[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.492993] audit: type=1800 audit(1544674701.547:25): pid=5995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 35.512009] audit: type=1800 audit(1544674701.547:26): pid=5995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 35.531296] audit: type=1800 audit(1544674701.557:27): pid=5995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.136' (ECDSA) to the list of known hosts. 2018/12/13 04:18:33 fuzzer started 2018/12/13 04:18:37 dialing manager at 10.128.0.26:35631 2018/12/13 04:18:37 syscalls: 1 2018/12/13 04:18:37 code coverage: enabled 2018/12/13 04:18:37 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/13 04:18:37 setuid sandbox: enabled 2018/12/13 04:18:37 namespace sandbox: enabled 2018/12/13 04:18:37 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/13 04:18:37 fault injection: enabled 2018/12/13 04:18:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/13 04:18:37 net packet injection: enabled 2018/12/13 04:18:37 net device setup: enabled 04:20:37 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) syzkaller login: [ 171.582454] IPVS: ftp: loaded support on port[0] = 21 [ 172.679326] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.686050] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.694144] device bridge_slave_0 entered promiscuous mode [ 172.773094] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.779771] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.787987] device bridge_slave_1 entered promiscuous mode [ 172.858570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.927430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.135794] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.208479] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.540514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.548662] team0: Port device team_slave_0 added [ 173.615107] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.623189] team0: Port device team_slave_1 added [ 173.686971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.757148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.826360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.833966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.842968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.913056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.920600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.929485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:20:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 174.423303] ip (6247) used greatest stack depth: 54120 bytes left [ 174.814481] IPVS: ftp: loaded support on port[0] = 21 [ 174.891306] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.897848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.904902] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.911379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.920093] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 175.361966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.551856] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.558453] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.566324] device bridge_slave_0 entered promiscuous mode [ 176.708184] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.714737] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.722755] device bridge_slave_1 entered promiscuous mode [ 176.738104] ip (6325) used greatest stack depth: 53696 bytes left [ 176.870401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.987738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.269652] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.340732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.455239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 177.462285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.615144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.622317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.993261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.001302] team0: Port device team_slave_0 added [ 178.075040] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.083224] team0: Port device team_slave_1 added [ 178.149639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.279354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.429386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.437734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.446486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:20:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000140)) [ 178.557187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.564915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.573575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.023524] IPVS: ftp: loaded support on port[0] = 21 [ 180.043042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.115753] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.122292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.129228] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.135798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.144160] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.150600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.634868] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.096885] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 181.103281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.110919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.496719] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.503406] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.511077] device bridge_slave_0 entered promiscuous mode [ 181.585481] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.592213] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.600030] device bridge_slave_1 entered promiscuous mode [ 181.682401] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.756391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.832646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.227860] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.338905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.423451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.430642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.536368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.543501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.008424] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.016660] team0: Port device team_slave_0 added [ 183.176836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.185113] team0: Port device team_slave_1 added [ 183.340903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.348413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.356902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.458753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.465972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.474646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.635657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.643405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.652103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.786343] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.794232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.803188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:20:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b5, 0x400000000074) [ 185.171285] 8021q: adding VLAN 0 to HW filter on device bond0 04:20:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:20:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getpgrp(0x0) [ 185.311229] kauditd_printk_skb: 3 callbacks suppressed [ 185.311254] audit: type=1326 audit(1544674851.357:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6701 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 185.515872] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.522485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.529423] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.535948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.544203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.550771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.830586] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.966693] IPVS: ftp: loaded support on port[0] = 21 [ 186.106010] audit: type=1326 audit(1544674852.157:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6701 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:20:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 186.353967] audit: type=1326 audit(1544674852.407:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6739 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 