x7f0000000040), 0x0, 0x3, 0x17}, @flat={0x776a2a85, 0x1, r2, 0x3}], &(0x7f00000000c0)=[0x40, 0x78, 0x18, 0x20, 0x38]}, 0x3ff}}], 0xfffffffffffffcfb, 0x0, &(0x7f0000000280)="23d39d147d69e188e3e94eabe96ef68f49fe5cc9bbd5c6e65b5cc7ff9cfb7b5c3f0386c5eee7e4ea2aece8d8ef4e44fabcee382a65499ac51e72d19c5141b0cef36c8bfc7d866e1439197d85a3b7535ba0ea25b0248d5bfc06879a9883ae2372c180588d39de5c62d77aa0321a96be34bbd8cb3595f2ead021b2e53cb95c9e20d29bd8d01b2ee3f5052425f0f0880400000000000000654148"}) 21:43:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x3, 0x401e, r0, 0xffffffffffffffff) 21:43:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10c00, 0x0) futimesat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x2710}}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000001c0)={0x2, @remote, 0x4e22, 0x1, 'none\x00', 0x1, 0xffffffff, 0x13}, 0x2c) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000200)={0x1000000000000000, 0x81, 0x1, 0x1, 0x1}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000240)={"0061a40000ffebf9000000000200", 0x9d01}) r3 = dup3(r2, r0, 0x80000) accept$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="8f2d00f80fcd972d3b7e", @ANYRES32=0x0, @ANYRES32=r0], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) close(r2) [ 188.810056] binder: 7556:7561 got transaction to invalid handle [ 188.822747] binder: 7556:7561 transaction failed 29201/-22, size 0-0 line 2855 21:43:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000140)={0xfffffffffffffc01, 0x1, 0x7ff, 0x3, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0xffffffffffffec88, 0x20, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setrlimit(0xf, &(0x7f0000000180)={0x1, 0x4}) sendfile(r2, r1, &(0x7f0000000080)=0xc00, 0x800000bc) 21:43:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) bind$packet(r1, &(0x7f0000000340)={0x11, 0xf8, r2, 0x1, 0x6, 0x6, @dev={[], 0x17}}, 0x14) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x11dc00) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000140)) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffe1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYBLOB="bb00000000000000007f006f0e14b7c38149721081dfb09c91e532e3f5d31841dd147a256d185d7adf72019d1219ddbc532daa5a5a6c2b4809a051a2169105fe6cd0ebd7004d13d16e7fea5d93af363a171c4e3c837038097f139f658b0efd415af3d644123ebceb7b362fbf38e08075b1cff81c683e1b56c0b7336bf859046ec5f91e663f28b1796b773c6fbab551903fd3dd245d"], &(0x7f0000009140)=0x1) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) fstat(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x7) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x20, 0x0, 0x0, r6}, {0xffffffff, 0xff, 0x2, 0x0, 0x7, 0x4}, {0x3f, 0x80, 0x80, 0xe0}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x3}, {{@in=@broadcast, 0x4d6, 0x7f}, 0xa, @in=@multicast1, 0x3500, 0x2, 0x0, 0x9, 0x4, 0x5}}, 0xe8) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) write$USERIO_CMD_REGISTER(r5, &(0x7f0000000280)={0x0, 0x200}, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r7, 0xae80, 0x0) 21:43:39 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000440)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e158c10c64b46091df17fc217a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c0090608bd73f4772539", 0xca, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000600)={r1, r0, r0}, &(0x7f00000003c0)=""/107, 