Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. 2018/11/11 14:05:55 fuzzer started 2018/11/11 14:06:00 dialing manager at 10.128.0.26:36043 2018/11/11 14:06:00 syscalls: 1 2018/11/11 14:06:00 code coverage: enabled 2018/11/11 14:06:00 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/11 14:06:00 setuid sandbox: enabled 2018/11/11 14:06:00 namespace sandbox: enabled 2018/11/11 14:06:00 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/11 14:06:00 fault injection: enabled 2018/11/11 14:06:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/11 14:06:00 net packed injection: enabled 2018/11/11 14:06:00 net device setup: enabled 14:08:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x40000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x12, &(0x7f00000000c0), 0x4) syzkaller login: [ 215.968013] IPVS: ftp: loaded support on port[0] = 21 [ 218.162064] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.168519] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.177329] device bridge_slave_0 entered promiscuous mode [ 218.302473] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.308928] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.317467] device bridge_slave_1 entered promiscuous mode [ 218.440270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.562425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.941024] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.069154] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:08:23 executing program 1: mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x2d00de79571421bb, 0xffffffffffffffff, 0x0) [ 219.910018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.918083] team0: Port device team_slave_0 added [ 219.937418] IPVS: ftp: loaded support on port[0] = 21 [ 220.043360] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.051252] team0: Port device team_slave_1 added [ 220.274890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.285897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.294894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.485008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.652379] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.659948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.669125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.844716] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.852356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.861336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.086393] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.092926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.099822] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.106399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.114965] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.232397] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.238867] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.247389] device bridge_slave_0 entered promiscuous mode [ 223.301882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.372149] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.378622] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.387108] device bridge_slave_1 entered promiscuous mode [ 223.571956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.723004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.259717] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.462988] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.646896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.654150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.895990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.903278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:08:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140)=0x400, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) getpeername(r0, &(0x7f0000000540)=@un=@abs, &(0x7f00000005c0)=0x80) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffff62, 0x4040, &(0x7f0000000000)={0xc, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) [ 225.548754] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.556972] team0: Port device team_slave_0 added [ 225.903259] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.911237] team0: Port device team_slave_1 added [ 226.057055] IPVS: ftp: loaded support on port[0] = 21 [ 226.147644] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.154894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.163942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.416701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.423947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.432840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.721883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.729487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.738463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.918397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.926264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.935348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.878414] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.884982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.891974] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.898429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.907122] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.222484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.543385] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.549850] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.558611] device bridge_slave_0 entered promiscuous mode [ 230.850692] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.857436] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.865941] device bridge_slave_1 entered promiscuous mode [ 231.067706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.333170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.024025] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.330830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.516699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 232.523855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.776200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.783476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.381275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.537706] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.545762] team0: Port device team_slave_0 added 14:08:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="a48d43fe199de6155cd6000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x850}], 0x1, &(0x7f00000004c0)}, 0x0) recvmsg(r1, &(0x7f0000000580)={&(0x7f00000007c0)=@ax25, 0x44, &(0x7f0000000480)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000500)=""/99, 0x63}, 0x0) [ 233.873411] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.881432] team0: Port device team_slave_1 added [ 234.189434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.196629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.205373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.547477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.554763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.563666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.659007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.736415] IPVS: ftp: loaded support on port[0] = 21 [ 234.864452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.872198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.881081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.215260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.223085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.232008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.840986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.847469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.855474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.024281] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.098723] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.105296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.112315] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.118761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.127330] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.591903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.303324] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.309800] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.318310] device