[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 18.978405] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.779729] random: sshd: uninitialized urandom read (32 bytes read) [ 26.192588] random: sshd: uninitialized urandom read (32 bytes read) [ 26.774848] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.197' (ECDSA) to the list of known hosts. [ 32.210142] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/05 06:40:30 fuzzer started [ 33.662976] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/05 06:40:32 dialing manager at 10.128.0.26:42017 2018/08/05 06:40:36 syscalls: 1 2018/08/05 06:40:36 code coverage: enabled 2018/08/05 06:40:36 comparison tracing: enabled 2018/08/05 06:40:36 setuid sandbox: enabled 2018/08/05 06:40:36 namespace sandbox: enabled 2018/08/05 06:40:36 fault injection: enabled 2018/08/05 06:40:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/08/05 06:40:36 net packed injection: enabled 2018/08/05 06:40:36 net device setup: enabled [ 39.791433] random: crng init done 06:41:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={{0x77359400}, {0x77359400}}) fdatasync(r1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) setfsuid(0x0) ftruncate(r2, 0x80003) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) 06:41:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1e82f) r2 = accept4(r0, 0x0, &(0x7f0000000340)=0xfdce, 0x0) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) write$binfmt_misc(r2, &(0x7f0000000040)={'syz0'}, 0x34000) 06:41:47 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) 06:41:47 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) dup2(r1, r0) 06:41:47 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @local={[], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, 'p+l', 0x0, 0x0, 0x0, @mcast1, @dev}}}}}}}, 0x0) 06:41:47 executing program 4: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)=ANY=[]) 06:41:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000340)=ANY=[], &(0x7f0000001380)) 06:41:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@newtfilter={0x24, 0x2c, 0x0, 0x0, 0x25dfdbfe}, 0x24}}, 0x0) [ 109.863897] IPVS: ftp: loaded support on port[0] = 21 [ 109.877303] IPVS: ftp: loaded support on port[0] = 21 [ 109.898139] IPVS: ftp: loaded support on port[0] = 21 [ 109.901397] IPVS: ftp: loaded support on port[0] = 21 [ 109.964898] IPVS: ftp: loaded support on port[0] = 21 [ 109.968586] IPVS: ftp: loaded support on port[0] = 21 [ 109.989373] IPVS: ftp: loaded support on port[0] = 21 [ 110.001305] IPVS: ftp: loaded support on port[0] = 21 [ 111.427261] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.433701] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.452208] device bridge_slave_0 entered promiscuous mode [ 111.534632] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.541145] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.572285] device bridge_slave_1 entered promiscuous mode [ 111.671659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.695285] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.701687] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.713397] device bridge_slave_0 entered promiscuous mode [ 111.734509] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.740865] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.750507] device bridge_slave_0 entered promiscuous mode [ 111.765884] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.772268] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.780689] device bridge_slave_0 entered promiscuous mode [ 111.788685] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.795196] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.812480] device bridge_slave_0 entered promiscuous mode [ 111.821481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.830119] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.836543] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.843991] device bridge_slave_0 entered promiscuous mode [ 111.855158] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.861520] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.875794] device bridge_slave_0 entered promiscuous mode [ 111.884295] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.890658] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.899044] device bridge_slave_0 entered promiscuous mode [ 111.907435] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.913841] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.933509] device bridge_slave_1 entered promiscuous mode [ 111.942958] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.949314] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.956341] device bridge_slave_1 entered promiscuous mode [ 111.978125] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.984495] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.995243] device bridge_slave_1 entered promiscuous mode [ 112.001558] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.007945] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.016140] device bridge_slave_1 entered promiscuous mode [ 112.022373] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.028731] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.037379] device bridge_slave_1 entered promiscuous mode [ 112.045115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.054778] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.061163] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.076513] device bridge_slave_1 entered promiscuous mode [ 112.092055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.099235] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.105811] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.121151] device bridge_slave_1 entered promiscuous mode [ 112.132963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.145278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.154349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.161545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.169986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.207174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.230501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.254662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.266089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.276318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.286375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.298732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.323718] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.401600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.435563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.472293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.479640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.492514] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.552912] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.565425] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.614330] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.625622] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.642569] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.653572] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.663653] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.673167] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.743375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.767989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.781241] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.791568] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.934059] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 