0x6b, &(0x7f0000000280)={&(0x7f0000000240)={'sha1-generic\x00'}, &(0x7f0000000140)="b34abf337faf8642740930b1d1ec86456da23ec086387659440376e788bd4814864afaf942a22da959a49e0418d5b3f90e2d045f1210d3bbf8e8aa701fe6c86dd65c2e7a7fedd9f406cbbcca361a295c7eed5920c2abe7e0a1d4579c1977dcfb99a99a3dabfdb09e68bdf7aa7e75b24024636ca43384d6e665ca6f3df5e979e4a2a48ade9e27c2b3b8aed0a049603e6828aa2cabdd1f999ba4ea65565d", 0x141}) 21:43:39 executing program 0: r0 = memfd_create(&(0x7f0000000040)="000002000000000000000cac22f2b6", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = userfaultfd(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='/).vmnet0bdevwlan1(vmnet0mime_typevboxnet1\x00', r0}, 0x10) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$VT_WAITACTIVE(r0, 0x5607) mmap(&(0x7f000055c000/0x3000)=nil, 0x3000, 0x1, 0x10011, r0, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f000035e000/0x2000)=nil, 0x2000}, 0x1000}) 21:43:39 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x4a400295f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x2) 21:43:40 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x5, 0xb31f, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x5b, "f0fa8ee5ddfdbebc5b3cf5cf2f7cde3c3af9b98552c26c1b9aef79ee6c3755fda5795fc06306aadea3ba68bec65cd1f25df8e15aaa38332b96408668bece5624d582b817da712d62945d861f0e9c22f1e60237e392bfac8b4601a3"}, &(0x7f0000000180)=0x63) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000280)={r2, 0x4, 0x3e0}, 0x8) request_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='trustedsystem(#cpusetem0\x00', 0xfffffffffffffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)=0x0) sched_setparam(r3, &(0x7f0000000400)=0xffffffff) add_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000700)=""/4096, &(0x7f0000000440)=0x1000) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r4 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000220007031dff39d5fd760500000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) dup(0xffffffffffffffff) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000300)=""/125) getuid() 21:43:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3e5, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x10, 0x3, 0xc) socketpair(0x0, 0x805, 0xfffffffffffffff7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000200)=""/166) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="240000000c0607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:43:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x1f0) fcntl$addseals(r0, 0x409, 0x6) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1, @broadcast}, &(0x7f0000000040)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1, @local, @remote}, 0xc) 21:43:40 executing program 2: r0 = socket$inet(0x2, 0x80006, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000004c0)='bridge_slave_0\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000080)) tkill(r1, 0x1004000000016) [ 189.001746] netlink: 'syz-executor5': attribute type 1 has an invalid length. 21:43:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x800, @empty, 0x1}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e21, 0x2c1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0x2}], 0x48) ioctl$TCFLSH(r0, 0x5401, 0x70e000) [ 189.055370] netlink: 'syz-executor5': attribute type 1 has an invalid length. 