186.446351] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 186.452822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.460390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.999861] 8021q: adding VLAN 0 to HW filter on device team0 04:20:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x10801, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x100020) 04:20:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020b0800001000000063240000000000bb3dc9c035603ef5a50245113f344573be55cb55946d8a135cd6b31b016f83b0c53f3ef1b2a0ca124d2d24772b4b"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x8}]}, 0x18}}, 0x0) 04:20:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_DUMPABLE(0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa8b01359b1dfc86dd60d8652b00002c00fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5079f2009078424dd0284ac11ccd7e41531914264617504d484f659bb1ff358a18e36275d00000"], 0x0) 04:20:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "d7bef22dfdbfffc0bba17ca44ceb8cb92284504a"}, 0x15, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x4, 0x8, 0x3, 0xffffffff, 0x24, r1, 0x1}, 0xfffffffffffffd33) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000000), 0x0}, 0x20) 04:20:54 executing program 0: socket(0x2, 0x2000000085, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000fff)={0x10000, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={r1, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000040)={r0, 0x68e}) 04:20:54 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000030000000000000005000600000000000a000000000000000000000000000000000000020000000000000000000000000200010001000000000000020000ffff04000500000000000a000000006a2301f229cf81007fc90eaff52ab97710aa000000ff1700000000"], 0x70}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x104, r2, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xe9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff00}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x375}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x21}}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x104}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) [ 188.671554] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.678165] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.686219] device bridge_slave_0 entered promiscuous mode [ 188.800701] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.807271] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.815177] device bridge_slave_1 entered promiscuous mode [ 188.923898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.055400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.397671] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 189.502228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.209691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.218030] team0: Port device team_slave_0 added [ 190.378266] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.386488] team0: Port device team_slave_1 added [ 190.419855] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 190.552296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:20:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 190.712321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.885673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.893744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.902390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.021169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 191.029444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.038088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.377346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.744445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.161825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.168192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.175765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.456411] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.462972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.469891] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.476512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.484820] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 192.553380] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.212487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.449178] audit: type=1326 audit(1544674861.497:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7132 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 196.169078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.244265] audit: type=1326 audit(1544674862.297:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7132 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:02 executing program 2: 04:21:02 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)}, 0x10) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000140)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232aeb414ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)="290400"}, 0x30) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)) 04:21:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x8000, 0x3, 0x8001}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x9, @mcast2, 0x3ff}, @in={0x2, 0x4e22, @loopback}], 0x2c) [ 196.420582] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.628907] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.635341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.643008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.781340] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.607502] audit: type=1326 audit(1544674863.657:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7247 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 198.402762] audit: type=1326 audit(1544674864.457:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7247 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:04 executing program 3: 04:21:04 executing program 4: r0 = msgget(0x0, 0x18) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/115) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x80000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000000c0)) sysfs$3(0x3) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/29) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001180)={r1, 0x0, 0x1000, 0x40, &(0x7f0000000140)="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", &(0x7f0000001140)=""/64, 0x2}, 0x28) r2 = getpgrp(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f00000011c0)={0x1, r2}) unlink(&(0x7f0000001200)='./file0\x00') acct(&(0x7f0000001240)='./file1\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000012c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000014c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001480)={&(0x7f0000001300)={0x17c, r3, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x20}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x874}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x85a4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000000) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000001500)=0x4) fstat(r1, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001680)={0x0, 0x0, 0x0}, &(0x7f00000016c0)=0xc) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)=0x0) stat(&(0x7f00000017c0)='./file1\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001880), &(0x7f00000018c0)=0x0, &(0x7f0000001900)) r11 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000001540)='system.posix_acl_access\x00', &(0x7f0000001940)={{}, {0x1, 0x1}, [{0x2, 0x6, r4}], {0x4, 0x4}, [{0x8, 0x4, r5}, {0x8, 0x7, r7}, {0x8, 0x4, r8}, {0x8, 0x2, r9}, {0x8, 0x1, r10}, {0x8, 0x2, r11}], {0x10, 0x4}, {0x20, 0x3}}, 0x5c, 0x1) write$P9_RLINK(r1, &(0x7f00000019c0)={0x7, 0x47, 0x2}, 0x7) write$P9_RSETATTR(r1, &(0x7f0000001a00)={0x7, 0x1b, 0x1}, 0x7) sched_getparam(r6, &(0x7f0000001a40)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000001a80)={0x1}) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000001ac0)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000001b00)=0xfffffffffffffbff) getresgid(&(0x7f0000001b40), &(0x7f0000001b80), &(0x7f0000001bc0)) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001c80)={0xa, &(0x7f0000001c00)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000001cc0)={r12, 0x1}) 04:21:04 executing program 2: 04:21:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x80) getsockname$tipc(r0, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x4, 0x100000001, 0x0, 0x1000}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @speck128}) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {0x9, 0xffffffffffffffff, 0x101, 0x4}, 0x24, [0x80, 0x80, 0x3, 0x100, 0x7fffffff, 0x2, 0x80000001, 0x5, 