112.947042] team0: Port device team_slave_0 added [ 113.081038] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.098638] team0: Port device team_slave_1 added [ 113.125692] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.136329] team0: Port device team_slave_0 added [ 113.150515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.163445] team0: Port device team_slave_0 added [ 113.216183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.235073] team0: Port device team_slave_1 added [ 113.242224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.249250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.257288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.268946] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.282841] team0: Port device team_slave_0 added [ 113.291017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.303993] team0: Port device team_slave_0 added [ 113.310060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.323796] team0: Port device team_slave_0 added [ 113.331161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.344709] team0: Port device team_slave_1 added [ 113.351012] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.368295] team0: Port device team_slave_0 added [ 113.376389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.384935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.393039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.400508] team0: Port device team_slave_0 added [ 113.414636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.431596] team0: Port device team_slave_1 added [ 113.439253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.452850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.464247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.471843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.480299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.487152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.494780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.504546] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.511841] team0: Port device team_slave_1 added [ 113.519647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.529294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.540435] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.549762] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.573946] team0: Port device team_slave_1 added [ 113.590164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.603553] team0: Port device team_slave_1 added [ 113.615290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.623332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.630768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.638860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.647141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.654545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.662201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.670896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.678181] team0: Port device team_slave_1 added [ 113.685082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.692320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.700337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.711278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.718440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.738358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.757003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.768220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.783474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.790379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.800130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.808480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.818045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.825764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.833495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.848995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.858712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.867266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.875423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.888727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.914814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.933504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.951179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.959383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.967134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.974727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.982404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.990227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.998189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.009645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.025430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.043455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.050588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.059859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.080474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.088100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.106081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.125140] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.132807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.149173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.163943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.171348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.183353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.205101] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.214565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.221958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.235216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.249205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.262830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.273893] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.280976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.289627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.302743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.313232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.323033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.348829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.356122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.371255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.136690] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.143089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.149696] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.156039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.187839] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.194