21:43:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000000003) 21:43:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x34, "8cc1bb6793003c27e3d009c9cb5eef6202b908960d673de7da4aa850baa85f1012bb91e5088e2730c8e2d94e41915f518f4a5aa4"}, &(0x7f00000000c0)=0x3c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r1, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f00000001c0)=0x84) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4d0]}) 21:43:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000a, &(0x7f00000000c0)=0x7d, 0x4) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000140)=""/248, 0xf8}, &(0x7f0000000080)}, 0x20) setsockopt$inet6_group_source_req(r1, 0x29, 0xe2c2f9163bf517c1, &(0x7f0000000380)={0x4, {{0xa, 0x1ff, 0x9, @remote, 0x1000}}, {{0xa, 0x4e24, 0x9, @empty, 0x8}}}, 0x108) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$FUSE_GETXATTR(r1, &(0x7f00000004c0)={0x18, 0x0, 0x1, {0x8}}, 0x18) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @broadcast}}, 0x1000, 0x5, 0xfff, "b10f859bb145f6e01d20df217f421dcb1c6b476ae54f0ca083ae8826bf05298cea1bedf5b417850eb7c08410865c8757f0b2752df961153f844990d219e8a9fa754638ced2b7d5bbade3c71e6e0c528e"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0xe4, 0x4) ftruncate(r3, 0x7fff) write$UHID_CREATE2(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000e39e5c627ce300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8000900000000000800000008000000060000005fa146e6ccf20199f10396a76a21a3aa06c41c686d4270033c364f5e10bd5f5a1fd51c9ab5f1b6196d7d8da0dba8c3aabfdd274d6a4e3304cc3abe3d94e4ec3bcc459e57ee2d04e05ef3bd4f1a48debe2e0b88b1d35fc75aff8136d940f931c0e52da7786b4e8ead663e5a8fffca31aee838e8344c04853ede36870ee48a2df1bf0807989f46ef345b4cc46b1136b12c6bfc6fdde795514a4f8a98f60c155e6433cfb8e6a9215d126cb4532c890c7342a4350a97d96223ca5ba3a212ff07da1991d982b7b926a51a"], 0x1e0) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000500)={0x591e, 0x6, 0x5, 0x4}, 0x10) sendfile(r2, r2, &(0x7f0000d83ff8), 0x8000fff7fffe) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) 21:43:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) socket$bt_rfcomm(0x1f, 0x1, 0x3) write$binfmt_script(r0, &(0x7f0000001300)=ANY=[@ANYBLOB="2321222e2f317f67166e649fcb91b7d5db9e76295f9822ae336bb2bcf4193b9715537880d796150611696c65300a9c81c707559c2deb8744c81bf35d2d9bec4ed3543742f59d9cd26426529df7c0502d3da91f78c45193e2cf0ce504387f6e132c9f02b74b506c53c7968cfac6717922938c6bd96c1fa6fd7d077720e382d932609dd7ea174ea9023b6aab00000000000000000000000000000000000000"], 0xfdef) clock_getres(0x0, &(0x7f00000000c0)) unshare(0x400) io_setup(0xee1, &(0x7f0000000000)=0x0) io_getevents(r1, 0x2, 0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000040)) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000010000)) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000300)=""/4096) 21:43:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x1, 0x3, 0x0, "a1ea65137002d925fb0cfad20bff0f509d0e5d2056238a61b6e70486d00a3da8"}) 21:43:40 executing program 3: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000100)={0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe9, 0x1, 0x20, "e8a7c4de105b700ac4e7986a5ef38003", "7c1e039f26e8c4f66d655c69c8ee9e4ac577cea1c8c9da935014036a74161e3cf235ba35934475dde1c5ea4e63e52f937c7e3b843c3cda85ea3ac3ad6525d232d2dd76cd4829a9055f0b3564b4f28a860a31aca13d750f74a998ae9a832a062fe671e027926ade8d82543da7ea109e50eed5619b57f3d1659d8c2ac97e4b2ffe6a9d1b6c36e6d2b8ae3b3f5b3ed7890d1f1df5ac60268f96f70ceadb91457072e33543ef9e9f7d6b656346c1ac1453d027f83d8871098eb41d63b465917d95d9a4ac577b7d94369e77eafb898211379021ca4e44"}, 0xe9, 0x1) r1 = open(&(0x7f00000000c0)='.