bridge_slave_0 entered promiscuous mode [ 240.629170] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.635756] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.644260] device bridge_slave_1 entered promiscuous mode [ 240.987345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.214701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.314121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 242.182154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.423059] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.475397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.777656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 242.784907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.163583] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 243.170682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:08:47 executing program 4: creat(&(0x7f0000000440)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) [ 243.577413] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.583977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.592032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.068463] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.076659] team0: Port device team_slave_0 added [ 244.523308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.531280] team0: Port device team_slave_1 added 14:08:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 244.917227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 244.924464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.933225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.976296] IPVS: ftp: loaded support on port[0] = 21 14:08:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 245.070264] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.354166] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.361291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.370044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 14:08:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 245.730985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.738745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.747717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 14:08:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 246.185293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.193067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.202112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:08:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:08:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:08:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:08:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d40030000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 247.816824] ip (7217) used greatest stack depth: 53456 bytes left [ 250.545856] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.552425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.559339] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.565964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.574344] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.056803] ip (7301) used greatest stack depth: 53072 bytes left [ 251.101347] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.107913] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.116756] device bridge_slave_0 entered promiscuous mode [ 251.462607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.480255] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.486905] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.495500] device bridge_slave_1 entered promiscuous mode [ 251.806037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.123323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.035094] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.487523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.750881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.811804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.818882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.132022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.139121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.839358] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.847561] team0: Port device team_slave_0 added 14:08:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) unlink(&(0x7f0000000200)='./file0\x00') [ 255.059519] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.132054] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.140017] team0: Port device team_slave_1 added [ 255.455667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.464775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.473530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.698360] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.705640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.714431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.774133] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.780539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.788700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.913405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.921047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.930044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.159838] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.169115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.177970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.557100] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.499758] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.506364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.513385] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.519832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.528261] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.535086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.554962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.190955] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:09:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140)=0x400, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) getpeername(r0, &(0x7f0000000540)=@un=@abs, &(0x7f00000005c0)=0x80) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffff62, 0x4040, &(0x7f0000000000)={0xc, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) [ 261.933319] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.939731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.947646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.443441] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.873890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.360910] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:09:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7709, &(0x7f0000000040)=""/63) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x2, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 265.838211] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.844569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.852302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.136292] 8021q: adding VLAN 0 to HW filter on device team0 14:09:12 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000003c0)=""/177, 0xb1) 14:09:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:12 executing program 5: mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='reiserfs\x00', 0x2020, &(0x7f00000000c0)='*\x00') r0 = memfd_create(&(0x7f0000000100)='%#*.