610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.205839] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.212188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.218816] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.225160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.233197] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.241170] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.247569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.254202] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.260563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.267622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.361173] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.367558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.374196] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.380598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.390698] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.403727] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.410145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.416824] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.423193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.439071] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.466165] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.472516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.479154] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.485519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.537818] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.549728] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.556115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.562768] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.569137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.578586] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.597038] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.603416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.610036] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.616390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.631884] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 116.228962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.240245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.264182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.271414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.278600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.285995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.293279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.265796] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.306459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.412597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.437460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.484995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.545514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.572522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.622800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.669401] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.730756] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.792000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.809367] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.896648] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.924132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 119.983488] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.027192] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.040505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.046716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.064247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.096695] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.109052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.126290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.219360] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.225538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.235226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.268674] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.277130] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.283271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.299782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.317202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.330472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.371117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.377640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.393473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.427440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.440057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.450767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.482091] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.488269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.505400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.542677] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.613752] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.637232] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.694259] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.734459] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.830588] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.850484] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.876260] 8021q: adding VLAN 0 to HW filter on device team0 06:42:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f0000000680)='e@^#/&mime_type+/:\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x3}}) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1f, 0x0, 0x0, 0x3fd, @time}], 0x19e) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=@known='system.posix_acl_access\x00') [ 122.924442] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 122.931620] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 06:42:00 executing program 3: 06:42:01 executing program 7: 06:42:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000020001200080001007369740014000200080010000000000008000400a8344be6b169f70ddf8feb423da81f277f53ee85af4ef0db4016766b8f30b407d46a070554ca98e036964eca9276540ee264c92e3786009c4387d75c8cd28470d264c57d2d22bc4e06defb04e05602bd1ea2235d52b59f1806705bf58fc1932745c0aa75ca96ce4b70908cb6f694a8418c1158dbb4d153449d621369489bd5fc66a48a079856799f344424fad8f58aed2df6ea11da94a0e13bf5f008c66d52c8ce80652bbd515dd4817c852e87cbc03683c650ecf95a7e2cec524a340717c71ef3e0451e2d00913644aaa02ef097f70e284fdea115d8bd3a968c8d5c2501e5de6d624f78eb9a5a3928afdf7537a81d39b9726510ea8e9316c0b639", @ANYRES32=0x0], 0x2}}, 0x0) [ 123.030442] attempt to access beyond end of device [ 123.035470] loop4: rw=12288, want=8200, limit=20 06:42:01 executing program 7: syz_emit_ethernet(0x2f5, &(0x7f0000000440)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "90a395", 0x2bf, 0x0, 0x0, @remote, @ipv4={[], [], @dev}, {[], @icmpv6=@param_prob={0x4, 0x1, 0x0, 0x2e7d, {0x80000000, 0x6, "d1cd4b", 0x5, 0x2c, 0x5, @mcast1, @mcast1, [@dstopts={0x3c, 0x1f, [], [@generic={0x7, 