\x00', 0x800000000, 0x0) getdents(r1, &(0x7f0000000200)=""/251, 0xfffffffffffffe57) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000300)="ec77d56c0a4bdac8fb01a040971c57a4fb9599a4ffdb9f88e7103731ab5f9fc3363be9a90365da7e786e9d0bd3db63b3b84026bffc5a5354658eb8aee21225414ffb4ea3f65eb7b2fe13e970cff5c0ee2135664e2b220fd5874e9b310832f2616961b92524b4b5c2ca73e4db2e6f88fb14c8e003d54551ae5660b7e0f99b638487877103098d03a181601b3f42fb2e7f5c6aff5a609418965a3671d2331b14461ae769975d211397039d492261889596b85a87dd1a7aafaaab781eb235f13b9ff7bf803b38bdf59c34a7d53772b1556231ab4dbae67023701888175b169afdcc61bb85a5c9e9f87798ddeea4d97336eedbf5c6abb1854a591be5c0edc5556e59a7adc6503a414c3f0e4e8528b79ae7b340579979171110f73068441143d352a7020b52f9fe1fb1bb239d02ed4a18dc2d6412e4ad54c24202cce3bdd1109f1521f04d2512fbc8a0f1ac54bbbd8f4005e39169432d62246a3f64d173b1cace77f6c8622e980f114fb74ef29d2adf6e714cf1692cebd30cec9df61778691a0ca6100af9530ef4944d5947f6a6a71554e727ef98bd232f7589727e69f56d899186c67668805dbe9363d07c0358cee49fcf6873a3f4ddda02561d2fdd006cecbd2b38a8b86162f7ac543262649fc4cd8e981b9b9d54851ed7195718170e62918b512299e60f91225423788bd701b1724a6e91fadff3e79a7a5a46297a62a785dffff648ddffd266cdb70f0ff62b8a91fb6b9ac3a93c0c1d30dd6c848f12f7e9025f2a2303dba3b028d4b36c0584866fb4752fcc85bfa5518f24122f31bb0f626b0c35c2a15f710b1bde9dc613b9946e705c4a6e13c007bdf3ef2284d47264a1acd9f15b66d64e783cec654104110ace2272728c61062d74ae9936c7852448897f32a788db122f51ae8b650b93224c457dc05f5131b84f6948e9b3e7ffa489b93b9637223e3bb482e727878668d9c5634a7fa8fcdcb7ac7fcd69eb1f18356001d60139ca2cc818918fc4209113b92edc75b8400089bb36a7485aaa921a45985f30121fa20da15e1222789bb83456515dbf0aad8d99406f253aea7daffdaa34cc8791887864775108ae115ee3729dc4301a76b750d0bb194d167862872ea9617bcd9a625944e474c913cc111359c784a93f6490d671bec113d398ec3c83609b206c80d7ea522b888f4907bdf01dd69483985ae82a884c10f75675f98386007fe9dcca03f73464fa490933fd700afd2aff88601a49f4e0ed5f88341dcd851555de20ca747edf5b054d266abdd4ca736f6166ac96ba6c8967f193b05748c96433eb5b9fb1ac7643b41809399607a2bd33cabf1f27a0666b9dd8ec268b59f919a493da41470a2a75c6bdce85b8ddbc4214cf7223f2a2f6179c257e2dba380a7dd33b8286c3395498b0cbf5a2a1a038c25bed475702b75f31d0d39c94f604aea2e0e2e48680150df6ff02890b678107cc8ed49cef042c6d4151535fcb403ce4df89815b521f70b232b2c5a148dac727f376ef14e83600aec9034be36ae52922bb580ffa62fe77e602e016374c24c43d35d3e58ffd7ab7de39c602ea8f303852c55b74838fa2c6295bb3ddae6584efae10927a55768dad3441812b2675b78d8302e62d5eb3831d24989015343ca023520b8509545096fa3d85ac95723899ee8fd9d5db6e9b6e3819de9482cf31776a025dd3a347a50dc46d7d00a7082bbe6a7a075ee0a4b17a8e76b5e4dac55267906a04e7c6054ccda91158e97557054d3d0205cb93021aabcdb526684bb0e3394e5b56c351fbe1d7f4f1a301f8b5a889a145c17c97837e7a40f314b3b7fa241b5fde73052b628c835dcdb975cd6c742b7fb668cd65d5d6ba31f585d3e117805c54f612bbff3a9b53a82be9d9fb1f4bdaf50dc053a702348a44a10cdc25c47f221a807319181aa7ef97b755281b01b5fc216e72025a771776df2e2f4274144873a3d517f576ea3be0728142a8c95611edb3990f8c5f15b8d0d291a80a94f83889105508ab2591ee89f4dbe6ab64ae20782484ed2cf1892c3ae826c514f69c2f29b7c5235d6d3556c5f7842ad6ebf7c9b4fe6b8147af6d4b9d422868c60ada069cc967a406e641befa6e6e63156d0ee31feda6bfe208917acaad0416a50fe014d917b17166324099d418571c18fcfc082c02b38e411ef0ac8e4d37a6bc0a324baf2c5e798c3bb7ab1fe0ac90eca0de867d14788206df6caa96add2947644522452e7