\x00', 0x4) recvmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000140)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/124, 0x7c}, {&(0x7f0000000240)=""/24, 0x18}, {&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)=""/12, 0xc}, {&(0x7f0000000340)=""/33, 0x21}], 0x5, &(0x7f0000000400)=""/97, 0x61, 0x20}, 0x1) mkdir(&(0x7f00000004c0)='./file0\x00', 0x16) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000580)={r1, 0x6}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000600)={r1, @in={{0x2, 0x4e20, @remote}}}, 0x84) clock_gettime(0x0, &(0x7f0000004400)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/72, 0x48}, {&(0x7f0000001740)=""/14, 0xe}, {&(0x7f0000001780)=""/249, 0xf9}, {&(0x7f0000001880)=""/40, 0x28}, {&(0x7f00000018c0)=""/225, 0xe1}, {&(0x7f00000019c0)=""/65, 0x41}, {&(0x7f0000001a40)=""/164, 0xa4}, {&(0x7f0000001b00)=""/102, 0x66}, {&(0x7f0000001b80)=""/184, 0xb8}], 0xa, &(0x7f0000001d00)=""/91, 0x5b, 0x7}, 0xffe8}, {{&(0x7f0000001d80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/32, 0x20}, {&(0x7f0000001f00)=""/128, 0x80}], 0x3, 0x0, 0x0, 0xff}, 0x7}, {{0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/154, 0x9a}], 0x1, &(0x7f00000020c0)=""/197, 0xc5, 0x8}, 0x7ca1a2e3}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000021c0)=""/184, 0xb8}, {&(0x7f0000002280)=""/238, 0xee}, {&(0x7f0000002380)=""/94, 0x5e}, {&(0x7f0000002400)=""/16, 0x10}, {&(0x7f0000002440)=""/200, 0xc8}, {&(0x7f0000002540)=""/181, 0xb5}, {&(0x7f0000002600)=""/130, 0x82}], 0x7, &(0x7f0000002740)=""/25, 0x19, 0xbe7}, 0x13c2569b}, {{&(0x7f0000002780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002800)=""/213, 0xd5}, {&(0x7f0000002900)=""/32, 0x20}, {&(0x7f0000002940)=""/101, 0x65}, {&(0x7f00000029c0)=""/30, 0x1e}, {&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/132, 0x84}, {&(0x7f0000002b00)=""/15, 0xf}, {&(0x7f0000002b40)=""/117, 0x75}], 0x8, &(0x7f0000002c40)=""/67, 0x43, 0x100000001}, 0xfffffffffffffff7}, {{&(0x7f0000002cc0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002d40)=""/128, 0x80}, {&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/139, 0x8b}, {&(0x7f0000003e80)=""/203, 0xcb}], 0x4, &(0x7f0000003fc0)=""/170, 0xaa, 0x4}, 0x3}, {{&(0x7f0000004080)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000004200)=[{&(0x7f0000004100)=""/210, 0xd2}], 0x1, 0x0, 0x0, 0x5}, 0x21a}], 0x7, 0x40002001, &(0x7f0000004440)={r3, r4+30000000}) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000004480)) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000044c0)=0x1) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000004500), &(0x7f0000004540)=0xb) getsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000004580), &(0x7f00000045c0)=0x10) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000004600)="44bf04a9447ff1462afc3e73a156f5af7fb23984558b79574228cc3e0adfacaf4518ea185603a3c75a830b020d3528e3d8dd3299d3ac5bed0a5930254e9532e961050e5b35a344ecc5cbc4e47adc9dbd5e6de9f44f9bb3b56e18807801278c3c0d2221fde07149ac54871293e509d70d1f8f7653642f8f748b6eca081d71e3f1bc7a63f912b580489cf8f1381c85a799c02821fce3874335395661c2e7dbe7f7327a690027d0b44923e9cbdd170c60522b5f657939ea996af044c1fe14c2fc376531e8b505a655f12518f06bac47044f8c5b58da401c") r7 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004700)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004800)=0xe8) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000004840)={r8, 0x1, 0x6}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000004900)=@nat={'nat\x00', 0x1b, 0x5, 0x4b8, 0x230, 0x230, 0x0, 0x0, 0x0, 0x420, 0x420, 0x420, 0x420, 0x420, 0x5, &(0x7f0000004880), {[{{@ip={@empty, @broadcast, 0xffffffff, 0x0, 'team0\x00', 'veth0_to_team\x00', {0xff}, {0xff}, 0x89, 0x3, 0x29}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x10, @multicast2, @rand_addr=0x7, @port=0x4e23, @port=0x4e20}}}}, {{@ip={@multicast1, @rand_addr=0x1, 0xff000000, 0xffffffff, 'dummy0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x8, 0x2, 0x4}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3f, 0x8000, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x9, 0x8, 0x2, 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0xc, @ipv6=@local, @ipv4=@remote, @gre_key=0x2, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xb8, 0xf0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @broadcast, @loopback, @port=0x4e21, @port=0x4e22}}}}, {{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x40, 0xc0, 0x0, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr=0x4, @rand_addr=0xc79b, @gre_key=0xfffffffffffff800, @gre_key=0x9}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x518) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000004e40)) sync_file_range(r6, 0xfffffffffffffffd, 0xe, 0x1) r9 = eventfd2(0x100000000, 0x1) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000004e80)={r2, 0x8}, &(0x7f0000004ec0)=0x8) syncfs(r9) r10 = getpid() stat(&(0x7f0000004f00)='./file0\x00', &(0x7f0000004f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000004fc0)={r10, r7, r11}, 0xc) r12 = dup2(r0, r6) write$P9_RAUTH(r12, &(0x7f0000005000)={0x14, 0x67, 0x1, {0x12, 0x2, 0x3}}, 0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000005040)={0xff, 0x0, 0x10b9}) 14:09:12 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') process_vm_readv(r1, &(0x7f0000000200)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x10000000000000fc, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0xfffffe08}], 0x1, 0x0) 14:09:12 executing program 1: r0 = socket(0x11, 0x2, 0x0) getsockname$packet(r0, &(0x7f00000036c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003700)=0x14) 14:09:12 executing program 3: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) [ 268.122300] hrtimer: interrupt took 111917 ns 14:09:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000001c0)={0x0, @aes256, 0x0, "9c83221ccaea1f4e"}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) write$binfmt_aout(r1, &(0x7f0000000740)={{0x108, 0x2, 0x81, 0x0, 0x37a, 0x0, 0x2e8, 0x4}, "75229e6677f9c069dd563679933991b1a381b35e5fff8be9993ac6b501989bef8a03d60bfae87a0bac4cd4dfbd3e1486f3c043905f8c259d115fec872b5ccd86dd4f2a3c8a9e67a14a64baeeba8cf8f376ad7e2717b3336d854ad52690361c69d0a81e8c6181625c14307e6429c1d8f62fb767fbde40fd127e4c17df9b5e4f8f5628c9fa46c98b2bb559b5114145bea7814fce0f865592d62e076e731a9184cd38fe5f9b039b9cf6ad61a9f1fc866d93e9e919e4ceae26ecadf8ea524407f27640005c1fb77c8ac5cc5bfe8200b4db955c96287a35554f7918bc5b029666c4ad5496813c", [[], [], [], [], [], []]}, 0x704) sendfile(r4, r5, 0x0, 0xa5cc54d) ftruncate(r3, 0x18203) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 268.319400] ptrace attach of "/root/syz-executor2"[6666] was attempted by "/root/syz-executor2"[7821] 14:09:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b700"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:12 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100040031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x65, 0x1, &(0x7f0000000040)=""/244, &(0x7f0000000140)=0xf4) [ 268.949209] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.956388] bridge0: port 1(bridge_slave_0) entered disabled state 14:09:13 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)) 14:09:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 269.079062] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.086209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.093294] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.099792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.107615] device bridge0 entered promiscuous mode [ 269.113836] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:09:13 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000540)={@link_local, @random="27f2005c0cd6", [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x4, 0x0, @local, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0xffffca88}}}}}}}, &(0x7f0000000080)) 14:09:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000003c0)="d3", 0x1}], 0x1, &(0x7f0000000480)}, 0x0) sendmsg$kcm(r0, &(0x7f0000010c00)={&(0x7f000000f600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000010a40), 0x0, &(0x7f0000010ac0)}, 