0xf9, "74544fb191a8a1732dd0c225597246410db6d122959e99bd188c583fc5893213f7928aee404931ae6cb48b310b6182b0066e1c71078773c8f212a4de7cdf7e9d68ebd5d77b0379513620f916b914b1ffca5f46897279c25b69c106712bc6987c044b1d7993b043a7d7d96d8221647bd474d69db5a7cdfb8b088f9a5f1f955d061e642bd9de9f890bff860ce67a16caa73ef47ceab36fbf957492b0b68eab0ee3de7389aff4146ab232cf1e5c09c508f58a741fc49f5dbe718056f38f5b6125ffde274a7ce47c8d7cd30fe9ab08548b23edb54fa41c4deb956446064444fc05554c57b652d788bf849811a4d4ca00e5260cf45d6c23ce26f4b9"}]}, @routing={0x32, 0xe, 0x1, 0x7, 0x0, [@local, @mcast1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, @ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x11}, @mcast1, @local]}, @srh={0x3b, 0x12, 0x4, 0x9, 0x9, 0x40, 0xff, [@loopback, @mcast2, @ipv4={[], [], @multicast1}, @empty, @mcast2, @loopback, @mcast2, @local, @mcast2]}, @fragment={0x29, 0x0, 0x7f, 0x5c700, 0x0, 0x5, 0x67}], "1533cb05d863c7ca1fd43da38da0c208969edc28ceecb4ad8b5130f7a883c76f73088d2cb0c89f9b63404d8073045790d7e07f2a0e75b61d52a1e54d4ce7abb3b3847ea218ba4323b4b0f36108c24392c793821ac73957957594c02c7128d9b3c2262e76c03f2f793029b0ce280411"}}}}}}}, &(0x7f00000001c0)={0x0, 0x3, [0x0, 0x0, 0x3]}) 06:42:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x1e82f) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r3 = accept4(r0, 0x0, &(0x7f0000000340)=0xfdce, 0x0) write$binfmt_misc(r3, &(0x7f0000000040)={'syz0'}, 0xffb8) [ 123.106279] attempt to access beyond end of device [ 123.111300] loop4: rw=12288, want=12296, limit=20 06:42:01 executing program 3: ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@remote}, 0x14) 06:42:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@bridge_setlink={0x20, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x1000000000) [ 123.184327] F2FS-fs (loop4): Failed to get valid F2FS checkpoint 06:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x800054fad}]}) r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000280)) ftruncate(r0, 0x0) [ 123.231149] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 123.238283] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 123.309717] sctp: failed to load transform for md5: -2 [ 123.328211] attempt to access beyond end of device [ 123.329115] sctp: failed to load transform for md5: -2 [ 123.333227] loop4: rw=12288, want=8200, limit=20 06:42:01 executing program 1: 06:42:01 executing program 5: 06:42:01 executing program 6: 06:42:01 executing program 3: [ 123.364502] attempt to access beyond end of device [ 123.369503] loop4: rw=12288, want=12296, limit=20 [ 123.390259] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 123.422693] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 123.429782] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 123.482519] attempt to access beyond end of device [ 123.487570] loop4: rw=12288, want=8200, limit=20 [ 123.521212] attempt to access beyond end of device [ 123.526248] loop4: rw=12288, want=12296, limit=20 06:42:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) 06:42:01 executing program 0: 06:42:01 executing program 2: 06:42:01 executing program 3: 06:42:01 executing program 5: 06:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 06:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) accept(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000000280)=0x80) socket$inet6_tcp(0xa, 0x1, 0x0) 06:42:01 executing program 7: pipe(&(0x7f0000000200)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) [ 123.531266] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 123.537648] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 123.544773] attempt to access beyond end of device [ 123.549732] loop4: rw=12288, want=8200, limit=20 [ 123.554531] attempt to access beyond end of device [ 123.559497] loop4: rw=12288, want=12296, limit=20 06:42:01 executing program 2: 06:42:01 executing program 3: 06:42:01 executing program 0: 06:42:01 executing program 5: 06:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 06:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 06:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 06:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001b00)={@loopback}) 06:42:01 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0xc) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) mknodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 06:42:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000280)) 06:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f00000000c0)={@local, @dev, @multicast1}, &(0x7f0000000100)=0xc) 06:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/208) 06:42:01 executing program 4: pipe2(&(0x7f0000000300), 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x4) 06:42:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) 06:42:01 executing program 0: pipe(&(0x7f00000000c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000280)=""/4096) 06:42:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = dup(0xffffffffffffffff) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 06:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000540)={'nat\x00', 0x2, [{}, {}]}, 0x48) 06:42:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0), 0x20) 06:42:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 06:42:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast2, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, 0xe8) 06:42:01 executing program 2: pipe(&(0x7f0000000200)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000080), 0x4) 06:42:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) inotify_init1(0x0) 06:42:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001300)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x50fa7}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) 06:42:02 executing program 4: pipe(&(0x7f0000000200)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 06:42:02 executing program 7: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 06:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 06:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000001740)={0x7}, 0x7) 06:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 06:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) 06:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000080), 0xc) 06:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000240)=0x4) 06:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x0, 0x8a}) 06:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='\x00', 0x1, 0x0) 06:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) dup(0xffffffffffffff9c) 06:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'ip_vti0\x00'}) 06:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000001c0)={'eql\x00'}) 06:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000100), 0x0) 06:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000000c0)=""/248) 06:42:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x50fa7}]}) fdatasync(0xffffffffffffffff) 06:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 06:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_data=&(0x7f0000000080)="4f42c2deea0053de5ef537f178577ed3acd2b19502a0c4dbd7f6f6c64daafdc6"}) 06:42:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001300)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x50fa7}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @dev}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast1}, 