[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 51.449392] sshd (6404) used greatest stack depth: 54176 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.873367] kauditd_printk_skb: 2 callbacks suppressed [ 51.873395] audit: type=1800 audit(1545459949.929:29): pid=6338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 51.898206] audit: type=1800 audit(1545459949.929:30): pid=6338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2018/12/22 06:26:02 fuzzer started 2018/12/22 06:26:07 dialing manager at 10.128.0.26:38057 syzkaller login: [ 69.345984] ld (6496) used greatest stack depth: 53728 bytes left 2018/12/22 06:26:07 syscalls: 1 2018/12/22 06:26:07 code coverage: enabled 2018/12/22 06:26:07 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/22 06:26:07 setuid sandbox: enabled 2018/12/22 06:26:07 namespace sandbox: enabled 2018/12/22 06:26:07 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/22 06:26:07 fault injection: enabled 2018/12/22 06:26:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/22 06:26:07 net packet injection: enabled 2018/12/22 06:26:07 net device setup: enabled 06:28:59 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r4) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) sendmmsg$unix(r5, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r7]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r6, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) execveat(r3, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) write$P9_RSTATu(r3, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) r8 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r8, r8) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, 0x0) [ 242.111925] IPVS: ftp: loaded support on port[0] = 21 [ 243.523332] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.529869] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.538311] device bridge_slave_0 entered promiscuous mode [ 243.622038] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.628556] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.637119] device bridge_slave_1 entered promiscuous mode [ 243.720316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 243.802615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 244.057885] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.147880] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.233674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.240665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.328386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.335528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.590792] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.599674] team0: Port device team_slave_0 added [ 244.683339] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.692035] team0: Port device team_slave_1 added [ 244.775727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.868761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.956634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.964382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.973674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.059855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.067990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.077277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:29:03 executing program 1: memfd_create(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="03"], 0x1, 0x0) [ 245.967984] IPVS: ftp: loaded support on port[0] = 21 [ 246.412743] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.419332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.426656] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.433280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.442779] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 246.449263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.226167] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.232859] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.241145] device bridge_slave_0 entered promiscuous mode [ 248.431208] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.437863] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.446298] device bridge_slave_1 entered promiscuous mode [ 248.599949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.736097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.122088] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.263059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.971846] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.980443] team0: Port device team_slave_0 added [ 250.128675] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.137468] team0: Port device team_slave_1 added [ 250.263939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.378736] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:29:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2779}) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 250.530544] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.538300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.547546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.699163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.707028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.716124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.161161] IPVS: ftp: loaded support on port[0] = 21 [ 