c2ca383f88c879b14992aa510fd2b867d2ca4e3d85fdd4a741dcb5cf9dc1ec13b768ad9afe05ecea7572df79babb83d0bd6155fd9f9bbdfd8db758b127683604eefd479e497c44e3218082a13f548457825f9951c809ab92a53308491130d814a610ffa0484cb87e9c95f4eeffdd61abccae18a587906570f7bcfce3b1d2e4b65957d3bbef04e31922ecc7fe85cd677c7c2098e1fcd81def52380884507cb9630ffdfb9c25fbf8d184aa93ed7f92931fcb4dd16599c5dc1f07fe7949aaaf0671f82bc9375828750732b1ac1848790268f0864cd4cdafd1eef7ec9fe82e74732e5f863189c4fe71fbca384dc436f0b52933bc5a30ec31399695906ab2f24616e81960490c2c3a53a806bb0acd499f6254ed8e5e3b5934962ed7b2de5b34482113bd951b4a1e5cf1c64b42d56a77276231d5340031197846dffe292ada9dd51a6244c28cb88922f88ab60384c42552e8ec6dbb621d7504ad3a69f46299229ca97a6a3d5ed3ec1cb2d77c7f2f2895ec26e5d5f9b702d5d390598a78bbb86d22f8e21fe5c7324d77271dc520d7fd98adf453285bb14ad365e312486560db47f9703d937297821cdc4b9e32fa015e953e2f52739b5d1154f6ce8a7a8f3f8b2509a3e9277673635423bab705b363276922d38b5f241d526393119bcd47a749477131c88c4ef4822b93a65619cdd797b1e372deafa6359fd462409963904228cad2ba1cce3aa29beee7a0a7faaafe79961233bda8fb68da86f6e758bfabcbeae223b613c653c09ed42e4ded4befaeda63604ad4a1feb40bf7acaa296c074d07b62753c0aa616fb7dc3959f270ebca08611bea93e44aa2f96220d0ca1f2d47d7e9783aaab7a6fbebe5eeb5f6cc1346716cda037b44b97be4d0c1c4f3b3314ecce981ffde4e8394b608c1bd06cc6af17573f1f3b54375e266cd0b74b5d51ed1fe66ceb1e3506ffafbc717490593ca06a030cb51f39c2cc35f8cc76ff0d23a44138f6e53d562723ca65d0c746a206e7d3e6987b46f973f1cfbf3b993b174029614fa4ed82ce232e00c5747ac338894462d17aeedade9252ff15a4882f98e215128136a4682dcaa435b9bcd33c544f77dc2ba5ef1856aa09f3c60ca06a7a673f3a8289d842ce87132c102fbfe1a096bc41364e48ca79a12288e4da61c44d9ead7dd4fd68faa5bd388780968a87462bacc83f86b51877c04915ce916d0ee83da9ebc4f780303f32d56ce33b6c8d68629fb91764bcc273916e154207c1c8da8aa6f7bb98dedc1115f039941c2880f36889cc6f34bb3d4124eb4ae2f4ea1bc30f6448f4b8e533777cf2d6c89c6962bb85ae2f7514fbb1f9eb28c6fff7451b2f9f664283dd946bb30fbffaf7c3e9feb6f0162d9ffb55328cf1a751179ed66fee3db27ea606169d3545e726a721bd759d14bff2fc2efa10188947db3723b5af498e9708d2687ec812080a74ccda5e7b4f49080e76643bdb91d3abb97516957ae548382a3cb5d4819fcdd04f35f1a820c5a099b5ccafb28e35105c496551397cb62b1b50b8495ad19f68e945421f4fd3512b18289c0c1b53e5191725cda4a020b05a5e39756b28820c11fa07f4389beca99815434ce8335acff5c07ddc51b0e87825113ddb42d5e937af9b4b6826d69687c5785d3dc04628fc0c56bfa46ebecf417839052ed470c5e35810691e7884011a8faffa6aa3621378219c88f8c5991b5590031cc708bf973c5999e725eb56b1ec63f67d00341558b74acdfd0714032521dbece4c5bff93a1ab63d07dd337f43269d5509adc5316ad4837c54075e6d0ad77a34a66fe74d2f171838f44cabb40edbf9f8aa159787b88ade3e033133d96b9ef38a30f55b918202c5ae019a4c6d4771cd1c2eb2b80cddf5818d8f7adf3ccf60ef11e95aba3280b1631121cdd02472060a8deccba7243963e2580ef9da4ee8b5764d996f3064392e894ed0e290e0f460283679ef64837f2c0605c004a4a31643d8c297cd153af1d1d321e0ad9c33618f3466477c240d4f9a5a387025c9fb243535434d4a96bafbd62483e7462ee5f4fafe40788be3fce8963c7deefa8b877c3ec46b64f1eae391464d9e8fc45553017de5592a8173db23289a6eebeee7b4214c935ba215df10266eb78452093f95068dbba84c1970fd3a5f06011ffcc75f42429ad649c292f8b8d7c76a44e060c1189075a9b9bb5b99370a4fef28fb91c6d39e423c8c77aa034ac83ad935c72b32906bb5112a3c5a9e1e73aa26c5a060bc5b75244bc224d9454213dcb824a13854c9e420e20e0844ca4b19f93e5845737f7e009d0360554a6f36316e6724e958459e21cd74b3fd9b1c061cca42b3f7781bd63ca852633fc3e6134d0c554bc1bcd568c6ed8e9f378fa360023e2c8731d718e98c9a851e90d705acb883af7a9f759d5c4f4d5ddf4965