0xffffffff00000000, 0xff, 0x100000001, 0x6, 0x6, 0x80000000, 0xffff, 0x3, 0x4, 0xfffffffffffffff8, 0x6, 0x1ffd68c2, 0xfffffffffffffffd, 0x8, 0xde0a, 0x7, 0x9, 0x5, 0xb8, 0x1f, 0xffff, 0x9, 0x3, 0x7, 0x9, 0xff, 0xd0, 0x2, 0x401, 0x7195, 0x10001, 0x0, 0x6, 0x3ff, 0x9, 0x1, 0x3, 0xd03, 0x56d5, 0x6, 0xb0, 0x80000001, 0x1, 0x9cd, 0x400, 0x0, 0x3, 0xffffffff, 0x2, 0x2, 0x2, 0x4, 0x2, 0x3, 0x927e, 0x7], [0x1, 0x1, 0x7, 0x3, 0x4, 0x9, 0x200, 0x30, 0x1, 0x2, 0x9, 0xabb0, 0x1, 0x200, 0x1, 0x8d2, 0x3, 0x7, 0x0, 0x418, 0xb37e, 0x100000000, 0xffffffff, 0x80000000, 0x7fffffff, 0x8, 0x6, 0x80000000, 0x5, 0x100000000, 0x6, 0x0, 0x3, 0xffffffffffffffc0, 0x8, 0xfffffffffffffffa, 0xa2, 0x1ff, 0x4, 0xfffffffffffffffa, 0x0, 0x1f, 0x1ff, 0xcbb1, 0x40, 0x6, 0x1, 0x731, 0x80000001, 0xcc42, 0x0, 0x7471, 0x4, 0x5, 0x9, 0x8, 0x100, 0x80, 0x1, 0xde, 0x9, 0x9, 0x6, 0x7f], [0x9, 0x4, 0x8000, 0xfffffffffffffff8, 0x7f, 0x1ff, 0x80000001, 0x3, 0x2, 0x80000000, 0x5, 0x3, 0x3, 0xffffffff00000001, 0x11592c21, 0x10000, 0x5, 0x6, 0xf4, 0x10, 0x8, 0x5, 0x4, 0x0, 0xe36, 0x0, 0xfa7, 0x5, 0x8, 0x3, 0x3, 0x80000001, 0x3, 0xff, 0x8, 0x3, 0x1, 0x9, 0xffffffff00000000, 0x7, 0x80000001, 0x3, 0x47, 0x1f, 0x3, 0x917, 0x1, 0x4, 0x400, 0x3, 0x1, 0x575, 0xcdd, 0x8, 0xdf, 0x6, 0x5, 0x3, 0x80000001, 0x9, 0x8001, 0x1, 0x8c, 0x20], [0x8, 0x3, 0x356ce1a9, 0x10000000, 0xcac, 0xff, 0x7, 0x80000000, 0x80, 0x6eb4, 0x9, 0x0, 0x5b4, 0x44c4, 0x2, 0x4, 0x1, 0x7d, 0x5, 0xfffffffffffff001, 0x7f, 0x3, 0x7fff, 0x20, 0x100000000, 0x875, 0x1, 0x4, 0x4, 0x7e6, 0x6, 0x401, 0x9003, 0x6, 0x100000000000, 0x6, 0x2, 0x167e3dc7, 0x377, 0x9a, 0x8001, 0x400, 0x100000000, 0x0, 0x7, 0x0, 0x4, 0x100000001, 0x9, 0xffffffffffffff2e, 0x81, 0x1, 0x100000000, 0x0, 0xe3ee, 0xe40a, 0xffffffffffffff6a, 0xa3, 0x5, 0x6, 0x1, 0x6, 0x1, 0x2]}, 0x45c) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f00000005c0)) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000600)=0x7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000680)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000700)={0x1, 0x10, 0xfa00, {&(0x7f0000000640), r1}}, 0x18) write$FUSE_OPEN(r0, &(0x7f0000000740)={0x20, 0x0, 0x7, {0x0, 0x3}}, 0x20) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000780)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) mount$fuse(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuse\x00', 0x2080, &(0x7f0000000980)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize'}}], [{@dont_measure='dont_measure'}]}}) socket$inet6(0xa, 0x5, 0x3) accept4$packet(r0, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14, 0x800) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@remote, @in6=@remote, 0x4e21, 0x9, 0x4e22, 0x0, 0xa, 0xa0, 0x80, 0x1d, r5, r3}, {0xffb, 0x3, 0x7fff, 0x9, 0x9, 0x6b, 0x6, 0x6}, {0x5, 0x0, 0x6, 0x2}, 0x0, 0x6e6bbd, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0xfff, 0x4d3, 0x32}, 0x2, @in6=@mcast1, 0x3502, 0x7, 0x3, 0x834, 0xaa16, 0x3, 0x40}}, 0xe8) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000c00)=0x400, 0x4) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000c80)={&(0x7f0000000c40)=""/8, 0x1108000, 0x1000, 0x2}, 0x18) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/dlm_plock\x00', 0x82000, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000d00)='/dev/vcs#\x00', 0x1f, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000d40)={0x9, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000dc0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000d80), 0x106, 0x9}}, 0x20) r8 = syz_open_procfs(r2, &(0x7f0000000e00)='net/udp6\x00') setsockopt$XDP_RX_RING(r8, 0x11b, 0x2, &(0x7f0000000e40)=0x112000, 0x4) sendmsg$unix(r6, &(0x7f0000001440)={&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000f00)="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", 0xfb}, {&(0x7f0000001000)="0477e93d8ff9bf299b5c88dc7939b19705ea0d8c244141ed471c750b020636ced6ef12dda8c4bc4a688aa5661708b238c3fd71381334e7422f9b2fcbd0defe73aacef0e2c1bb435a274aaea3878fd7a79269ea12f02a4ca766d8d5b1fb7ae8c8c657eecb88a5b189f8bb25bf358b8f77adce04a95b8bb9351fb0776fd5f3f51b6bdc0f155cb15c2cf4853f885f9fa8ff1a80f175661a2dac39bdf29e2686e4b3842e3a13bb44531ca79dbd255d92fae44561a29a0594086971f1e280a4d2e3a2460f5db30a7a1c01a52399470a33c3b63c1a9ba094d3b7c0a7193c6b8402bde91bdcf15ce6fd173085211f6ebcdc", 0xee}, {&(0x7f0000001100)="c9bcbfa1ef7b28684e5783e7dc6e43e288c36c800234c96962c33d7327a4b864f82ef8f6c162db671aa80a8bb901fc1aaa50413503615434225e18faa0947d650baeb6a9b9c78eda94461c1544801261170b5a7c4fedd776e8931e18a11bb2797c2fba956a687c74a4ff740f79b88fa3a1d4df6cef887094ee5aae020622eca9e15cb1ff78ecfcdbd2ae67eeede782293fec1b0bff8371cbb777428b14193191f97fe948d7e311baa39998f73395c1ef3e46aacb7d7ab6ab9ea4dd966b4c90", 0xbf}, {&(0x7f00000011c0)="eb3f4530f96ff04dfbb0431dd74fffb9523e6bd9e81c1390df84fb2d938dbcad3f92196791556b84089e7f0d9ad591732b6f57de1664ab6cb258d035fa838d1f568bffe6c6a427b99b99bc1aa351b11ac81780ed1f381b61c2d9f1c335e548184b536d27b6d63d835ff99f533fdbcb26dad59af333753b974e2aa5f0fc56670442d5efb75463e00c8809d3ea6edaba35026125c22b3b66d27e9c073af70e4f0d9fb8133990c63186fb91dd901f2962b9bfb4559404d8fd8078aec010bd7ab02ef820addccf8d09fa5db439d4f8dcbbbe0576bbc255878039c670a126ab7f9a78ff4ff341b30dfa8348208987c3", 0xed}, {&(0x7f00000012c0)="40a48c310b5c69462027cedb272ada5036d51725e18f804f9f587f3312e843c87591f1cf29b595b0828740bacaa653a915def8a1f899948366d37a17996f9cd10af1ef455b1795f3e4a7477e271bc607d9469c0417d3564992383d84b929bea0db9ade1c8e63624d162d94a05f05f34c1f5c1fe95f111a9c0695bd940a4542fc23c56f6fcdd970858e92bd558f59776bbaad8d5b9a4db1a71c50e88e0cd847c4eb40ec1f3d76834fc8652a5ba9389779d6f1dc4d2b7993e9ba5b0a4a1c80d1bc8ea1ecdda3f2896ff9233696f418585bb0811730fb1e81070c32b0", 0xdb}], 0x5, 0x0, 0x0, 0x20048000}, 0x80) setpgid(r2, r2) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000001480)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f00000014c0), &(0x7f0000001500)=0x14) ioctl$KVM_SET_FPU(r7, 0x41a0ae8d, &(0x7f0000001540)={[], 0x1, 0x40, 0x8, 0x0, 0xe917, 0x1d000, 0x0, [], 0x5}) 04:21:04 executing program 0: 04:21:04 executing program 1: 04:21:04 executing program 1: 04:21:04 executing program 0: 04:21:04 executing program 3: 04:21:04 executing program 2: 04:21:04 executing program 1: 04:21:04 executing program 3: 04:21:04 executing program 2: [ 199.146866] IPVS: ftp: loaded support on port[0] = 21 [ 199.170984] IPVS: ftp: loaded support on port[0] = 21 [ 200.246674] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.253304] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.261145] device bridge_slave_0 entered promiscuous mode [ 200.274026] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.280598] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.288444] device bridge_slave_0 entered promiscuous mode [ 200.326373] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.332885] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.340776] device bridge_slave_1 entered promiscuous mode [ 200.353265] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.359728] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.367586] device bridge_slave_1 entered promiscuous mode [ 200.403727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.433299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.468144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.498687] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.664039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.697634] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.733205] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.769121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.053088] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.061317] team0: Port device team_slave_0 added [ 201.078305] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.086333] team0: Port device team_slave_0 added [ 201.123910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.132572] team0: Port device team_slave_1 added [ 201.149909] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.157761] team0: Port device team_slave_1 added [ 