252.655220] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.661939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.669166] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.675798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.685909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.692466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.713510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.363641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.071642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.077945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.086284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.164767] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.171312] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.179776] device bridge_slave_0 entered promiscuous mode [ 254.331320] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.338023] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.346360] device bridge_slave_1 entered promiscuous mode [ 254.486879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.669644] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.683833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.014517] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.167348] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.981664] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.990455] team0: Port device team_slave_0 added [ 256.246477] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 256.255135] team0: Port device team_slave_1 added [ 256.398814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.407464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.416549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.601450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.779481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 256.787163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.796313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.975759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.983852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.993047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.655396] ip (6984) used greatest stack depth: 53672 bytes left 06:29:16 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e03000000e3812fe047decb5f00000000002d00470d7b066f66db683bd51f36bc044926e4ce1ec260774b86bef272c40a3f8f4cbbe910affe"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x220000002b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x0, 0x9, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 258.905379] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.912041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.919167] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.925796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.935367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.941945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.376946] IPVS: ftp: loaded support on port[0] = 21 [ 259.565480] 8021q: adding VLAN 0 to HW filter on device bond0 06:29:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) shutdown(r0, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4000) 06:29:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000e80)={0xffffffffffffff9c}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0xf, 0x0, &(0x7f0000000540)="6fae7cae07ae0a9b15f309c8ad3cc1", 0x0, 0x80000001}, 0x28) sendmsg$kcm(r1, &(0x7f0000000e40)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x2711, @reserved}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000780)="27cb2519fab8e6963e220ca6522641c5dfbb5caf86b416f16b591672744e3f4f256d1ce95d4d1424c3fff924893df0bb3a49b5b0e1999e4c124d6046b7220cf3a922d99d92aa79ae3067647493866be6b51590707c4efe004fef657f47d0c2d384569ecbecf2c257c8113912359d6c73dfe43bac1b3acb9d74cd74f878ce30eeb7e531eeb3fac4d05216635a0ba1c56ea7cfa333d2424424a0e97edf3ab1bd06fabe3abfb4175a302d1fd6edf489986f", 0xb0}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000340)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r0, 0x0, 0x2a, &(0x7f0000000400)='{wlan1]userem1em1*)user!mime_type{bdev--$\x00'}, 0x30) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x8080) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) [ 260.261944] hrtimer: interrupt took 29478 ns [ 260.338158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.049188] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.055554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.063499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:29:19 executing program 0: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = socket(0x1e, 0x4, 0x0) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000480)=0x3) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x900, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x881}, 0x8001) sendmmsg(r2, &(0x7f0000000000), 0x142, 0x0) 06:29:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000002000210000000000000000000200000000000000000000001100000008000b00000000000800020000000000080097004e214e24"], 0x38}}, 0x0) 06:29:19 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000080)={0x0, r2, 0x22d}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 261.917897] 8021q: adding VLAN 0 to HW filter on device team0 06:29:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x1, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 262.084348] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 06:29:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r1, 0x700, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}}, 0x800) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0xfef9, &(0x7f0000000180)={&(0x7f00000000c0)={0x30, r1, 0x11, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x2) 06:29:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1000000000000200, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 06:29:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000009940)=[{{0x0, 