fa9004fd5a419be65fa64f4937b5d3b475f8fa90347227866821044407b85d2535a39716cb6ad1854ddb268f23347d576d02d2c3e5c712c58e3bf6c4e089626c080c22c56728c0b80ee67eb6b0d7209a46d0927f6f2f9880d869c1e28540ed24a660da7450531a897c16b8a38260b26af2d580a42705045243a33794bf4cc09d02ba958637e049da40547c4899e6ea2584a8d4b0b204091fb3d2e8ca3de987663429c59020bf831e332c4428c741e54573d16342ed7af3f9725b67f9372907dcf2ea147f619858b2b3e481bbfe6a1f9f2d1ecbcadbdd0054bf8d9358c7151b3c91dba4ca9bd02afe8c3647d8c6e9497a1054c3235fea5756491ef41a8740c5c510698f1082a944de5e52c28cd6bd1fbdaf191943ce3ce27ceabfde85b3172a5733a20f00504916caacac09c6dbd4cd98171776b8f7690714e6dd0f9cd6af688aa6f76d0b341b911de9b3614a023b201d57ee30b6acad57b6bcf9e4bf3f4cbb1d72dd0d005e59ab1ffd073e2d57772bc0c5ecbe690424b86d8aea0c01ce03d48d8e2b7fff9005fcc88390369346d52bd0c3616219e8312fded0ce101484b357e76fe3bee5d0aecb5851f67dcf14007c801f1bf13fd511104436d391ede2729d8e7c7e11427be90ccadd109da485bec30b17bb24fda538c38b431f99a2d63ab4adbda0c8e2807c4dbca034b1ef2afbee607eb5b85cff4d087fb8706739d6cf3e03c52a4df17ba55dd6c459ac077adc8b250b41d7e6356bf19a6c70103740d4583bb3cbd36c07c5b4fe53175820f8e2db007a70ae545c1205fc3363899866135470f82955a3302940100e637784ab77866e275f8b1c85d3813e6a2900cf295ba11aad6cdb8af83893a76d0c331c7502f131066d6d417275d00341015b35d5b4ac61745cf389d3e5aa0638b1793f363b6b419060ef65c6a2cb7af47a55271cb94123dcf626d942a8f92ec54f84d0fba54daec7f2631e05693f93c223e9030ff12522e0f9904192ff9a9c6aef87245e94dd90540d223847803b507e04b55ce1464bd5c5ad316cedff0303efcf582389c050495692517ae6999bf19f890eefc8b252128a4455e90c725b4bac0c992e7bcc14a1e5286d3b7c7f9ed0223c42d32082b97e1f2fb1498e9e2ea57ee", 0x1000}, {&(0x7f0000001400)="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", 0x2e0}, {&(0x7f0000001300)="dea7b91194a812ff66ae914893a6bf0cfd0d881f38dd139442d6682421971c508810249660e21161362172b86c4caa93dd5ab1b24749e22947c3a873cf6c8f299b5131fafb3529f03ccc85aeb5e53e2daf9f8db509647d8af8c9579a7651e6fa153f6bbd464cd1c1732c86f7cd90885cf6c7ae90e9fd4a57169c9df808583e048d32e5a6f1444ecee9e362432faf8f45adcf9d754fced61c409f1f702888ade2f24edb303577405dd98a50c0a41cca26bb673c72ee7c92dd916854747b3ca3df63626f5269d36480339367a105195e70fa617809374b2ccab39b36519bf3d3935dbb4a57320f4056e0109c2973c932356d0cf923", 0xf4}], 0x3) lseek(r1, 0xfffffffffffffffd, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) 21:43:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = shmat(0x0, &(0x7f0000ff4000/0xb000)=nil, 0x1000) shmdt(r2) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) 21:43:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pread64(r1, &(0x7f0000000000)=""/121, 0x79, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x5, 0x72fffd, 0xffffffff7ff0bdbe}) [ 189.326317] ------------[ cut here ]------------ [ 189.338120] usb usb7: BOGUS urb flags, 1 --> 0 [ 189.345510] WARNING: CPU: 0 PID: 7639 at drivers/usb/core/urb.c:503 usb_submit_urb+0x717/0x14e0 [ 189.354373] Kernel panic - not syncing: panic_on_warn set ... [ 189.354373] [ 189.361754] CPU: 0 PID: 7639 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #270 [ 189.369034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.378394] Call Trace: [ 189.380993] dump_stack+0x1c4/0x2b4 [ 189.384630] ? dump_stack_print_info.cold.2+0x52/0x52 [ 189.389846] panic+0x238/0x4e7 [ 189.393043] ? add_taint.cold.5+0x16/0x16 [ 189.397199] ? __warn.cold.8+0x148/0x1ba [ 189.401277] ? usb_submit_urb+0x717/0x14e0 [ 189.405519] __warn.cold.8+0x163/0x1ba [ 189.409411] ? usb_submit_urb+0x717/0x14e0 [ 189.413653] report_bug+0x254/0x2d0 [ 189.417286] do_error_trap+0x1fc/0x4d0 [ 189.421175] ? math_error+0x3f0/0x3f0 [ 189.424983] ? vprintk_default+0x28/0x30 [ 189.429049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.433896] ? trace_hardirqs_on_caller+0x310/0x310 [ 189.438919] ? retint_kernel+0x2d/0x2d [ 189.442260] kobject: 'loop5' (0000000074544c92): kobject_uevent_env [ 189.442819] ? printk+0xa7/0xcf [ 189.449221] kobject: 'loop5' (0000000074544c92): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.452471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.452486] do_invalid_op+0x1b/0x20 [ 189.452499] invalid_op+0x14/0x20 [ 189.452514] RIP: 0010:usb_submit_urb+0x717/0x14e0 [ 189.452528] Code: 83 fc 48 8b 45 d0 48 8d b8 a0 00 00 00 e8 f1 bf 44 ff 45 89 e0 44 89 e9 4c 89 fa 48 89 c6 48 c7 c7 40 71 71 88 e8 49 be 4d fc <0f> 0b e8 52 eb 83 fc 48 c7 c6 40 72 71 88 4c 89 f7 e8 93 ec 83 fc [ 189.452535] RSP: 0018:ffff880188e27268 EFLAGS: 00010286 [ 189.452547] RAX: 0000000000000000 RBX: ffff8801cd1d6800 RCX: ffffc90001e74000 [ 189.452556] RDX: 000000000000ce7e RSI: ffffffff81650405 RDI: 0000000000000005 [ 189.452564] RBP: ffff880188e272d8 R08: ffff880185800380 R09: ffffed003b5c4fe8 [ 189.452570] R10: ffffed003b5c4fe8 R11: ffff8801dae27f47 R12: 0000000000000000 [ 189.452583] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801ce2543c0 [ 189.475229] kobject: 'loop4' (00000000d304f4aa): kobject_uevent_env [ 189.478825] ? vprintk_func+0x85/0x181 [ 189.478842] ? usb_submit_urb+0x717/0x14e0 [ 189.478858] ? kasan_check_write+0x14/0x20 [ 189.497947] kobject: 'loop4' (00000000d304f4aa): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.503101] proc_do_submiturb+0x1b7d/0x4020 [ 189.503118] ? __sched_text_start+0x8/0x8 21:43:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x8000000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}}}, &(0x7f00000003c0)=0xfffffffffffffea6) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.evm\x00') setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e22, 0x0, @remote, 0x4}}}, 0x84) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000540)=""/252) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) accept4$inet(r1, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000004c0)=0x10, 0x800) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'ip6gre0\x00', 0x600}) ioctl$TCSBRK(r0, 0x5409, 0x7) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000280)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'team_slave_0\x00\x00\x00`'}) 21:43:40 executing program 5: r0 = socket(0x40000000015, 0x5, 0x8000) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@empty, @dev={0xac, 0x14, 0x14, 0x20}, @multicast1}, 0xc) [ 189.503140] ? __might_fault+0xd1/0x1e0 [ 189.579967] ? free_async+0x540/0x540 [ 189.583758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.589289] ? _copy_from_user+0xdf/0x150 [ 189.593430] proc_submiturb_compat+0x544/0x800 [ 189.597996] ? proc_do_submiturb+0x4020/0x4020 [ 189.602568] usbdev_do_ioctl+0x19a2/0x3b50 [ 189.606803] ? processcompl_compat+0x680/0x680 [ 189.611383] ? kasan_check_read+0x11/0x20 [ 189.615531] ? do_raw_spin_unlock+0xa7/0x2f0 [ 189.619929] ? mark_held_locks+0x130/0x130 21:43:40 