'erspan0\x00'}) 06:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)) 06:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x400000050f94}]}) clock_gettime(0x0, &(0x7f00000000c0)) 06:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) prctl$setfpexc(0xc, 0x0) 06:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 06:42:02 executing program 7: getpgid(0x0) prlimit64(0x0, 0x0, &(0x7f0000000900), &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) execve(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000700), &(0x7f00000007c0)) 06:42:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) 06:42:02 executing program 3: accept4$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000002c0)={'bridge_slave_0\x00', {0x2, 0x0, @multicast2}}) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) 06:42:02 executing program 6: getpeername(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000180)=0x80) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x8) 06:42:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000002c0), 0x4) 06:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) accept(0xffffffffffffffff, &(0x7f0000002040)=@ax25, &(0x7f00000020c0)=0x80) 06:42:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50a86}]}) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000100)) 06:42:02 executing program 5: eventfd2(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuset.effective_mems\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000004c0)) 06:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$void(0xffffffffffffffff, 0x0) 06:42:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) mlockall(0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000100)) 06:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 06:42:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000040)) 06:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 06:42:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 06:42:02 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuset.effective_mems\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) keyctl$set_timeout(0xf, 0x0, 0x6) 06:42:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000001b00)={'veth0\x00', {0x2, 0x0, @rand_addr}}) 06:42:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") 06:42:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) keyctl$get_persistent(0x16, 0x0, 0x0) 06:42:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:42:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50fba}]}) exit(0x0) 06:42:03 executing program 0: io_setup(0x0, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000140)={0x77359400}) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000001c0)) 06:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000300)) 06:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='.request_key_auth\x00', &(0x7f0000000340)='cpuset.effective_cpus\x00') 06:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) 06:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) arch_prctl(0x0, &(0x7f0000000240)) 06:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 06:42:03 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000240)=""/201) 06:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000340)=""/23) 06:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 06:42:03 executing program 6: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000040)={0x8}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 06:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 06:42:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000140)) 06:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 06:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) 06:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 06:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) capset(&(0x7f0000000040), &(0x7f0000000100)) 06:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', "be00"}, &(0x7f0000000240)=""/147, 0x93) 06:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 06:42:03 executing program 7: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 06:42:03 executing program 0: accept4$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000002c0)={'bridge_slave_0\x00', {0x2, 0x0, @multicast2}}) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000140)) 06:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000080)=""/16}) 06:42:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) 06:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) 06:42:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 06:42:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000000c0)}) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 06:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000100)=""/226) 06:42:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000100)={'T!ROXY\x00'}, &(0x7f00000000c0)=0x1e) 06:42:03 executing program 7: socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x805, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 06:42:03 executing program 3: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0xb) 06:42:03 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 06:42:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f000004d000)=[{{0x2}}], 0x18) 06:42:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85714070") setsockopt$inet6_tcp_int(r0, 0x6, 0x3000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000080)='c', 0x1, 0x200418cf, &(0x7f0000ae3000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x3}, 0x1c) 06:42:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x50a86}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000280)=@ethtool_dump}) 06:42:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50faf}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000240)) 06:42:03 executing program 5: 06:42:03 executing program 1: 06:42:03 executing program 0: 06:42:03 executing program 2: 06:42:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) semctl$IPC_RMID(0x0, 0x0, 0x0) 06:42:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x0) 06:42:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x0) getsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000340), &(0x7f0000000380)=0x4) 06:42:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000200)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = getpgrp(0x0) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r4, 0x8, r2) read$eventfd(0xffffffffffffffff, &(0x7f0000e5aff8), 0xfffffc7a) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b28fe0)=[{r5}], 0x1, 0xfffffffffffffff8) r6 = dup3(r4, r5, 0x0) tkill(r3, 0x16) dup2(r6, r1) 06:42:03 executing program 4: 06:42:03 executing program 0: 06:42:03 executing program 3: 06:42:03 executing program 2: 06:42:04 executing program 7: 06:42:04 executing program 0: 06:42:04 executing program 6: 06:42:04 executing program 3: 06:42:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) 06:42:04 executing program 5: 06:42:04 executing program 2: 06:42:04 executing program 3: 06:42:04 executing program 7: 06:42:04 executing program 0: 06:42:04 executing program 6: 06:42:06 executing program 1: 06:42:06 executing