0x0, &(0x7f0000009780)=[{&(0x7f0000001d40)=""/15, 0xf}, {&(0x7f0000009340)=""/153, 0x99}], 0x2}}], 0x1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x280000000000000}, 0x28, 0x2) [ 262.898583] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.905264] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.913437] device bridge_slave_0 entered promiscuous mode [ 263.147820] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.154656] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.162924] device bridge_slave_1 entered promiscuous mode [ 263.349944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 263.504404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 264.128332] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.240942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.370190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 264.377332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.473441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 264.480414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.943144] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.951909] team0: Port device team_slave_0 added [ 265.173274] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.182142] team0: Port device team_slave_1 added [ 265.374421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.381397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.390266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.492499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.499486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.508424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.694378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.702227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.711237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.875488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.883366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.892379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:29:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000009940)=[{{0x0, 0x0, &(0x7f0000009780)=[{&(0x7f0000001d40)=""/15, 0xf}, {&(0x7f0000009340)=""/153, 0x99}], 0x2}}], 0x1, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x280000000000000}, 0x28, 0x2) [ 266.928361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.567284] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.851707] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.858392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.865673] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.872278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.881788] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 267.888718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.136107] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 268.142468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.150270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.692416] 8021q: adding VLAN 0 to HW filter on device team0 06:29:30 executing program 2: [ 272.843322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.015310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.185651] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.191941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.199568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.368608] 8021q: adding VLAN 0 to HW filter on device team0 06:29:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x801, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0x6) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) 06:29:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local}, 0xc) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0xb, 0x0, &(0x7f00000000c0)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000140), &(0x7f0000000240)) r6 = geteuid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) r11 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) r13 = getegid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f00000009c0)=0xe8) getresgid(&(0x7f0000000a00)=0x0, &(0x7f0000000a40), &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) ioctl$NBD_SET_SOCK(r3, 0xab00, r3) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000cc0)={0x510, 0x0, 0x2, [{{0x4, 0x3, 0x3f, 0xc7d, 0x424b, 0x6, {0x4, 0x8, 0x4, 0x40, 0x9, 0xffffffffffff8001, 0x2, 0x8, 0x9, 0x3, 0x5, r4, r5, 0x5, 0x10000}}, {0x6, 0x5, 0x0, 0x3}}, {{0x4, 0x0, 0x1, 0xffff, 0x6, 0x5, {0x6, 0x4, 0x8000, 0x7, 0x8c0d, 0x9, 0xffff, 0x2, 0x8a9, 0x6, 0x8, r6, r7, 0x5, 0x8}}, {0x1, 0x3fc00000000, 0xd, 0xffffffff00000000, '\')&\\vboxnet1{'}}, {{0x2, 0x0, 0x49a433b8, 0xa4f2, 0x8, 0x9, {0x4, 0xfff, 0xe0, 0x20, 0x700, 0x80000001, 0x5, 0x8, 0x2, 0x8, 0xff, r8, r9, 0x7fffffff}}, {0x4, 0x100, 0x0, 0xee82}}, {{0x4, 0x3, 0x2, 0x7, 0x4, 0x48, {0x4, 0x83, 0x7fff, 0x3, 0x6c7eeabf, 0x8, 0x101, 0xaf9, 0x3, 0x4, 0xc5d1, r10, r11, 0xf01, 0x90}}, {0x4, 0x8001, 0x1, 0x1, '@'}}, {{0x0, 0x2, 0x400, 0x80, 0x9, 0xfffffffffffffff8, {0x0, 0x0, 0x0, 0x6, 0x9, 0xadb, 0x4, 0x1f, 0x35, 0x6, 0x800, r12, r13, 0x20, 0x3}}, {0x4, 0x3e, 0x6, 0x6, 'cgroup'}}, {{0x5, 0x1, 0x4, 0x7, 0x0, 0x7, {0x4, 0x3ff, 0x1ff, 0x5f70, 0x80000001, 0x2, 0x0, 0x200, 0x4, 0x3bf4, 0x4, r14, r15, 0x53a, 0x7}}, {0x3, 0x80000000, 0x0, 0x89}}, {{0x2, 0x2, 0x81, 0x7f, 0x3, 0x4, {0x0, 0x3, 0x3, 0x85f0, 0x200, 0x2, 0x1, 0xb5c7, 0x2, 0x1, 0xffff, r16, r17, 0x6, 0x4}}, {0x0, 0x6a4, 0x5, 0x9, '*lo[-'}}, {{0x5, 0x2, 0x100000000, 0x20, 0x3, 0x0, {0x4, 0x80000, 0x4, 0x503, 0x37, 0x80, 0x2, 0x0, 0x9, 0x2, 0x1c, r18, r19, 0x7, 0x5}}, {0x6, 0x7, 0x11, 0x8, 'vboxnet1[vboxnet1'}}]}, 0x510) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000001200)={{0x2, 