0x20040000) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000200)=@nl=@unspec, 0x80, &(0x7f00000002c0)}, 0x0) 14:09:13 executing program 3: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) [ 269.924636] IPVS: ftp: loaded support on port[0] = 21 [ 270.518989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.499516] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.506037] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.514096] device bridge_slave_0 entered promiscuous mode [ 271.590710] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.597153] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.605261] device bridge_slave_1 entered promiscuous mode [ 271.680038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 271.754634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.980229] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 272.059281] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 272.424442] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 272.432283] team0: Port device team_slave_0 added [ 272.509502] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 272.517344] team0: Port device team_slave_1 added [ 272.592757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 272.599759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.608613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.678167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 272.685650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.694484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.770939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 272.778608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.787549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.857939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.865294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.874412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.710252] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.716742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.724968] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.732810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.741078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 274.663642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.771970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.054426] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.335857] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 277.342212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.349890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.630942] 8021q: adding VLAN 0 to HW filter on device team0 14:09:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:09:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:23 executing program 4: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 14:09:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x0) 14:09:23 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000540)={@link_local, @random="27f2005c0cd6", [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x33, 0x0, @local, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0xffffca88}}}}}}}, &(0x7f0000000080)) 14:09:23 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) truncate(&(0x7f00000000c0)='./bus\x00', 0xf45) 14:09:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006504000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b70000000000000095000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:24 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x2002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000500)={'#! ', './file0', [], 0xa, "81a2b2221a3a8ef6d3c082f9794bb364cd8012eaf6ae79bca13e32bfebec07e6e275631aa49a0e88cc1b1451e94c4d8e1ce4f7726eec99ed58c2e49f5d7c667c495e730f00e17a"}, 0x52) [ 280.440969] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.448183] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.458401] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.464951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.471957] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.478508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.485660] device bridge0 entered promiscuous mode 14:09:24 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x223) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'teql0\x00', &(0x7f0000000280)=@ethtool_coalesce={0x0, 0x0, 0x40, 0x0, 0x7, 0x9, 0x6, 0x20, 0x0, 0x1000, 0x5, 0x0, 0x9, 0x8, 0x7ff, 0x0, 0x10001, 0x0, 0x3, 0x8e, 0x0, 0x5, 0x9}}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000240)) 14:09:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) 14:09:24 executing program 4: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 14:09:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff16}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 14:09:24 executing program 3: 14:09:24 executing program 1: 14:09:25 executing program 0: 14:09:25 executing program 2: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x4, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:09:25 executing program 3: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c22639", 0x16) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 14:09:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00003f040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:25 executing program 1: [ 281.413969] ptrace attach of "/root/syz-executor2"[8195] was attempted by "/root/syz-executor2"[8196] 14:09:25 executing program 2: [ 281.481925] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.488719] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.495587] device bridge0 left promiscuous mode 14:09:25 executing program 4: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 14:09:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff16}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 14:09:25 executing program 1: 14:09:26 executing program 2: 14:09:26 executing program 0: 14:09:26 executing program 5: 14:09:26 executing program 1: 14:09:26 executing program 3: 14:09:26 executing program 2: 14:09:26 executing program 4: 14:09:26 executing program 0: 14:09:26 executing program 5: 14:09:26 executing program 1: 14:09:26 executing program 3: 14:09:27 executing program 2: 14:09:27 executing program 4: 14:09:27 executing program 0: 14:09:27 executing program 1: 14:09:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000000)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 14:09:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x0) 14:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x80) 14:09:27 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0xd, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="07630440040000000463044004"], 0x0, 0x0, &(0x7f0000000680)}) 14:09:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000440)="6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e05928fe70f88aca27b419ed7c2e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c2980", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) 14:09:27 executing program 0: creat(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x8000010002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) 14:09:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x8, 0x0) [ 283.628315] binder: 8260:8262 DecRefs 0 refcount change on invalid ref 4 ret -22 [ 283.636360] binder: 8260:8262 IncRefs 0 refcount change on invalid ref 4 ret -22 14:09:27 executing program 5: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c22639", 0x16) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 14:09:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipmr_getroute={0x1c, 0x1a, 0x90b}, 0x1c}}, 0x0) 14:09:27 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) 14:09:28 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x800000000000298, &(0x7f00000000c0)=[{}, {}], &(0x7f00000001c0)={0x4000000000001, 0x7}) r1 = memfd_create(&(0x7f0000000240)="3a2b6c6f230060766fdc2e0738dd41c97e2706edd6b4b2218216a1c508f7f35f9d795cb6e36202dc87ae64a8d02058d8ff1909655030e13f3607b1a7dd209444fed0167fc2ce93f869", 