program 5: 06:42:06 executing program 2: 06:42:06 executing program 3: 06:42:06 executing program 6: 06:42:06 executing program 4: 06:42:06 executing program 7: 06:42:06 executing program 0: 06:42:06 executing program 6: 06:42:06 executing program 0: 06:42:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ea"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:42:07 executing program 4: 06:42:07 executing program 3: 06:42:07 executing program 2: 06:42:07 executing program 7: 06:42:07 executing program 1: 06:42:07 executing program 6: 06:42:07 executing program 3: 06:42:07 executing program 2: 06:42:07 executing program 4: 06:42:07 executing program 0: 06:42:07 executing program 5: 06:42:07 executing program 7: 06:42:07 executing program 2: 06:42:07 executing program 4: 06:42:07 executing program 6: 06:42:07 executing program 3: 06:42:07 executing program 5: 06:42:07 executing program 1: 06:42:07 executing program 0: 06:42:07 executing program 2: 06:42:07 executing program 3: 06:42:07 executing program 7: 06:42:07 executing program 0: 06:42:07 executing program 6: 06:42:07 executing program 4: 06:42:07 executing program 1: 06:42:07 executing program 5: 06:42:07 executing program 3: 06:42:07 executing program 2: 06:42:07 executing program 7: 06:42:07 executing program 1: 06:42:07 executing program 6: 06:42:07 executing program 4: 06:42:07 executing program 0: 06:42:07 executing program 5: 06:42:07 executing program 3: 06:42:07 executing program 2: 06:42:07 executing program 7: 06:42:07 executing program 4: 06:42:07 executing program 6: 06:42:07 executing program 5: 06:42:07 executing program 3: 06:42:07 executing program 1: 06:42:07 executing program 0: 06:42:07 executing program 2: 06:42:07 executing program 6: 06:42:07 executing program 4: 06:42:07 executing program 7: 06:42:07 executing program 5: 06:42:07 executing program 1: 06:42:07 executing program 3: 06:42:07 executing program 0: 06:42:07 executing program 6: 06:42:07 executing program 2: 06:42:07 executing program 7: 06:42:07 executing program 4: 06:42:07 executing program 5: 06:42:07 executing program 1: 06:42:07 executing program 3: 06:42:07 executing program 0: 06:42:07 executing program 4: 06:42:07 executing program 7: 06:42:07 executing program 1: 06:42:07 executing program 6: 06:42:07 executing program 2: 06:42:07 executing program 5: 06:42:07 executing program 3: 06:42:07 executing program 0: 06:42:08 executing program 4: 06:42:08 executing program 5: 06:42:08 executing program 2: 06:42:08 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="12103cefe2b7ce2a94f1bc7127a6cf215743d168f607a209"], 0x18) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000140)={0x7f}) 06:42:08 executing program 1: r0 = socket(0x50000000010, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r0, r2, &(0x7f0000000140), 0x80000002) 06:42:08 executing program 6: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @local, 0x0, 0x2, [@multicast2, @local]}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) 06:42:08 executing program 3: 06:42:08 executing program 0: 06:42:08 executing program 5: 06:42:08 executing program 4: 06:42:08 executing program 2: 06:42:08 executing program 3: 06:42:08 executing program 6: 06:42:08 executing program 7: 06:42:08 executing program 4: 06:42:08 executing program 0: 06:42:08 executing program 2: 06:42:08 executing program 1: 06:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000000c0)=""/82) 06:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@newtfilter={0x24, 0x2c, 0x0, 0x0, 0x25dfdbfe, {0x0, 0x0, {}, {0x10}}}, 0x24}}, 0x0) 06:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, 0xe8) 06:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) geteuid() 06:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5064b}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev}, {0x0, @dev}, 0x0, {0x2, 0x0, @loopback}, 'ifb0\x00'}) 06:42:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) 06:42:08 executing program 1: 06:42:08 executing program 2: 06:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) 06:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) pipe(&(0x7f0000000680)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001180)={&(0x7f00000006c0)=@abs={0x1}, 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000001040)}, 0x0) 06:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000002c0)=0xe8) 06:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 06:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e63}]}) getrusage(0x0, &(0x7f0000000340)) 06:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 06:42:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001300)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x50fa7}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 06:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) keyctl$assume_authority(0x10, 0x0) 06:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@broadcast, @local}, &(0x7f0000000080)=0x8) 06:42:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x50fa7}]}) getpgrp(0xffffffffffffffff) 06:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x8c, [], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=""/140}, &(0x7f0000000240)=0x78) 06:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) 06:42:08 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000240)=0xffffffffffffff1a) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000140)={0x14}, 0x14) 06:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) fsync(0xffffffffffffffff) 06:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000), &(0x7f0000000140)) 06:42:08 executing program 5: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000040)=0x3, 0x4) 06:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r0, 0x0) 06:42:08 executing program 0: socket$inet6(0xa, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000240)=0xffffffffffffff1a) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) 06:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) 06:42:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) 06:42:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @dev, 'team0\x00'}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000003c0)}, 0x0) 06:42:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) readv(0xffffffffffffffff, &(0x7f0000000380), 0x0) 06:42:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 06:42:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) prctl$getreaper(0x0, &(0x7f0000000040)) 06:42:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50a43}]}) request_key(&(0x7f0000000740)='cifs.spnego\x00', &(0x7f0000000780), &(0x7f00000007c0)='user.syz\x00', 0xfffffffffffffff9) 06:42:08 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000100), 0x0, 0xfffffffffffffff9) 06:42:09 executing program 0: setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000040)=0x54) 06:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x0) 06:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180), &(0x7f0000000000)=0x325) 06:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)) 06:42:09 executing program 1: pipe(&(0x7f00000000c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 06:42:09 executing program 5: pipe(&(0x7f00000000c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_getnetconf={0x14}, 0x14}}, 0x0) 06:42:09 executing program 7: pipe(&(0x7f00000000c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x22000000000006, 0x0, 0x0, 0x50676}]}) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 06:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) keyctl$link(0x8, 0x0, 0x0) 06:42:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f94}]}) socket$inet_tcp(0x2, 0x1, 0x0) 06:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000040)) 06:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/210, 0xd2) 06:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 06:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) 06:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e60}]}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:42:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000000)=0x1f000) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x7f}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x103000}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x1d, 0x10, "f511d2b82f24cf5b82f6c0634c6b543ecd811981493e8010cfa5595c4911980668024d312dd44d8cae83e2f2605782efcba376ce3f32a83a5a22b8c26e2c2ea7", "ac2ea2d2cee317c3c80cfa4d32cc7471d7a51963438744b05a4b268253826d594d3d23166e4a65ff2ac62a00b01a6b1018f485e26720fc6e515ffa9373cd5e6a", "e46346bfe80337cc6af9f33b51d24de94e0e9ab8356a0faae91a8634906f9e3c"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:42:09 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000000)=0x1f000) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x7f}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x103000}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x1d, 0x10, "f511d2b82f24cf5b82f6c0634c6b543ecd811981493e8010cfa5595c4911980668024d312dd44d8cae83e2f2605782efcba376ce3f32a83a5a22b8c26e2c2ea7", "ac2ea2d2cee317c3c80cfa4d32cc7471d7a51963438744b05a4b268253826d594d3d23166e4a65ff2ac62a00b01a6b1018f485e26720fc6e515ffa9373cd5e6a", "e46346bfe80337cc6af9f33b51d24de94e0e9ab8356a0faae91a8634906f9e3c"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:42:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000002440)=""/73, 0x49}}], 0x22b, 0x0, &(0x7f0000002640)) getpid() socketpair(0xf, 0xa, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000200)=@rc={0x1f, {0x1, 0xf33, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x3}, 0x80) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=""/219, 0xdb}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/sockcreate\x00') pwritev(r1, &(0x7f0000001400), 0x2a6, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000080)) 06:42:09 executing program 4: pipe(&(0x7f0000000200)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50ffd}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x5a, [], 0x0, &(0x7f0000000140), &(0x7f0000000280)=""/90}, &(0x7f0000000080)=0x78) 06:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) fdatasync(0xffffffffffffffff) 06:42:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), 0x14) 06:42:09 executing program 0: inotify_init1(0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x54fad}]}) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x44) 06:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) unlink(&(0x7f0000000040)='./file0\x00') 06:42:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) 06:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50f55}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 06:42:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 06:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000002440)={0x7}, 0x7) 06:42:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 06:42:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0xf4, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) dup3(r0, r1, 0x0) 06:42:09 executing program 2: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x8}}) 06:42:09 executing program 6: r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r2) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000100), &(0x7f0000000280), 0x34b, r0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r3, r4, r3}, &(0x7f0000000380)=""/132, 0x3dd, 0x0) 06:42:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50e61}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) 06:42:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50e62}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) 06:42:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50e62}]}) accept4$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e, 0x0) 06:42:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f81}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) 06:42:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50e66}]}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='veth0_to_team\x00') 06:42:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50e62}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 06:42:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50f8c}]}) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0x2d, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf, 'Lsystemvboxnet0'}}, 0x2d) [ 131.783995] ================================================================== [ 131.791420] BUG: KASAN: slab-out-of-bounds in crypto_dh_encode_key+0x609/0x830 [ 131.798811] Write of size 843 at addr ffff8801aa829b55 by task syz-executor6/7373 [ 131.806418] [ 131.808055] CPU: 1 PID: 7373 Comm: syz-executor6 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 131.816453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.825822] Call Trace: [ 131.828407] dump_stack+0x1c9/0x2b4 [ 131.832071] ? dump_stack_print_info.cold.2+0x52/0x52 [ 131.837260] ? printk+0xa7/0xcf [ 131.840539] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 131.845295] ? crypto_dh_encode_key+0x609/0x830 [ 131.849961] print_address_description+0x6c/0x20b [ 131.854801] ? crypto_dh_encode_key+0x609/0x830 [ 131.859463] kasan_report.cold.7+0x242/0x30d [ 131.863866] check_memory_region+0x13e/0x1b0 [ 131.868268] memcpy+0x37/0x50 [ 131.871383] crypto_dh_encode_key+0x609/0x830 [ 131.875889] ? crypto_dh_decode_key+0x820/0x820 [ 131.880572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.886116] ? __keyctl_dh_compute+0x6e1/0x1c00 [ 131.890780] __keyctl_dh_compute+0x707/0x1c00 [ 131.895270] ? __save_stack_trace+0x8d/0xf0 [ 131.899591] ? copy_overflow+0x30/0x30 [ 131.903474] ? save_stack+0x43/0xd0 [ 131.907093] ? __kasan_slab_free+0x11a/0x170 [ 131.911527] ? kasan_slab_free+0xe/0x10 [ 131.915769] ? kfree+0xd9/0x260 [ 131.919060] ? __x64_sys_add_key+0x2b7/0x4e0 [ 131.923471] ? do_syscall_64+0x1b9/0x820 [ 131.927536] ? kasan_check_read+0x11/0x20 [ 131.931682] ? do_raw_spin_unlock+0xa7/0x2f0 [ 131.936083] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 131.940658] ? kasan_check_write+0x14/0x20 [ 131.944892] ? trace_hardirqs_off+0xd/0x10 [ 131.949125] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 131.954218] ? debug_check_no_obj_freed+0x30b/0x595 [ 131.959243] ? trace_hardirqs_off+0xd/0x10 [ 131.963466] ? quarantine_put+0x10d/0x1b0 [ 131.967749] keyctl_dh_compute+0xc5/0x11f [ 131.971886] ? __keyctl_dh_compute+0x1c00/0x1c00 [ 131.976645] ? do_futex+0x27d0/0x27d0 [ 