0x4e24, @broadcast}, {0x307}, 0x2, {0x2, 0x4e20, @rand_addr=0xffffffffffffeaac}, 'gretap0\x00'}) dup3(r0, r1, 0x0) 06:29:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000240)={0x7, 0x200000000000, 0xffffffffffffe503, @empty, 'veth0_to_team\x00'}) r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000200)=[{0x10, 0x29, 0x3}], 0x10}, 0x0) 06:29:32 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x20100, 0xf87e683139b34504) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc400, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)={0x41, 0x7d, 0x1, {0x0, 0x3a, 0x200, 0x2, {0x11, 0x3, 0x7}, 0x40000, 0xbd, 0x81, 0xffffffffffffffe1, 0x1, '*', 0x0, '', 0x5, 'nodev', 0x1, '{'}}, 0x41) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000100)=""/128) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000180)) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x6, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000240)={0x5880, 0x7, 0x5, 0x3, 0x6}, 0x14) ioctl$KDSETLED(r0, 0x4b32, 0x3f) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000002c0)={0x7, &(0x7f0000000280)=[{}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000380)={r2, &(0x7f0000000300)=""/98}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000003c0)={0x4a6, 0x0, 0x2, 0x0, 0x0, [], [], [], 0x7f, 0x9}) fsetxattr$security_selinux(r1, &(0x7f0000000500)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:insmod_exec_t:s0\x00', 0x23, 0x2) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000580)={0x0, 0xffffffffffffff9c}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000005c0)="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") sendfile(r1, r1, &(0x7f00000015c0), 0x1) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000001600)) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000001640)={0x1, 0x0, {0x3b, 0x13, 0x2, 0xd, 0x9, 0x9500, 0x1, 0x60, 0xffffffffffffffff}}) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000001680)={0x3, 'ip6_vti0\x00'}, 0x18) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f00000016c0)={0x7, {0x8, 0xfffffffffffffff9, 0x3, 0x9}, {0x40, 0x4, 0x3e, 0x3e}, {0x7f, 0x80}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001700)={r0, r0, 0x7, 0x3}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000001740)={0x0, 0x201, 0x4, 0x3f, 0x0}, &(0x7f0000001780)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000017c0)=@assoc_value={0x0, 0x80000001}, &(0x7f0000001800)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001840)={r3, 0x8, 0xfffffffffffffffd, 0xf3db, 0x1, 0x40, 0x7, 0xd9, {r4, @in={{0x2, 0x4e23}}, 0x3, 0x0, 0x80000000, 0x100000000, 0x9}}, &(0x7f0000001900)=0xb0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x10050, r0, 0x0) r6 = getpid() ptrace$cont(0x1f, r6, 0xd4a, 0x2d7800000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000001940)={0x800100f, 0x1, 0x2}) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001980)={r5, 0x2}, 0x8) 06:29:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200040, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0x100, 0x3ff, 0x3, 0x7}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x0, 0xf002, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x54, 0x7, 0x1, {0x4b, '/bdev&mime_type\x88vmnet0ppp1%posix_acl_access-$ppp0cpusetselfcpuset\xd7keyring&{'}}, 0x54) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0xd4, 0x20400) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000180)=0x1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r2, 0x24, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x91}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r0, &(0x7f00000003c0)="941f14206dbfe6a9eab4e0ccc54e4a455c3eb9ffc69bc94c04d32c2b8d7ccf063668f33827919dc0387bc89a29f5364dbfa5fdb04504b2321e4234a001f17546899a2f9248cc9bf28b30503b87ee600a6882d2178bd4155d3c4c719e99fc24d70c166e055efdc94246a8d38acd01fbcc081e8b08e85807aa9c613c6011dddeedc2a2a8a2554d13680330655426a5c568d41a1ff37c4094b350d67d99d092bdc6468fe07e074ad2451e92ed356239bbf8ed81a1edb7", &(0x7f0000000480)=""/254}, 0x18) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000005c0)={0x0, @bt={0x8, 0x6, 0x0, 0x1, 0x9, 0xfffffffffffffffd, 0x20, 0x100, 0x0, 0x2, 0x0, 0x1, 0x3, 0x6, 0x1d}}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000680)={'bridge_slave_0\x00', 0x5}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000700)="99a4047971519448be53481c5f0440ec", 0x10) sched_setscheduler(r3, 0x7, &(0x7f0000000740)=0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000800)={0x0, 0x7c, &(0x7f0000000780)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e22, 0x100, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x1}]}, &(0x7f0000000840)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000880)={r4, 0x7fff, 0x30, 0x10000, 0x5}, &(0x7f00000008c0)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000900)={r4, 0x4}, &(0x7f0000000940)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000980)={0xa, 0x3, 0x6e, 0xe97, 'syz0\x00', 0x5}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000a00)={0xf, 0x65, 0x8}) socket$inet(0x2, 0x3, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) r7 = getgid() lchown(&(0x7f0000000a40)='./file0\x00', r6, r7) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000bc0)={0x80000000, {{0xa, 0x4e24, 0x0, @local, 0x4}}}, 0x88) 06:29:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) close(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000040)=0x1, 0x38c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080)=0x1, 0x4) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000004100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8700}, 