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)}]) 14:09:28 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100040031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x65, 0x3, &(0x7f0000000040)=""/244, &(0x7f0000000000)=0x125) 14:09:28 executing program 0: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c22639", 0x16) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900), 0x84000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) [ 284.751256] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.758459] bridge0: port 1(bridge_slave_0) entered disabled state 14:09:29 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000003c0)=""/177, 0xb1) 14:09:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) 14:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffefefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) 14:09:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000380)='./control\x00', 0x1) [ 286.320838] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.327873] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.377376] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.384007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.390916] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.397507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.404607] device bridge0 entered promiscuous mode [ 286.410900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:09:30 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$void(r0, 0xc0045878) [ 286.472375] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 286.523741] kauditd_printk_skb: 3 callbacks suppressed [ 286.523778] audit: type=1326 audit(1541945370.570:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8319 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 14:09:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="021000000a00000000040000000008000800120000004000000061e64dd73b1594cb849af3b40602a9ac31b700001f00050000fc0040005fffffffff0020000000000000004002002000000000000000"], 0x50}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x135fff6b04591e, 0x0) [ 287.432966] audit: type=1326 audit(1541945371.440:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8319 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 14:09:31 executing program 4: r0 = socket$inet6(0xa, 0x800, 0x2) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) pipe(&(0x7f0000000180)) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'veth1_to_bond\x00', {0x2, 0x0, @rand_addr}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f00000000c0)) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="2970571c5deb8ecb676090adf7958b82", 0xaa) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000340)={0x0, &(0x7f0000000300)}, 0x10) sendto$inet6(r1, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, &(0x7f0000000240)=@hci, &(0x7f00000003c0)=0x3adfa42adf0c50e0, 0x0) 14:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffefefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) [ 287.991462] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 288.514741] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.521460] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.528276] device bridge0 left promiscuous mode 14:09:32 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000003580), 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0200013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 14:09:32 executing program 5: socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002e40)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000100)=""/11, 0xb}, {&(0x7f0000000480)=""/217, 0xd9}], 0x5, &(0x7f0000000600), 0x0, 0x400}, 0x5}, {{&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000900)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/113, 0x71}, {&(0x7f0000000740)=""/113, 0x71}, {&(0x7f00000007c0)=""/9, 0x9}, {&(0x7f0000000800)}, {&(0x7f0000000840)=""/138, 0x8a}], 0x6, &(0x7f0000000980)=""/180, 0xb4, 0x1}, 0x200}, {{&(0x7f0000000a40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000ac0)=""/106, 0x6a}, {&(0x7f0000000b40)=""/18, 0x12}, {&(0x7f0000000b80)=""/236, 0xec}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/153, 0x99}], 0x5, &(0x7f0000000dc0)=""/239, 0xef, 0x8001}}, {{&(0x7f0000000ec0)=@l2, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f40)=""/210, 0xd2}, {&(0x7f0000004180)=""/4096, 0x1000}], 0x2, &(0x7f0000001080)=""/29, 0x1d, 0xff}, 0xbe0f}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000010c0)=""/35, 0x23}, {&(0x7f0000001100)=""/171, 0xab}, {&(0x7f00000011c0)=""/146, 0x92}], 0x3, 0x0, 0x0, 0x5}, 0x5}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/218, 0xda}, {&(0x7f0000002480)=""/75, 0x4b}, {&(0x7f0000002500)=""/155, 0x9b}, {&(0x7f00000025c0)=""/65, 0x41}], 0x4, &(0x7f0000002640)=""/151, 0x97, 0x9}, 0x7fff}, {{&(0x7f0000002700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002780)=""/255, 0xff}, {&(0x7f0000002880)=""/89, 0x59}, {&(0x7f0000002900)=""/14, 0xe}, {&(0x7f0000002940)=""/205, 0xcd}, {&(0x7f0000002a40)=""/113, 0x71}, {&(0x7f0000002ac0)=""/198, 0xc6}, {&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/203, 0xcb}, {&(0x7f0000006180)=""/4096, 0x1000}], 0x9, &(0x7f0000002d80)=""/151, 0x97, 0x401}, 0x1}], 0x7, 0x40, &(0x7f0000003040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='syscall\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000000)) 14:09:32 executing program 4: ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000540)}], 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000300)=0x1e) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f0000000280), 0x10) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000500), &(0x7f0000000240)=0x4) 14:09:33 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000003580), 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0200013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 14:09:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c440240316285717070") bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0xfffffffffffffffc, @empty, 0x1}, 0xffffffffffffff11) syz_emit_ethernet(0x190, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x74, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 14:09:33 executing program 0: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c22639", 0x16) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900), 0x84000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 14:09:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x3, 0x0, @thr={&(0x7f0000001480), &(0x7f0000000100)}}, &(0x7f00000001c0)) timer_settime(0x0, 0x100000001, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 14:09:33 executing program 4: 14:09:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000140)=0x50) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000240), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x14440, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:09:34 executing program 4: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x14}, 0x14}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f00000001c0), &(0x7f00000003c0)=0xffffffffffffff81) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, &(0x7f0000000080), 0xe08c) listen(0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100), 0x4) 14:09:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4}, 0xe) creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/5}, 0x18) 14:09:34 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000003580), 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0200013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 14:09:35 executing program 1: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 14:09:35 executing program 4: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 14:09:35 executing program 2: 14:09:35 executing program 0: 14:09:35 executing program 2: [ 291.488600] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.495675] bridge0: port 1(bridge_slave_0) entered disabled