201.209156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.217621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.226350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.245542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.286716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.314373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.355282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.362845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.371586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.387097] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.394755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.403683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.449803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.457448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.466214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.481750] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.489166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.497930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.203912] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.210438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.217396] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.224017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.231835] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.300930] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.307470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.314437] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.320890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.329522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.972347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.980070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.825748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.907378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.059235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.138440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.300438] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.306995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.315043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.395901] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.402361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.410096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.563033] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.658147] 8021q: adding VLAN 0 to HW filter on device team0 04:21:13 executing program 4: 04:21:13 executing program 0: 04:21:13 executing program 5: 04:21:13 executing program 1: 04:21:13 executing program 2: 04:21:13 executing program 3: 04:21:13 executing program 0: 04:21:13 executing program 4: 04:21:13 executing program 1: 04:21:13 executing program 0: 04:21:13 executing program 5: 04:21:13 executing program 3: 04:21:13 executing program 2: 04:21:13 executing program 4: 04:21:13 executing program 1: 04:21:13 executing program 0: 04:21:13 executing program 5: 04:21:13 executing program 3: 04:21:13 executing program 1: 04:21:13 executing program 2: 04:21:13 executing program 1: 04:21:13 executing program 5: 04:21:14 executing program 0: 04:21:14 executing program 4: 04:21:14 executing program 3: 04:21:14 executing program 5: 04:21:14 executing program 1: 04:21:14 executing program 2: 04:21:14 executing program 0: 04:21:14 executing program 1: 04:21:14 executing program 4: 04:21:14 executing program 3: 04:21:14 executing program 2: 04:21:14 executing program 5: 04:21:14 executing program 0: 04:21:14 executing program 3: 04:21:14 executing program 2: 04:21:14 executing program 4: 04:21:14 executing program 1: 04:21:14 executing program 5: 04:21:14 executing program 0: 04:21:14 executing program 2: 04:21:14 executing program 4: 04:21:14 executing program 3: 04:21:14 executing program 5: 04:21:14 executing program 1: 04:21:14 executing program 0: 04:21:14 executing program 4: 04:21:14 executing program 2: 04:21:15 executing program 5: 04:21:15 executing program 3: 04:21:15 executing program 1: 04:21:15 executing program 0: 04:21:15 executing program 4: 04:21:15 executing program 2: 04:21:15 executing program 5: 04:21:15 executing program 3: 04:21:15 executing program 1: 04:21:15 executing program 0: 04:21:15 executing program 4: 04:21:15 executing program 2: 04:21:15 executing program 5: 04:21:15 executing program 3: 04:21:15 executing program 4: 04:21:15 executing program 1: 04:21:15 executing program 2: 04:21:15 executing program 0: 04:21:15 executing program 5: 04:21:15 executing program 3: 04:21:15 executing program 1: 04:21:15 executing program 4: 04:21:15 executing program 2: 04:21:15 executing program 0: 04:21:15 executing program 4: 04:21:15 executing program 5: 04:21:15 executing program 3: 04:21:16 executing program 1: 04:21:16 executing program 2: 04:21:16 executing program 5: 04:21:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) 04:21:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000001740)=""/155, 0x9b}, {0x0}, {&(0x7f0000000300)=""/102, 0x66}], 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 04:21:16 executing program 1: socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x5, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x2b) 04:21:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) [ 210.229596] audit: type=1326 audit(1544674876.277:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7956 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:16 executing program 5: 04:21:16 executing program 2: [ 210.328054] audit: type=1326 audit(1544674876.377:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7968 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:16 executing program 1: r0 = inotify_init1(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace(0x4207, r2) prctl$PR_SET_UNALIGN(0x6, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080), 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r4, &(0x7f0000000800)="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", 0x1000) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast2, @loopback}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) sendfile(r4, r5, 0x0, 0x10000) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x2020040c2, 0x10) r7 = dup2(r5, r4) setsockopt$inet_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f0000000580), 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000340)=@req3={0x1000, 0x4, 0x80000000, 0x9b93, 0x7fffffff, 0x1, 0x80000000}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') r8 = inotify_add_watch(r6, &(0x7f0000000600)='./file0\x00', 0x1) inotify_rm_watch(r0, r8) getpeername(r6, &(0x7f0000000000)=@sco, &(0x7f0000000200)=0x80) sendfile(r3, 0xffffffffffffffff, 0x0, 0x10000) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000300)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000640)={0xfffffffffffffff9, 0x9, 0x9, 0x0, 0x3}) 04:21:16 executing program 0: r0 = socket$inet6(0xa, 0x2000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x77, &(0x7f0000000100), 0xc) close(r2) close(r1) 04:21:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) wait4(0x0, 0x0, 0x0, 0x0) 04:21:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x5, 0x7fffffff, 0x0, 0x101, 0x0, 0x4}}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000002680)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001580)={'vcan0\x00'}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 04:21:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}}, 0x0) [ 210.602554] audit: type=1326 audit(1544674876.647:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7988 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:16 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_open_dev$amidi(0x0, 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0xa, 0xa, 0xffffffffffffffff}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) [ 210.739913] hrtimer: interrupt took 62966 ns [ 210.973335] audit: type=1326 audit(1544674877.027:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7956 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) clock_getres(0x0, 0x0) 04:21:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:21:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) [ 211.073894] audit: type=1326 audit(1544674877.127:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8007 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 211.151314] audit: type=1326 audit(1544674877.157:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8010 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 211.173323] audit: type=1326 audit(1544674877.167:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7968 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 04:21:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) sysinfo(&(0x7f0000000000)=""/52) [ 211.442598] audit: type=1326 audit(1544674877.447:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7988 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 211.464516] audit: type=1326 audit(1544674877.457:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8021 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 211.486179] audit: type=1326 audit(1544674877.487:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8022 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:17 