0xc, &(0x7f00000040c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400840f0000"], 0x1}}, 0x4040000) sendmmsg(r0, &(0x7f000000b0c0)=[{{&(0x7f0000000600)=@pptp={0x18, 0x2, {0x0, @rand_addr=0x4}}, 0x48, &(0x7f0000001800), 0x1}, 0x8000000401}, {{0x0, 0x0, &(0x7f0000000000), 0x1}, 0x2835}, {{0x0, 0x0, 0x0}}], 0x2bd, 0x4004010) [ 274.476095] ptrace attach of "/root/syz-executor3"[7593] was attempted by "/root/syz-executor3"[7594] 06:29:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 06:29:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ftruncate(r1, 0x6) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) 06:29:32 executing program 3: 06:29:33 executing program 1: 06:29:33 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) close(r0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x2ed) socket$unix(0x1, 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x0, 0x200, 0x0, 0x400}, 0x10) 06:29:33 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_create(0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$unix(0x1, 0x0, 0x0) semget$private(0x0, 0x0, 0x240) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) listen(r1, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) pipe(0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000040)) socket$unix(0x1, 0x0, 0x0) 06:29:33 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x135}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 06:29:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x15, 0x0, 0x0, "5ffd1300527e8bbea368522c02e04ee8"}, 0x15, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r2, &(0x7f0000007080)=[{&(0x7f0000000140)=@in6={0xa, 0x0, 0x4, @remote}, 0x1c, &(0x7f0000000540)}], 0x342, 0x0) [ 275.314673] ptrace attach of "/root/syz-executor3"[7638] was attempted by "/root/syz-executor3"[7639] 06:29:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x18, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) [ 275.460595] IPVS: ftp: loaded support on port[0] = 21 [ 275.586726] IPVS: ftp: loaded support on port[0] = 21 [ 276.948692] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.955347] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.963527] device bridge_slave_0 entered promiscuous mode [ 277.043315] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.049851] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.058170] device bridge_slave_1 entered promiscuous mode [ 277.071263] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.077847] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.086217] device bridge_slave_0 entered promiscuous mode [ 277.137333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 277.168849] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.175455] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.183964] device bridge_slave_1 entered promiscuous mode [ 277.212765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 277.263687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 277.344421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 277.452157] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 277.536007] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 277.590858] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 277.674803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 277.692273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 277.699298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.755919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 277.762980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.844055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 277.851091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.950255] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 277.958855] team0: Port device team_slave_0 added [ 278.037262] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 278.045869] team0: Port device team_slave_1 added [ 278.100286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 278.108845] team0: Port device team_slave_0 added [ 278.128252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.188196] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 278.196896] team0: Port device team_slave_1 added [ 278.218233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.277476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.302179] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.309757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.318840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.367287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.402312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 278.409880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.419055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.449683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.457367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.466678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.549700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 278.557357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.566488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.355148] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.361760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.368874] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.375484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.384701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.552850] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.559491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.566806] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.573514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.582816] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.631825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.639782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.712008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.900172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.016932] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.202110] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.317166] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 