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000000)={@random="5c58e606e122", @broadcast, [], {@generic={0x8864, "42a703000000"}}}, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8001, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x40) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) ptrace$getenv(0x4201, r3, 0xbc90, &(0x7f00000000c0)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000200)=0x9) [ 189.624179] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 189.629301] ? futex_wake+0x304/0x760 [ 189.633116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.637971] ? trace_hardirqs_off+0x310/0x310 [ 189.642477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.647245] ? mark_held_locks+0x130/0x130 [ 189.651488] ? lock_downgrade+0x900/0x900 [ 189.655643] ? do_futex+0x249/0x26d0 [ 189.659364] ? kasan_check_read+0x11/0x20 [ 189.663525] ? do_raw_spin_unlock+0xa7/0x2f0 [ 189.667947] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 189.672539] ? add_mm_counter_fast+0xd0/0xd0 21:43:40 executing program 5: r0 = socket(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000000), &(0x7f00000003c0)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) [ 189.677454] ? __fget+0x4aa/0x740 [ 189.680906] ? lock_downgrade+0x900/0x900 [ 189.685059] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 189.685411] kobject: 'loop5' (0000000074544c92): kobject_uevent_env [ 189.690865] ? __fget+0x4d1/0x740 [ 189.700694] ? ksys_dup3+0x680/0x680 [ 189.703346] kobject: 'loop5' (0000000074544c92): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.704409] ? __might_fault+0x12b/0x1e0 [ 189.704427] ? lock_downgrade+0x900/0x900 [ 189.704446] usbdev_ioctl+0x25/0x30 21:43:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f00000002c0)=0x6, 0x1ff, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x50, &(0x7f0000000080)=""/24, &(0x7f0000000000)=0x18) [ 189.725689] ? usbdev_compat_ioctl+0x30/0x30 [ 189.730113] do_vfs_ioctl+0x1de/0x1720 [ 189.734021] ? ioctl_preallocate+0x300/0x300 [ 189.738437] ? __fget_light+0x2e9/0x430 [ 189.742415] ? fget_raw+0x20/0x20 [ 189.745872] ? _copy_to_user+0xc8/0x110 [ 189.749851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.755397] ? put_timespec64+0x10f/0x1b0 [ 189.759538] ? nsecs_to_jiffies+0x30/0x30 [ 189.764560] ? security_file_ioctl+0x94/0xc0 [ 189.768966] ksys_ioctl+0xa9/0xd0 [ 189.772415] __x64_sys_ioctl+0x73/0xb0 [ 189.776298] do_syscall_64+0x1b9/0x820 [ 189.780176] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 189.785530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 189.790445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.795281] ? trace_hardirqs_on_caller+0x310/0x310 [ 189.800289] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 189.805295] ? prepare_exit_to_usermode+0x291/0x3b0 [ 189.810315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.815152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.820329] RIP: 0033:0x457579 [ 189.823515] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.842402] RSP: 002b:00007f7dfd189c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.850099] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 189.857367] RDX: 0000000020000080 RSI: 00000000802c550a RDI: 0000000000000003 [ 189.864634] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 189.871901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7dfd18a6d4 [ 189.879159] R13: 00000000004bf6c0 R14: 00000000004cf598 R15: 00000000ffffffff [ 189.887565] Kernel Offset: disabled [ 189.891194] Rebooting in 86400 seconds..