executing program 5: r0 = socket$packet(0x11, 0x4000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000880)="02030000070000005b000000fff55b42e1938207d9fb3780398d5375000060207929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2d1594c3b50035110f118d0000f55dc62600009b000000faffffff00010000aeb46245004bfedd042b5408a2ba049ef912", 0x6c, 0x0, 0x0, 0x0) 04:21:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 04:21:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:21:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fstat(r0, &(0x7f00000000c0)) 04:21:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x40, 0x0) dup(r0) 04:21:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000001040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000440)='7', 0x1, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:21:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000080)="ae", 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x788) 04:21:18 executing program 0: [ 212.130184] encrypted_key: insufficient parameters specified [ 212.138964] encrypted_key: keyword 'new' not allowed when called from .update method 04:21:18 executing program 1: 04:21:18 executing program 0: 04:21:18 executing program 4: 04:21:18 executing program 0: 04:21:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x6}}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000002680)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 04:21:18 executing program 2: 04:21:18 executing program 5: 04:21:18 executing program 4: 04:21:19 executing program 3: 04:21:19 executing program 0: 04:21:19 executing program 2: 04:21:19 executing program 4: 04:21:19 executing program 5: 04:21:19 executing program 0: 04:21:19 executing program 2: 04:21:19 executing program 4: 04:21:19 executing program 3: 04:21:19 executing program 5: 04:21:19 executing program 2: 04:21:19 executing program 0: 04:21:19 executing program 1: 04:21:19 executing program 4: 04:21:19 executing program 3: 04:21:19 executing program 5: 04:21:19 executing program 2: 04:21:19 executing program 4: 04:21:19 executing program 0: 04:21:19 executing program 1: 04:21:19 executing program 5: 04:21:19 executing program 3: r0 = memfd_create(&(0x7f0000000200)="00badbe97a362fb548c573e48bef4be85037a38d5c69f261fc2c73e6e9b29d8f6ead541331ab3eff5d4c9b9166a0e236207aeab2d25186396506eb2db11cd1d390a9de02bfbf3fe8e05b39de6fd66188f247ed28f600b060b77f0e0b26ca09bdcbd400363c71a8763c001a1e28b7adcd7f06f412e6396f6869eb2ae9e9fdc2ebfd9f943f0a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46"], 0x4) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 04:21:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:21:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) shmdt(r0) 04:21:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) symlink(&(0x7f0000000580)='./file0\x00', &(0x7f0000000500)='./file0\x00') 04:21:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) setrlimit(0x0, &(0x7f0000000580)) 04:21:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) 04:21:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000340)={@void, @val, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local, @empty, @remote, @mcast1}}, 0x3e) [ 214.193451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.200173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.236979] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:21:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 214.333446] syz-executor3 (8162) used greatest stack depth: 53656 bytes left 04:21:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0xc0010004, [0x2ff, 0x0, 0x1b]}) 04:21:20 executing program 0: io_setup(0x80400000000002, &(0x7f0000000040)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000600)="3a2b6c6f23d83da56a500060766fdc2e0738dd41c97e2706edd617350ead2c958b41fa2ee1c7b4b2218216a1c508f7f35f9d795cb6e36202dc87ae64a8d02058d8ff1909655030e13f3607baa7dd209444fed0167fc2ce93f869cc06018d536ac6fb7b9c41b81978c41617d43891d8d9f75636407b5ff3dc8e68bd4cf3240f34aa61a1465b9eaca83682031d95578ff943a98373d013bc444906f68e94d02319f6355921c17d81f03e40bfa3423a09373155a85784dc2687cbbaa1a6a30c26a787030000001ebde9c04ab3e61d2368ada98c6524caf1705e97f11740c17307e6f8ffffffffffffff6c950887303a0bf1aaa3e95bb5ba25799d8eee1387e02164da2607ff4734626f83c47e6f2cb5c0fd6b38245ff96cf0fa1becf7dde2e3c2c80550b1aeea0d5cc410fe306098d312be059f461d0f98e906585ab5ffffff7fc36d2f0fe958a43c2586ecd6f769e3406b904afde12e0600000000000000eb59591f887a599c7a000000000000004243547c58f036f59c5284924755bf05d876bd5c38cae0c1a7fcdb7b70ce1a4c3725482243948cc6fcfcd3a9a2873297459d5972516753dd13156325fab8219574fd113739b55f5aef0badd83f54120e7c98e3e39be9707566b1d5e530bc44d999548ded246513d3dc5de750ebe3be9c6d7a9a02bd01cb40cfff4163e394d490a0e1ea168664b2f2d59dfd2e1c203e120f96f9d079b141b436ff6c20b84dd11c184c443f0addf5f63ade432164d8be331cf29017151cdd468163a21cbdb6dddacb605086174c3df4bbf30a5bf1fd85b1ff7abc1e0081cd2f6eae137bfeba527ae7f30954b08f0a1700000000000000000000000000", 0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r2 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 04:21:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:21:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 04:21:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) rt_sigsuspend(0x0, 0x0) [ 215.103896] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 215.110750] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:21:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) 04:21:21 executing program 0: io_setup(0x80400000000002, &(0x7f0000000040)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f00000000c0)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000600)="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", 0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r2 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 04:21:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mlockall(0x2) 04:21:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getrusage(0x0, 0x0) [ 215.269593] kauditd_printk_skb: 24 callbacks suppressed [ 215.269617] audit: type=1326 audit(1544674881.317:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8196 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 215.388233] audit: type=1326 audit(1544674881.437:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8206 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 215.410645] audit: type=1326 audit(1544674881.467:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8208 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) [ 215.412205] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 215.439250] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 215.446635] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 215.472028] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 215.511967] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 215.535189] audit: type=1326 audit(1544674881.587:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8213 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 215.892659] audit: type=1326 audit(1544674881.947:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8188 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 215.989586] audit: type=1326 audit(1544674882.037:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8218 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) truncate(0x0, 0x0) [ 216.023354] audit: type=1326 audit(1544674882.077:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8192 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 216.032885] ptrace attach of "/root/syz-executor2"[6404] was attempted by "/root/syz-executor2"[8220] [ 216.056038] audit: type=1326 audit(1544674882.107:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8196 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:22 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x1) getdents(r1, &(0x7f0000000100)=""/119, 0x77) 04:21:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mq_notify(0xffffffffffffffff, 0x0) [ 216.183181] audit: type=1326 audit(1544674882.227:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8226 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 216.204929] audit: type=1326 audit(1544674882.237:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8206 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) fchdir(0xffffffffffffffff) 04:21:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) llistxattr(0x0, 0x0, 0x0) 04:21:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) chmod(0x0, 0x0) 04:21:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f00000001c0)=""/146) [ 216.834903] ptrace attach of "/root/syz-executor2"[6404] was attempted by "/root/syz-executor2"[8251] 