state 14:09:35 executing program 3: 14:09:36 executing program 0: 14:09:36 executing program 2: 14:09:36 executing program 5: 14:09:36 executing program 3: 14:09:36 executing program 2: 14:09:36 executing program 0: 14:09:37 executing program 3: [ 293.629041] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.635927] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.642765] device bridge0 left promiscuous mode 14:09:38 executing program 4: 14:09:38 executing program 1: 14:09:38 executing program 0: 14:09:38 executing program 2: 14:09:38 executing program 5: 14:09:38 executing program 3: 14:09:38 executing program 1: 14:09:38 executing program 0: 14:09:38 executing program 3: 14:09:38 executing program 5: 14:09:38 executing program 2: 14:09:38 executing program 4: 14:09:38 executing program 0: 14:09:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x21) 14:09:38 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000180), 0x80000000, &(0x7f0000000340)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x7, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:09:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000003c0)="d3", 0x1}], 0x1, &(0x7f0000000480)}, 0x0) sendmsg$kcm(r0, &(0x7f0000010c00)={&(0x7f000000f600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000010a40), 0x0, &(0x7f0000010ac0)}, 0x20040000) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000200)=@nl=@unspec, 0x80, &(0x7f00000002c0)}, 0x0) 14:09:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setfsgid(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)={0x0, @aes128, 0x0, "8b9d2116cbdb5805"}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 14:09:39 executing program 0: r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 14:09:39 executing program 4: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20000, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x1) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') r4 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000080), 0xffe) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="100025bd7000fedbdf250d000000f5cd0100087e04004e20000014000304000000000000003258e04c7dd81c91"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c226397b30d3f0", 0x1a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000740), &(0x7f0000000800)=[&(0x7f0000000780)='/dev/ptmx\x00', &(0x7f00000007c0)='bridge0\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) 14:09:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xffff7fff7fffffff) [ 295.115667] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.122272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.129165] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.135770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.142759] device bridge0 entered promiscuous mode [ 295.148976] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0x50, &(0x7f0000000940)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r2, 0x4) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r4, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000900)='./file0\x00', 0x0, 0xf}, 0x10) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x8000002003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f00000000c0)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000700)) r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x6, 0xfffffffffffffffc, &(0x7f0000000200)={0xffffffffffffffff}) r8 = getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f0000000880)={r6, r7}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0x0, r9}, 0x2c) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000ac0)={0x4, 0x70, 0xbfb5, 0xffffffffffff7fff, 0x80000001, 0xffffffff, 0x0, 0x2, 0x0, 0x1, 0x6, 0x0, 0xf, 0x6, 0x2, 0xfff, 0x4, 0x9, 0x4, 0x101, 0x9, 0x3, 0x5, 0x20, 0x5, 0x7f, 0x7, 0x4, 0x1, 0x4, 0x7, 0x3, 0x5, 0xfffffffffffffff7, 0x7, 0x7fff, 0x2, 0x14, 0x0, 0x5, 0x7, @perf_config_ext={0x6, 0x8}, 0x400, 0x1000, 0x5, 0x1, 0x3, 0x58ad}, r8, 0x0, r5, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000b40)={r9, r3}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) socketpair(0xb, 0x0, 0x2, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={r7}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8936, &(0x7f0000000000)={r10}) [ 295.449898] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.456701] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.464069] device bridge0 left promiscuous mode [ 295.543093] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.549682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.556669] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.563204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.570626] device bridge0 entered promiscuous mode [ 295.576942] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 295.584095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:09:39 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d6405000000000045040400010000000704000000000000b7040000100000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000280)="c2066dd644ec01d752677f9c2d5fd0e7fa3d32003d"}, 0x48) 14:09:40 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:40 executing program 5: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x100002000000004) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, &(0x7f0000000340)=0x951a, 0x0) writev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="c4", 0x1}], 0x1) 14:09:40 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}}}], 0x0, 0x0, &(0x7f0000fedffe)}) 14:09:40 executing program 3: 14:09:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:09:40 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") [ 296.764262] binder: 8532:8534 transaction failed 29189/-22, size 0-0 line 2855 14:09:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x1}, 0x20) [ 296.847626] binder: undelivered TRANSACTION_ERROR: 29189 14:09:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000300)={{}, 0x0, [], {0x0, 0x1c9c380}}) 14:09:41 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0ffb9f2a840f8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00007c040000000000002c460000000000006bff07febaffffff8400000007000800b7000000fe0000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$packet(0x11, 0x2, 0x300) exit(0x7) 14:09:41 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000100)=""/11, 0xb}, {&(0x7f0000000480)=""/217, 0xd9}], 0x5, &(0x7f0000000600), 0x0, 0x400}, 0x5}, {{&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000900)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/113, 0x71}, {&(0x7f0000000740)=""/113, 0x71}, {&(0x7f00000007c0)=""/9, 0x9}, {&(0x7f0000000800)}, {&(0x7f0000000840)=""/138, 0x8a}], 0x6, &(0x7f0000000980)=""/180, 0xb4, 0x1}, 0x200}, {{&(0x7f0000000a40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000ac0)=""/106, 0x6a}, {&(0x7f0000000b40)=""/18, 0x12}, {&(0x7f0000000b80)=""/236, 0xec}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/153, 0x99}], 0x5, &(0x7f0000000dc0)=""/239, 0xef, 0x8001}}], 0x3, 0x40, &(0x7f0000003040)) iopl(0x6750a8f0000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) 14:09:41 executing program 3: 14:09:41 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:41 executing program 2: 14:09:41 executing program 5: 14:09:41 executing program 3: 14:09:41 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:41 executing program 2: 14:09:41 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000100)=""/11, 0xb}, {&(0x7f0000000480)=""/217, 0xd9}], 0x5, &(0x7f0000000600), 0x0, 0x400}, 0x5}, {{&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000900)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/113, 0x71}, {&(0x7f0000000740)=""/113, 0x71}, {&(0x7f00000007c0)=""/9, 0x9}, {&(0x7f0000000800)}, {&(0x7f0000000840)=""/138, 0x8a}], 0x6, &(0x7f0000000980)=""/180, 0xb4, 0x1}, 0x200}, {{&(0x7f0000000a40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000ac0)=""/106, 0x6a}, {&(0x7f0000000b40)=""/18, 0x12}, {&(0x7f0000000b80)=""/236, 