283.323534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.331662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.500752] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 283.507210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.515171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.638492] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.826904] 8021q: adding VLAN 0 to HW filter on device team0 06:29:43 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) wait4(0x0, 0x0, 0x40000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') r0 = gettid() futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x2f) setrlimit(0x0, 0x0) 06:29:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x7, 0x20000000008, 0x3}, 0x2c8) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) 06:29:43 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000200)={{0x77359400}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, 0x0) read(r0, &(0x7f0000000040)=""/244, 0xf4) 06:29:43 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_create(0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) pipe(0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 06:29:43 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000340)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000100)={0xf}) 06:29:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 285.763943] QAT: Invalid ioctl [ 285.768020] QAT: Invalid ioctl [ 285.772372] QAT: Invalid ioctl [ 285.779574] QAT: Invalid ioctl [ 285.783876] QAT: Invalid ioctl [ 285.787830] QAT: Invalid ioctl 06:29:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000580)=ANY=[@ANYPTR], 0x8) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x20000030}], 0x1}}], 0x1, 0x0, 0x0) 06:29:44 executing program 0: 06:29:44 executing program 3: 06:29:44 executing program 1: 06:29:44 executing program 0: 06:29:44 executing program 3: 06:29:44 executing program 4: 06:29:44 executing program 1: 06:29:44 executing program 3: 06:29:44 executing program 0: 06:29:44 executing program 2: 06:29:44 executing program 5: 06:29:44 executing program 1: 06:29:44 executing program 0: 06:29:44 executing program 3: 06:29:45 executing program 2: 06:29:45 executing program 5: 06:29:45 executing program 4: 06:29:45 executing program 0: 06:29:45 executing program 1: 06:29:45 executing program 5: 06:29:45 executing program 3: 06:29:45 executing program 4: 06:29:45 executing program 2: 06:29:45 executing program 0: 06:29:45 executing program 1: 06:29:45 executing program 3: 06:29:45 executing program 2: 06:29:45 executing program 4: 06:29:45 executing program 5: 06:29:45 executing program 1: 06:29:45 executing program 2: 06:29:45 executing program 3: 06:29:45 executing program 0: 06:29:45 executing program 2: 06:29:45 executing program 5: 06:29:46 executing program 4: 06:29:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf2000000000000045000000080000003d0301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], 0x0}, 0x48) 06:29:46 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000200)={0x0, 0x0, 0x0, {0x77359400}}) 06:29:46 executing program 3: r0 = inotify_init1(0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) dup2(r1, r0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000980)={0x0, @multicast2, 0x0, 0x0, 'wrr\x00'}, 0x2c) 06:29:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') sendfile(r0, r0, 0x0, 0x20) 06:29:46 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) close(r0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x2ed) socket$unix(0x1, 0x1, 0x0) keyctl$session_to_parent(0x12) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000040)={{0x3c, @remote, 0x0, 0x0, 'nq\x00', 0x4, 0x9}, {@loopback, 0x0, 0x2007, 0x9}}, 0x44) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) openat$ptmx(0xffffffffffffff9c, 0x0, 0x121800, 0x0) 06:29:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYPTR, @ANYPTR64], 0x10) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x20000030}], 0x1}}], 0x1, 0x0, 0x0) 06:29:46 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYPTR], 0x8) 06:29:46 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000200)={0x0, 0x2, 0x0, {0x77359400}}) 06:29:46 executing program 3: r0 = socket(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), 0x0}}], 0x58}, 0x0) 06:29:46 executing program 5: r0 = inotify_init1(0x0) fadvise64(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) dup2(r2, r0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgroups(0xfffffffffffffee4, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) fstat(r1, 0x0) writev(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 06:29:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200400, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0x0, 0x2, 0x7fffffff, 0x40, 0x3, 0x8000}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x4e1d, @local}}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006100)='memory.current\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000006140)=""/178) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) recvmmsg(r2, &(0x7f0000005f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001980)=""/165, 