04:21:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) fchmodat(0xffffffffffffffff, 0x0, 0x0) 04:21:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) 04:21:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) readv(0xffffffffffffffff, 0x0, 0x0) 04:21:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) umount2(0x0, 0x0) 04:21:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mq_open(0x0, 0x0, 0x0, 0x0) 04:21:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:21:23 executing program 2: r0 = memfd_create(&(0x7f0000000200)="00badbe97a362fb548c573e48bef4be85037a38d5c69f261fc2c73e6e9b29d8f6ead541331ab3eff5d4c9b9166a0e236207aeab2d25186396506eb2db11cd1d390a9de02bfbf3fe8e05b39de6fd66188f247ed28f600b060b77f0e0b26ca09bdcbd400363c71a8763c001a1e28b7adcd7f06f412e6396f6869eb2ae9e9fdc2ebfd9f943f0a", 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46"], 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 04:21:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getgid() 04:21:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) chown(0x0, 0x0, 0x0) 04:21:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) uname(&(0x7f0000000000)=""/28) 04:21:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 04:21:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) ftruncate(0xffffffffffffffff, 0x0) 04:21:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) 04:21:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 04:21:24 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmsg$netlink(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000000000a6cfb7ac000000"], 0x1}], 0x1}, 0x0) 04:21:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) 04:21:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:21:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021000000a000000000000ec000008000800120000040000000000004d00000000000000000000008ca9ac39000000ffff006b36ebc6556c898a2e0100ad790000000000000000000000008500000000"], 0x50}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2ae, 0x0) 04:21:25 executing program 1: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYBLOB="e2000000adcfffffffffffffff369eb635d542ddaf75eec81486fb71b43b9d4d00000000f065839849ed64398de1ed8f6fb35683536463ff875436e808dcba8eb7ff5b9c7cbd4caff93b9a5e26615badb7fa131bb1d85f7a22ab9aa441a83a5ed02e96f8cca15c1bf768eb719648da9f52"], 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00'}, &(0x7f0000000680)=0x54) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8138ae83, &(0x7f0000000000)) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000280)) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) 04:21:25 executing program 0: mknod(&(0x7f0000000140)='./bus\x00', 0x803c, 0x0) setuid(0xee01) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 04:21:25 executing program 1: dup(0xffffffffffffffff) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x400000002) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 04:21:25 executing program 0: io_setup(0x6, &(0x7f0000000200)) io_setup(0x4, &(0x7f0000000240)) io_setup(0x800, &(0x7f0000000380)) io_setup(0x4, &(0x7f00000003c0)) io_setup(0x200, &(0x7f0000000440)) [ 219.372046] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 04:21:25 executing program 4: socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x0, 0x20000008, 0x0, 0x0) 04:21:25 executing program 1: fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='lokeyring+}ppp0\x00', 0x10, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00'}, &(0x7f0000000680)=0x54) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) 04:21:25 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000040)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0, 0x0) 04:21:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000002c0)="b9ec090000b808000000ba000000000f300fc76b07dc920080000067260fc7ac0b000f3808580026660f3880a100400000c4c2659f5d0d0fc7af0e000000660f01c80f01cf", 0x45}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:21:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="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") flistxattr(r0, 0x0, 0x0) [ 219.846033] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 04:21:25 executing program 5: [ 219.895143] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 04:21:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000480)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) 04:21:26 executing program 0: pipe(0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00'}, &(0x7f0000000680)=0x54) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000700)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000740)={0x0, r1}) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:21:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 04:21:26 executing program 1: 04:21:26 executing program 2: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000005c0)='lokeyring+}ppp0\x00', 0x10, 0x2) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00'}, &(0x7f0000000680)=0x54) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, &(0x7f0000000500)=""/27) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) 04:21:26 executing program 5: getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000580)='security.SMACK64IPOUT\x00', &(0x7f00000005c0)='lokeyring+}ppp0\x00', 0x10, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00'}, &(0x7f0000000680)=0x54) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2080) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f00000004c0)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000300)=0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f00000006c0)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000700)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8138ae83, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) 04:21:26 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x0, 0xfff9) 04:21:26 executing program 0: 04:21:26 executing program 2: 04:21:26 executing program 4: 04:21:26 executing program 0: 04:21:26 executing program 5: 04:21:26 executing program 2: 04:21:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000480)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) 04:21:26 executing program 4: 04:21:26 executing program 0: 04:21:26 executing program 5: 04:21:26 executing program 2: 04:21:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0605345, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:26 executing program 4: 04:21:26 executing program 0: 04:21:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000500)={'ip6_vti0\x00', {0x2, 0x0, @remote}}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={'ip6_vti0\x00', {0x2, 0x0, @loopback}}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) 04:21:26 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410002, 0x0) 04:21:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000540)={0x0, 0x0, 'client1\x00', 0x0, "9a1b938d80de9ade", "83844bd229ff483468671b758ec644fc1bc9f46c03c27e0b95f82523f7f85348"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x40605346, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:27 executing program 4: 04:21:27 executing program 0: 04:21:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff}) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 221.053958] ALSA: seq fatal error: cannot create timer (-22) 04:21:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x1c}}, 0x0) 04:21:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$evdev(0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000240)=0x4) write(r1, &(0x7f0000000340), 0x10000014c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:21:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x404c534a, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 221.773867] ALSA: seq fatal error: cannot create timer (-22) 04:21:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000240), 0x10) 04:21:27 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x1, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 04:21:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00000000000000000000000000", 0x58}], 0x1) 04:21:28 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00000000000000000000000000", 0x58}], 0x1) 04:21:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:21:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getrlimit(0x0, 0x0) 