131.980460] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 131.986364] __x64_sys_keyctl+0x12a/0x3b0 [ 131.990499] do_syscall_64+0x1b9/0x820 [ 131.994370] ? finish_task_switch+0x1d3/0x870 [ 131.998854] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.003785] ? syscall_return_slowpath+0x31d/0x5e0 [ 132.008705] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.013725] ? prepare_exit_to_usermode+0x291/0x3b0 [ 132.018727] ? perf_trace_sys_enter+0xb10/0xb10 [ 132.023383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.028218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.033392] RIP: 0033:0x456b29 [ 132.036573] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.055495] RSP: 002b:00007fc35759ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 132.063195] RAX: ffffffffffffffda RBX: 00007fc35759f6d4 RCX: 0000000000456b29 [ 132.070661] RDX: 0000000020000380 RSI: 0000000020000340 RDI: 0000000000000017 [ 132.077923] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 132.085184] R10: 00000000000003dd R11: 0000000000000246 R12: 00000000ffffffff [ 132.092443] R13: 00000000004d16a0 R14: 00000000004c7069 R15: 0000000000000000 [ 132.099703] [ 132.101356] Allocated by task 7373: [ 132.104972] save_stack+0x43/0xd0 [ 132.108449] kasan_kmalloc+0xc4/0xe0 [ 132.112170] __kmalloc+0x14e/0x760 [ 132.115697] __keyctl_dh_compute+0x6e1/0x1c00 [ 132.120178] keyctl_dh_compute+0xc5/0x11f [ 132.124327] __x64_sys_keyctl+0x12a/0x3b0 [ 132.128473] do_syscall_64+0x1b9/0x820 [ 132.132344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.137510] [ 132.139118] Freed by task 6190: [ 132.142407] save_stack+0x43/0xd0 [ 132.145850] __kasan_slab_free+0x11a/0x170 [ 132.150084] kasan_slab_free+0xe/0x10 [ 132.153869] kfree+0xd9/0x260 [ 132.156963] skb_free_head+0x99/0xc0 [ 132.160679] skb_release_data+0x6a4/0x880 [ 132.164809] skb_release_all+0x4a/0x60 [ 132.168678] kfree_skb+0x19d/0x580 [ 132.172204] ip_tunnel_xmit+0x838/0x3af1 [ 132.176248] __gre_xmit+0x5e1/0x980 [ 132.179856] gre_tap_xmit+0x314/0x590 [ 132.183641] dev_hard_start_xmit+0x26c/0xc30 [ 132.188064] sch_direct_xmit+0x486/0x1140 [ 132.192211] __qdisc_run+0x619/0x19f0 [ 132.196012] __dev_queue_xmit+0x1424/0x38c0 [ 132.200362] dev_queue_xmit+0x17/0x20 [ 132.204148] neigh_resolve_output+0x681/0xaf0 [ 132.208667] ip6_finish_output2+0xc95/0x2820 [ 132.213060] ip6_finish_output+0x5fe/0xbc0 [ 132.217287] ip6_output+0x234/0x9d0 [ 132.220900] ndisc_send_skb+0x100d/0x1570 [ 132.225036] ndisc_send_rs+0x134/0x6e0 [ 132.228908] addrconf_rs_timer+0x314/0x690 [ 132.233148] call_timer_fn+0x242/0x970 [ 132.237020] __run_timers+0x7dc/0xcb0 [ 132.240823] run_timer_softirq+0x1d/0x40 [ 132.244869] __do_softirq+0x2e8/0xb17 [ 132.248646] [ 132.250264] The buggy address belongs to the object at ffff8801aa829b40 [ 132.250264] which belongs to the cache kmalloc-1024 of size 1024 [ 132.263099] The buggy address is located 21 bytes inside of [ 132.263099] 1024-byte region [ffff8801aa829b40, ffff8801aa829f40) [ 132.274965] The buggy address belongs to the page: [ 132.279899] page:ffffea0006aa0a00 count:1 mapcount:0 mapping:ffff8801dac00ac0 index:0x0 compound_mapcount: 0 [ 132.289852] flags: 0x2fffc0000008100(slab|head) [ 132.294509] raw: 02fffc0000008100 ffffea0006ad5488 ffffea0007271688 ffff8801dac00ac0 [ 132.302409] raw: 0000000000000000 ffff8801aa828040 0000000100000007 0000000000000000 [ 132.310270] page dumped because: kasan: bad access detected [ 132.316073] [ 132.317697] Memory state around the buggy address: [ 132.322613] ffff8801aa829d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.329974] ffff8801aa829e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.337351] >ffff8801aa829e80: 00 00 00 05 fc fc fc fc fc fc fc fc fc fc fc fc [ 132.344691] ^ [ 132.348823] ffff8801aa829f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 132.356170] ffff8801aa829f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 132.363522] ================================================================== [ 132.371272] Kernel panic - not syncing: panic_on_warn set ... [ 132.371272] [ 132.378642] CPU: 1 PID: 7373 Comm: syz-executor6 Tainted: G B 4.18.0-rc7-next-20180803+ #31 [ 132.388431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.397793] Call Trace: [ 132.400393] dump_stack+0x1c9/0x2b4 [ 132.404010] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.409199] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 132.413946] panic+0x238/0x4e7 [ 132.417127] ? add_taint.cold.5+0x16/0x16 [ 132.421267] ? do_raw_spin_unlock+0xa7/0x2f0 [ 132.425682] ? do_raw_spin_unlock+0xa7/0x2f0 [ 132.430080] ? crypto_dh_encode_key+0x609/0x830 [ 132.434741] kasan_end_report+0x47/0x4f [ 132.438718] kasan_report.cold.7+0x76/0x30d [ 132.443028] check_memory_region+0x13e/0x1b0 [ 132.447422] memcpy+0x37/0x50 [ 132.450547] crypto_dh_encode_key+0x609/0x830 [ 132.455035] ? crypto_dh_decode_key+0x820/0x820 [ 132.459693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.465218] ? __keyctl_dh_compute+0x6e1/0x1c00 [ 132.469878] __keyctl_dh_compute+0x707/0x1c00 [ 132.474369] ? __save_stack_trace+0x8d/0xf0 [ 132.478682] ? copy_overflow+0x30/0x30 [ 132.482553] ? save_stack+0x43/0xd0 [ 132.486180] ? __kasan_slab_free+0x11a/0x170 [ 132.490576] ? kasan_slab_free+0xe/0x10 [ 132.494537] ? kfree+0xd9/0x260 [ 132.497804] ? __x64_sys_add_key+0x2b7/0x4e0 [ 132.502199] ? do_syscall_64+0x1b9/0x820 [ 132.506275] ? kasan_check_read+0x11/0x20 [ 132.510408] ? do_raw_spin_unlock+0xa7/0x2f0 [ 132.514802] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 132.519385] ? kasan_check_write+0x14/0x20 [ 132.523641] ? trace_hardirqs_off+0xd/0x10 [ 132.527878] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 132.532969] ? debug_check_no_obj_freed+0x30b/0x595 [ 132.537979] ? trace_hardirqs_off+0xd/0x10 [ 132.542203] ? quarantine_put+0x10d/0x1b0 [ 132.546365] keyctl_dh_compute+0xc5/0x11f [ 132.550506] ? __keyctl_dh_compute+0x1c00/0x1c00 [ 132.555249] ? do_futex+0x27d0/0x27d0 [ 132.559040] ? key_get_type_from_user.constprop.7+0x110/0x110 [ 132.564925] __x64_sys_keyctl+0x12a/0x3b0 [ 132.569099] do_syscall_64+0x1b9/0x820 [ 132.572987] ? finish_task_switch+0x1d3/0x870 [ 132.577483] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.582414] ? syscall_return_slowpath+0x31d/0x5e0 [ 132.587348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.592354] ? prepare_exit_to_usermode+0x291/0x3b0 [ 132.597371] ? perf_trace_sys_enter+0xb10/0xb10 [ 132.602027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.606874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.612067] RIP: 0033:0x456b29 [ 132.615252] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.634156] RSP: 002b:00007fc35759ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 132.641848] RAX: ffffffffffffffda RBX: 00007fc35759f6d4 RCX: 0000000000456b29 [ 132.649142] RDX: 0000000020000380 RSI: 0000000020000340 RDI: 0000000000000017 [ 132.656415] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 132.663669] R10: 00000000000003dd R11: 0000000000000246 R12: 00000000ffffffff [ 132.670956] R13: 00000000004d16a0 R14: 00000000004c7069 R15: 0000000000000000 [ 132.678563] Dumping ftrace buffer: [ 132.682087] (ftrace buffer empty) [ 132.685773] Kernel Offset: disabled [ 132.689373] Rebooting in 86400 seconds..