0xa5}, {&(0x7f0000001a40)=""/230, 0xe6}, {&(0x7f0000001b40)=""/189, 0xbd}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/132, 0x84}, {&(0x7f0000001cc0)=""/210, 0xd2}, {&(0x7f0000001dc0)=""/238, 0xee}, {&(0x7f0000001ec0)=""/185, 0xb9}, {&(0x7f0000001f80)=""/139, 0x8b}], 0xa}, 0xffffffffffff639f}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000002100)=""/218, 0xda}, {&(0x7f0000002200)=""/237, 0xed}, {&(0x7f0000003340)=""/97, 0x61}, {&(0x7f00000033c0)=""/251, 0xfb}, {&(0x7f00000034c0)=""/206, 0xce}, {&(0x7f00000035c0)=""/107, 0x6b}, {&(0x7f0000003640)=""/83, 0x53}], 0x7}, 0x5}, {{&(0x7f0000003740)=@un=@abs, 0x80, &(0x7f0000000880)=[{&(0x7f00000037c0)=""/128, 0x80}, {&(0x7f0000003840)=""/181, 0xb5}], 0x2, &(0x7f0000003900)=""/79, 0x4f}, 0x20}, {{&(0x7f0000003980)=@l2, 0x80, &(0x7f0000005e00)=[{&(0x7f0000003a00)=""/100, 0x64}, {&(0x7f0000005ac0)=""/94, 0x5e}, {&(0x7f0000005b40)=""/143, 0x8f}, {&(0x7f0000003a80)=""/36, 0x24}, {&(0x7f0000005c00)=""/221, 0xdd}, {&(0x7f0000005d00)=""/235, 0xeb}], 0x6, &(0x7f0000005e80)=""/173, 0xad}, 0x6}], 0x5, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x10a) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 06:29:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b559062040b86bc01abc8464d4f8a906151", 0x20) 06:29:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) clock_gettime(0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 06:29:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) 06:29:46 executing program 5: request_key(&(0x7f0000000800)='dns_resolver\x00', &(0x7f0000000140)={'sy.', 0xffffffffffffffff, 0x5}, 0x0, 0x0) 06:29:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x85ffffff, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 06:29:47 executing program 5: pipe(&(0x7f0000000040)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0xdb45aa1) fcntl$setpipe(r0, 0x407, 0x0) 06:29:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x28021) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) lstat(0x0, 0x0) 06:29:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) 06:29:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x5, 0x0, [], [{0x0, 0x8, 0x80000001, 0x3, 0x7, 0x8}, {0x5, 0x7fffffff, 0xba74000000000000, 0x6, 0x1, 0xfffffffffffffffb}], [[], [], [], [], []]}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) [ 289.484450] current->kmsan.in_runtime: -1, last_caller: (null) [ 289.491905] ------------[ cut here ]------------ [ 289.496689] kernel BUG at mm/kmsan/kmsan_instr.c:267! [ 289.501937] invalid opcode: 0000 [#1] SMP [ 289.506122] CPU: 0 PID: 8368 Comm: cryptomgr_probe Not tainted 4.20.0-rc7+ #12 [ 289.513502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.522900] RIP: 0010:__msan_poison_alloca+0x29c/0x2a0 [ 289.528197] Code: 0b e8 e8 ee 7b ff 85 c0 75 20 48 8b 44 24 08 8b b0 88 09 00 00 48 8b 90 80 09 00 00 48 c7 c7 4e 72 5f 8b 31 c0 e8 f4 1b 7c ff <0f> 0b 66 90 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 18 65 48 8b [ 289.547117] RSP: 0018:ffff88812b80fd10 EFLAGS: 00010046 [ 289.552503] RAX: 000000000000003c RBX: ffff88816127bc00 RCX: 7f4530002fe1f300 [ 289.559790] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88821fc36abc [ 289.567207] RBP: ffff88812b80fdb0 R08: 0000000000000000 R09: ffff88821fc38f10 [ 289.574508] R10: 0000000000000000 R11: ffffffff861d8220 R12: ffff88812b80fdcf [ 289.581806] R13: 0000000000000046 R14: 0000000000000001 R15: ffffffff8baa19c0 [ 289.589133] FS: 0000000000000000(0000) GS:ffff88821fc00000(0000) knlGS:0000000000000000 [ 289.597373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 289.603287] CR2: 0000000000000000 CR3: 000000012dba0000 CR4: 00000000001406f0 [ 289.610580] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 289.618007] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 289.625287] Call Trace: [ 289.627915] ? rcu_note_context_switch+0x3b/0x520 [ 289.632798] ? __schedule+0x7c/0x830 [ 289.636551] rcu_note_context_switch+0x3b/0x520 [ 289.641245] ? schedule_debug+0xd6/0x240 [ 289.645325] __schedule+0x7c/0x830 [ 289.648895] schedule+0x1ab/0x2b0 [ 289.652367] kthread+0x3cb/0x4e0 [ 289.655768] ? cryptomgr_notify+0x1190/0x1190 [ 289.660271] ? schedule_tail+0x1b2/0x410 [ 289.664351] ? kthread_blkcg+0xf0/0xf0 [ 289.668254] ret_from_fork+0x35/0x40 [ 289.671996] Modules linked in: [ 289.675208] ---[ end trace eece8bb62faf7e49 ]--- [ 289.679988] RIP: 0010:__msan_poison_alloca+0x29c/0x2a0 [ 289.685271] Code: 0b e8 e8 ee 7b ff 85 c0 75 20 48 8b 44 24 08 8b b0 88 09 00 00 48 8b 90 80 09 00 00 48 c7 c7 4e 72 5f 8b 31 c0 e8 f4 1b 7c ff <0f> 0b 66 90 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 18 65 48 8b [ 289.704177] RSP: 0018:ffff88812b80fd10 EFLAGS: 00010046 [ 289.709548] RAX: 000000000000003c RBX: ffff88816127bc00 RCX: 7f4530002fe1f300 [ 289.716839] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88821fc36abc [ 289.724118] RBP: ffff88812b80fdb0 R08: 0000000000000000 R09: ffff88821fc38f10 [ 289.731395] R10: 0000000000000000 R11: ffffffff861d8220 R12: ffff88812b80fdcf [ 289.738671] R13: 0000000000000046 R14: 0000000000000001 R15: ffffffff8baa19c0 [ 289.745951] FS: 0000000000000000(0000) GS:ffff88821fc00000(0000) knlGS:0000000000000000 [ 289.754205] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 289.760093] CR2: 0000000000000000 CR3: 000000012dba0000 CR4: 00000000001406f0 [ 289.767371] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 289.774653] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 289.781939] Kernel panic - not syncing: Fatal exception [ 289.788325] Kernel Offset: disabled [ 289.791954] Rebooting in 86400 seconds..