0xec}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/153, 0x99}], 0x5, &(0x7f0000000dc0)=""/239, 0xef, 0x8001}}], 0x3, 0x40, &(0x7f0000003040)) iopl(0x6750a8f0000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) 14:09:41 executing program 5: 14:09:42 executing program 3: 14:09:42 executing program 0: 14:09:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:42 executing program 5: 14:09:42 executing program 2: 14:09:42 executing program 3: 14:09:42 executing program 4: 14:09:42 executing program 3: creat(&(0x7f0000000200)='./bus\x00', 0x0) 14:09:42 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfd66) 14:09:42 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000806, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x1}, 0x8) close(r0) 14:09:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x800108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x3, 0x7, &(0x7f0000000040)) 14:09:42 executing program 1: socketpair(0x0, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x13) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) inotify_init() recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/58, 0x3a}], 0x1, &(0x7f0000000440)=""/250, 0xfa, 0xf0}, 0x0) sendto(r0, &(0x7f0000000180)="c71fec903714f0f3d210bad830fc9a9f1ef82f457c6b4194387ad95a7a4bb8bcff29560d461342bd84db08efa006c544e4a5cd48011e31c215d7a2e47f6867040eb44ff783632ea8937b79f1e92361c03646e1809fa10835eb87c135ffbe", 0x5e, 0x40000, &(0x7f0000000580)=@hci={0x1f, r1}, 0x80) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'bridge_slave_0\x00'}) ioctl$TIOCCBRK(r0, 0x5428) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={"766574000000000000000000b56800", 0x1000000000002400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) write(0xffffffffffffffff, &(0x7f0000000340), 0x100000224) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'bridge_slave_0\x00', 0x400}) 14:09:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000001f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(0xffffffffffffffff, 0x0, 0x100000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) 14:09:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00003f040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:43 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:43 executing program 2: symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='./file1\x00') 14:09:43 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_flowlabel\x00') r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000001c0)={"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"}) signalfd(r0, &(0x7f0000000040), 0x8) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 14:09:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x3de) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95, 0x3}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 14:09:43 executing program 5: syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x110, 0x3a, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) 14:09:43 executing program 4: 14:09:43 executing program 3: [ 299.696399] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 14:09:43 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:43 executing program 4: 14:09:44 executing program 5: 14:09:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed000044040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) 14:09:44 executing program 3: 14:09:44 executing program 4: 14:09:44 executing program 5: 14:09:44 executing program 3: 14:09:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") 14:09:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed000044040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:44 executing program 4: 14:09:44 executing program 0: 14:09:44 executing program 5: 14:09:44 executing program 3: 14:09:45 executing program 1: 14:09:45 executing program 4: 14:09:45 executing program 0: 14:09:45 executing program 5: 14:09:45 executing program 3: 14:09:45 executing program 2: 14:09:45 executing program 4: 14:09:45 executing program 1: 14:09:45 executing program 0: 14:09:45 executing program 3: 14:09:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f00000002c0)=""/247, 0xf7) dup2(r0, r1) 14:09:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_bridge\x00'}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000080)=""/251, &(0x7f0000000200)=0xfb) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002740)='cpuacct.usage_sys\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000027c0)='IPVS\x00') getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000440)={{0xa, 0x4e21, 0x2f7f, @loopback, 0xca}, {0xa, 0x4e23, 0x48, @dev={0xfe, 0x80, [], 0xf}, 0x80}, 0x80000001, [0x1ff, 0x0, 0x0, 0xf965, 0x5, 0x100, 0x5e1, 0x7fff]}, 0x5c) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f00000003c0)={0x78, 0x0, 0x8, {0x7, 0x0, 0x0, {0x1, 0x6, 0x80000000, 0xffff, 0xfff, 0x3, 0x6b3, 0x101, 0x0, 0x0, 0x9, r4, r5, 0x20, 0x6}}}, 0x78) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000028c0)={&(0x7f0000002780)={0x10, 0x0, 0x0, 0x28100410}, 0xc, &(0x7f0000002880)={&(0x7f0000002800)={0x50, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x50}}, 0x40000) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x70, 0x101000) perf_event_open(&(0x7f000001d000)={0x100200000002, 0x70, 0x80000000006, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa519, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffbfffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 14:09:45 executing program 4: 14:09:45 executing program 1: 14:09:46 executing program 3: 14:09:46 executing program 0: 14:09:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) 14:09:46 executing program 3: r0 = socket$packet(0x11, 0x4000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) 14:09:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x400000000000004}, 0x1c) 14:09:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000100)="b805000000b9ab8f3d150f01c10f3566baf80cb83853508def66bafc0cec66ba6100ec48b800000000000000800f23c00f21f83503000c000f23f8c4e10573fa2bb9800000c00f3235001000000f30c744240088000000c74424020001c0feff2c2448b800000000010000000f23c80f21f8350400f0000f23f8c423cd790c7eff", 0x81}], 0x1a8, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000200)=[@dstype3], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:09:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002b80)=0xffffffffffffffff, 0x11c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000080)}, 0x10100) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000400)="1b0000001a0081ace4050cecff091ffa1c6a23480b0e00faf02651", 0x1b}], 0x1, &(0x7f0000000300)}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000003540)) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xfffffd5f, &(0x7f0000001880), 0x0, &(0x7f0000001900)}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 14:09:46 executing program 0: mkdir(&(0x7f0000001240)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'user.', '/dev/input/mice\x00'}, &(0x7f0000001600)='(\x00', 0x2, 0x0) 14:09:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000080)="220000001400070000e80000000003000208030001000000080002004100fff0f055", 0x22) [ 302.750228] *** Guest State *** [ 302.753981] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 302.763017] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 302.772067] CR3 = 0x0000000000000000 [ 302.775828] RSP = 0x0000000000000f80 RIP = 0x0000000000000014 [ 302.782036] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 302.788069] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 302.794956] CS: sel=0x0023, attr=0x000fb, limit=0x0000ffff, base=0x0000000000000000 [ 302.803139] DS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 302.811187] SS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 302.819364] ES: sel=0x002b, attr=0x000f1, limit=0x0000ffff, base=0x0000000000000000 [ 302.827497] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 302.835667] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 302.843825] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 