04:21:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x404c534a, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x404c534a, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff}) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:21:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ab9b3f8683ecf89dee901d2da75c01f0200f58d26d7a071fb35331ce39c5aeeff5083cf07dd46455c914d4aff1e7cf7ed57c0c2056f5ca9fcf03cbf82bd13534737339245d3c70641be6281d7e1b4b7099114c571872298dd7f2120e2b6fa2a2e2a2c9c6e0034750b7961fa2c1584c0b5a500ae0ac39bc76a78d9158266759f766a3e8c84c09cf3ad8882947ffa1fb4c050727beb12c57e06ff590000000000000000000000000000008924578ad49ea1144c7448d640aa88a66a71b77d73a924ff027fdcb550161653d4cb57088385248286f5be9d8766c70c29e6f5063dfe74a1b0b52079159048210b4d271ac94c889b063ca34a09579af03631f128e6dd2c966daecd7c6f7e0f4ebcaf80250cfab07184838078c71d809d06dc0bac75db814525d1d1acaf4cb6f4890f397382ae636697f688094e38db5c22770f53076c630df9bb4c149189ffa975f52087311c5baafc11c90bdc25fc803b71153ddc3995b2df49cdd784bc5bea40861070dadb395e85c93cdfa08e") flistxattr(r0, &(0x7f0000000040)=""/190, 0xbe) [ 222.184653] kauditd_printk_skb: 42 callbacks suppressed [ 222.184676] audit: type=1326 audit(1544674888.237:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8527 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 222.311987] audit: type=1326 audit(1544674888.277:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8525 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) timer_delete(0x0) [ 222.432359] audit: type=1326 audit(1544674888.487:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8550 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 222.959410] audit: type=1326 audit(1544674889.007:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8525 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 222.985696] audit: type=1326 audit(1544674889.037:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8527 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:21:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 04:21:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x404c534a, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:29 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 04:21:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getgid() r0 = dup(0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r2 = memfd_create(&(0x7f0000000700)="74086e75160eeadfddf3c4cf3856674b6470ffff02dc608436c89eb89500", 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="cc"], 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000540)={0x0, {{0x2, 0x4e23}}, {{0x2, 0x9, @loopback}}}, 0x108) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x20, 0x200) syz_open_dev$loop(0x0, 0x200, 0x4400) [ 223.226684] audit: type=1326 audit(1544674889.277:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8550 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) fchown(0xffffffffffffffff, 0x0, 0x0) 04:21:29 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x401) read$eventfd(r0, &(0x7f00000001c0), 0x8) 04:21:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e00000070f7cd07ce000000950000000000322d"], 0x0}, 0x48) 04:21:29 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) [ 223.410485] audit: type=1326 audit(1544674889.457:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8578 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 223.515580] audit: type=1326 audit(1544674889.527:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8586 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:29 executing program 1: seccomp(0x1, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000700)="74086e75160eeadfddf3c4cf3856674b6470ffff02dc608436c89eb89500", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="cc"], 0x1) 04:21:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x28, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) 04:21:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket(0x10, 0x80002, 0x0) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 04:21:29 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) 04:21:29 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000001c0), 0x689) [ 223.767937] audit: type=1326 audit(1544674889.817:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8611 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 223.844443] audit: type=1326 audit(1544674889.867:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8614 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 04:21:30 executing program 3: mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) 04:21:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x837ffffffbffd) 04:21:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigpending(0x0, 0x0) 04:21:30 executing program 3: clone(0x240000, &(0x7f00000001c0), 0x0, 0x0, 0x0) 04:21:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) inotify_init1(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 04:21:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:21:30 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x1000, 0x100, &(0x7f0000ffc000/0x1000)=nil) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 04:21:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 04:21:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) munlockall() 04:21:30 executing program 5: seccomp(0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="dd", 0x1, 0x0, 0x0, 0x0) 04:21:30 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 04:21:30 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040)=0x3, 0xfd86) 04:21:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r0, &(0x7f0000000100)={@void, @val={0x0, 0x0, 0x88b, 0x9, 0x0, 0x39e8}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xfd54) 04:21:30 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x6}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 04:21:30 executing program 4: seccomp(0x400000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) 04:21:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) 04:21:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x24000010004002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x0, 0x200}) 04:21:31 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x2, 0x6}, 0x10) close(r0) 04:21:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x1, 0x4) 04:21:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0xfd86) 04:21:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000001040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 04:21:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x1, 0x4) 04:21:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x24000010004002) pread64(r0, &(0x7f0000000040)=""/240, 0xf0, 0x0) 04:21:31 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040)=0x3, 0xfd86) 04:21:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x2}, 0xfd00) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 04:21:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x24000010004002) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x0, 0x400000}) 04:21:31 executing program 4: 04:21:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) r0 = shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x6000) shmdt(r0) 04:21:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x24000010004002) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f"], 0x1) 04:21:31 executing program 2: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0xfd86) 04:21:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x24000010004002) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)) 04:21:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008fe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000c9500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69bbf08bb6400001086dd", 0x0, 0x69}, 0x28) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000000c0)=""/139) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)=')\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000007c0)}, 0x0) getpid() close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140), 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x1a8) 04:21:32 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00', 0x0) unshare(0x400) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 04:21:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0xff) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @remote}, 0x10) 04:21:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000023000)={0x1c, 0x20, 0xaff, 0x0, 0x0, {0x1000a, 0x0, 0xf000}, [@generic="fffffe0121"]}, 0x1c}}, 0x0) 04:21:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{0x0, 0x187, &(0x7f0000000000), 0x0, &(0x7f0000007b00)}}], 0x4000000000000a2, 0x0) 04:21:32 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="637075263342000ac0f90200000000000000c820f4b3ca0c907c1f66f0d29b61ddba93f3a29765d7a337c0ae24ef121f65712aeb00b5787f562d57eb9cf5e52064995d4f1399754abdef6583c2177e9e5cac1f93000000800000") 04:21:32 executing program 5: clone(0x1000000000001fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000380)='./bus\x00', 0x47f, 0x40) r0 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) execve(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 04:21:32 executing program 4: mkdir(0x0, 0x0) chdir(0x0) symlink(&(0x7f00000001c0)='..', &(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) utimes(0x0, 0x0) eventfd2(0x20, 0x0) 04:21:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_names\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 04:21:32 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) 04:21:32 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x5eb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="637075263342000ac0f90200000000000000c820f4b3ca0c907c1f66f0d29b61ddba93f3a29765d7a337c0ae24ef121f65712aeb00b5787f562d57eb9cf5e52064995d4f1399754abdef6583c2177e9e5cac1f93000000800000") 04:21:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 04:21:32 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setregset(0x10, r1, 0x2, 0x0) 04:21:32 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) [ 226.874727] input: syz1 as /devices/virtual/input/input7 [ 226.914329] ptrace attach of "/root/syz-executor4"[7278] was attempted by "/root/syz-executor4"[8811] [ 226.914922] input: syz1 as /devices/virtual/input/input8 04:21:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='gfs2meta\x00', 0x0, 0x0) 04:21:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x10001) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, 0x0) fallocate(r3, 0x3, 0x0, 0xe439) 04:21:33 executing program 1: io_setup(0x8001000000000, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000340)={{0x8, 0x1}, 'port1\x00', 0x4, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x800}) socket(0x0, 0x0, 0x20a1) r2 = semget(0xffffffffffffffff, 0x0, 0x3) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) shmctl$SHM_LOCK(r2, 0xb) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x6, {0xffffffff}}, 0x18) bind$vsock_dgram(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={"7465616d300040ffffffc000", 0x4bfd}) [ 227.055604] gfs2: gfs2 mount does not exist 04:21:33 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 04:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0305302, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0105303, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000480)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:21:33 executing program 5: io_setup(0x8001000000000, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000340)={{0x8, 0x1}, 'port1\x00', 0x4, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x800}) socket(0x0, 0x0, 0x20a1) r2 = semget(0x1, 0x0, 0x3) semctl$IPC_RMID(r2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) shmctl$SHM_LOCK(r2, 0xb) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, 0x6, {0xffffffff}}, 0x18) bind$vsock_dgram(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={"7465616d300040ffffffc000", 0x4bfd}) 04:21:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0x5452, &(0x7f0000000000)) [ 227.763168] device team0 entered promiscuous mode [ 227.763393] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 227.768313] device team_slave_0 entered promiscuous mode [ 227.780703] device team_slave_1 entered promiscuous mode [ 227.822423] 8021q: adding VLAN 0 to HW filter on device team0 04:21:33 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000000000)) 04:21:34 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") exit(0x0) 04:21:34 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="c1080000bbc1000000211fe4ac141412e0", 0x11}], 0x1}, 0x0) [ 228.254607] ================================================================== [ 228.262122] BUG: KMSAN: uninit-value in __neigh_create+0x21fe/0x2630 [ 228.268615] CPU: 0 PID: 8886 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #112 [ 228.275878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.285226] Call Trace: [ 228.287836] dump_stack+0x1c9/0x220 [ 228.291466] kmsan_report+0x12d/0x290 [ 228.295296] __msan_warning+0x76/0xc0 [ 228.299099] __neigh_create+0x21fe/0x2630 [ 228.303255] ? is_console_locked+0x29/0x50 [ 228.307510] ip_finish_output2+0xa28/0x1590 [ 228.311847] ip_finish_output+0xd40/0xfe0 [ 228.316010] ip_output+0x559/0x620 [ 228.319581] ? ip_mc_finish_output+0x3b0/0x3b0 [ 228.324193] ? ip_finish_output+0xfe0/0xfe0 [ 228.328517] ip_local_out+0x164/0x1d0 [ 228.332325] iptunnel_xmit+0x8d3/0xe20 [ 228.336254] ip_tunnel_xmit+0x378c/0x3b50 [ 228.340469] ipgre_xmit+0xddc/0xec0 [ 228.344115] ? ipgre_close+0x230/0x230 [ 228.348105] dev_hard_start_xmit+0x627/0xc80 [ 228.352557] __dev_queue_xmit+0x3173/0x3cf0 [ 228.356901] dev_queue_xmit+0x4b/0x60 [ 228.360698] ? __netdev_pick_tx+0x1290/0x1290 [ 228.365195] packet_sendmsg+0x7cbd/0x9200 [ 228.369341] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 228.374797] ? rw_copy_check_uvector+0x149/0x6b0 [ 228.379556] ? __msan_poison_alloca+0x1e0/0x270 [ 228.384241] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 228.389616] ? aa_sk_perm+0x7ab/0x9e0 [ 228.393486] ___sys_sendmsg+0xdbc/0x11d0 [ 228.397587] ? compat_packet_setsockopt+0x360/0x360 [ 228.402619] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 228.408004] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 228.413395] ? __fget_light+0x714/0x780 [ 228.417420] __se_sys_sendmsg+0x305/0x460 [ 228.421596] __x64_sys_sendmsg+0x4a/0x70 [ 228.425663] do_syscall_64+0xcd/0x110 [ 228.429488] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 228.434667] RIP: 0033:0x457679 [ 228.437848] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.456738] RSP: 002b:00007fc3176e6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.464450] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 228.471704] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003 [ 228.478958] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 228.486211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3176e76d4 [ 228.493465] R13: 00000000004c4417 R14: 00000000004d73a8 R15: 00000000ffffffff [ 228.500725] [ 228.502342] Uninit was created at: [ 228.505861] No stack [ 228.508160] ================================================================== [ 228.515498] Disabling lock debugging due to kernel taint [ 228.520929] Kernel panic - not syncing: panic_on_warn set ... [ 228.526801] CPU: 0 PID: 8886 Comm: syz-executor4 Tainted: G B 4.20.0-rc5+ #112 [ 228.535440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.544772] Call Trace: [ 228.547353] dump_stack+0x1c9/0x220 [ 228.550970] panic+0x3f0/0x98f [ 228.554168] kmsan_report+0x290/0x290 [ 228.557966] __msan_warning+0x76/0xc0 [ 228.561757] __neigh_create+0x21fe/0x2630 [ 228.565896] ? is_console_locked+0x29/0x50 [ 228.570125] ip_finish_output2+0xa28/0x1590 [ 228.574445] ip_finish_output+0xd40/0xfe0 [ 228.578607] ip_output+0x559/0x620 [ 228.582174] ? ip_mc_finish_output+0x3b0/0x3b0 [ 228.586741] ? ip_finish_output+0xfe0/0xfe0 [ 228.591057] ip_local_out+0x164/0x1d0 [ 228.594866] iptunnel_xmit+0x8d3/0xe20 [ 228.598754] ip_tunnel_xmit+0x378c/0x3b50 [ 228.602912] ipgre_xmit+0xddc/0xec0 [ 228.606530] ? ipgre_close+0x230/0x230 [ 228.610409] dev_hard_start_xmit+0x627/0xc80 [ 228.614829] __dev_queue_xmit+0x3173/0x3cf0 [ 228.619159] dev_queue_xmit+0x4b/0x60 [ 228.622959] ? __netdev_pick_tx+0x1290/0x1290 [ 228.627437] packet_sendmsg+0x7cbd/0x9200 [ 228.631575] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 228.637046] ? rw_copy_check_uvector+0x149/0x6b0 [ 228.641802] ? __msan_poison_alloca+0x1e0/0x270 [ 228.646465] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 228.651826] ? aa_sk_perm+0x7ab/0x9e0 [ 228.655655] ___sys_sendmsg+0xdbc/0x11d0 [ 228.659706] ? compat_packet_setsockopt+0x360/0x360 [ 228.664714] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 228.670088] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 228.675436] ? __fget_light+0x714/0x780 [ 228.679428] __se_sys_sendmsg+0x305/0x460 [ 228.683574] __x64_sys_sendmsg+0x4a/0x70 [ 228.687622] do_syscall_64+0xcd/0x110 [ 228.691411] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 228.696785] RIP: 0033:0x457679 [ 228.699964] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.718849] RSP: 002b:00007fc3176e6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.726567] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 228.733817] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003 [ 228.741076] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 228.748330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3176e76d4 [ 228.755585] R13: 00000000004c4417 R14: 00000000004d73a8 R15: 00000000ffffffff [ 228.764218] Kernel Offset: disabled [ 228.767842] Rebooting in 86400 seconds..