302.851985] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 302.860007] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 302.868141] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 302.876326] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 302.882867] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 302.890358] Interruptibility = 00000000 ActivityState = 00000000 [ 302.896764] *** Host State *** [ 302.900010] RIP = 0xffffffff812c8203 RSP = 0xffff88011f35f3c8 [ 302.906282] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 302.912856] FSBase=00007f5d0562f700 GSBase=ffff88021fd00000 TRBase=fffffe000003e000 [ 302.920708] GDTBase=fffffe000003c000 IDTBase=fffffe0000000000 [ 302.926797] CR0=0000000080050033 CR3=00000001603d0000 CR4=00000000001426e0 [ 302.933975] Sysenter RSP=fffffe000003d200 CS:RIP=0010:ffffffff8ae01260 [ 302.940694] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 302.946939] *** Control State *** 14:09:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000140)={0x60003}) timerfd_create(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="673effa57b000000ba210066edba6100b80000ef64670f01cbd8a1e3960fa2360f3806f6ddcc0f58f066b8003800000f23c80f21f866350400e0000f23f8", 0x3e}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:09:47 executing program 3: clone(0x0, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180)) select(0x40, &(0x7f00000000c0), &(0x7f0000000180)={0x2}, &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}) [ 302.950442] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 302.957836] EntryControls=0000d1ff ExitControls=002fefff [ 302.959223] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. [ 302.963418] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 302.963446] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 302.963472] VMExit: intr_info=00000000 errcode=00000000 ilen=00000007 [ 302.963497] reason=80000021 qualification=0000000000000000 [ 302.963520] IDTVectoring: info=00000000 errcode=00000000 [ 302.963540] TSC Offset = 0xffffff588339de27 [ 302.963563] EPT pointer = 0x000000011f34f01e 14:09:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x4, &(0x7f00000002c0)={@rand_addr, @multicast1}, 0xc) [ 303.112047] netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. 14:09:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 14:09:47 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8e8f, 0x82000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000000000000300000000000000090000000000000000000100000000000100000000000000ea0000ff000000000000000000000000000000000000000000000000000000000000000000010000010000000000000002000000000000000100000000000000042025ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000200000000000000009309ff000000000000000000000000000000000000000000000000000000000000000000000000"]) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)="7663616e300000001600", 0x10) sendto$inet(r0, &(0x7f00000002c0)="ad", 0x1, 0x3, &(0x7f0000000080)={0x2, 0x100000000000000}, 0x10) sendto$inet(r0, &(0x7f0000000240)="df", 0x1, 0x4200010, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) msgget(0x1, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1}, 0x8, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="9eea9a9b4b5f21bef431a175ef7e82ef623be47be123fcc9bda7c39151bf28862b82735db7b500000000000000039b4b9d7956640542d29a256a469f2baca4e3e1e0a165c163b8c469f14980b1a1a3c2d3"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000001500)={{0x100000001, 0x6}, 0x0, 0x1, 0x0, {0x7f, 0x100000001}, 0xfb, 0x8}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000540)=ANY=[@ANYBLOB="d9ae31816a2f81fbf3735f0313407f9692ad3c5fbac9e6f596b83083d9115b71c2d9787cf84d7cb8ac133aba4dc94c869196c3f1b18172227b90a5a6f2068be03d5f"], &(0x7f0000000140)=0x1) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x1) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) chroot(&(0x7f0000001600)='./file0\x00') socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000300)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'memory'}]}, 0x12) umount2(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000280)) 14:09:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000005c460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 14:09:47 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000012c0)) [ 303.710515] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 303.750732] audit: type=1326 audit(1541945387.790:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 303.786468] audit: type=1326 audit(1541945387.830:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.808166] audit: type=1326 audit(1541945387.830:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.829596] audit: type=1326 audit(1541945387.830:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.850966] audit: type=1326 audit(1541945387.830:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.872601] audit: type=1326 audit(1541945387.830:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.894082] audit: type=1326 audit(1541945387.830:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.915388] audit: type=1326 audit(1541945387.830:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 14:09:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={"6c6f000acc0000000000000000002600", {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) [ 303.936733] audit: type=1326 audit(1541945387.830:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 [ 303.958123] audit: type=1326 audit(1541945387.830:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8773 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457569 code=0x50000 14:09:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000140)={0x60003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000040)="673effa57b000000ba210066edba6100b80000ef64670f01cbd8a1e3960fa2360f3806f6ddcc0f58f066b8003800000f23c80f21f866350400e0000f23f8", 0x3e}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:09:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="a48d43fe199de6155cd6000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000580)={&(0x7f00000007c0)=@ax25, 0x44, &(0x7f0000000480)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000500)=""/99, 0x63}, 0x0) 14:09:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x5414, &(0x7f0000000180)) 14:09:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="a48d43fe199de6155cd6000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000027c0)="8351cd21e9630a0ee73bffe8d6fcda68a8554c1b462cc33047c1b613768f507f", 0x20}], 0x1, &(0x7f00000004c0)}, 0x0) recvmsg(r1, &(0x7f0000000580)={&(0x7f00000007c0)=@ax25, 0x44, &(0x7f0000000480)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000500)=""/99, 0x63}, 0x0) 14:09:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x5414, 0x706000) 14:09:48 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8e8f, 0x82000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000000000000300000000000000090000000000000000000100000000000100000000000000ea0000ff000000000000000000000000000000000000000000000000000000000000000000010000010000000000000002000000000000000100000000000000042025ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000200000000000000009309ff000000000000000000000000000000000000000000000000000000000000000000000000"]) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)="7663616e300000001600", 0x10) sendto$inet(r0, &(0x7f00000002c0)="ad", 0x1, 0x3, &(0x7f0000000080)={0x2, 0x100000000000000}, 0x10) sendto$inet(r0, &(0x7f0000000240)="df", 0x1, 0x4200010, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) msgget(0x1, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1}, 0x8, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="9eea9a9b4b5f21bef431a175ef7e82ef623be47be123fcc9bda7c39151bf28862b82735db7b500000000000000039b4b9d7956640542d29a256a469f2baca4e3e1e0a165c163b8c469f14980b1a1a3c2d3"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000001500)={{0x100000001, 0x6}, 0x0, 0x1, 0x0, {0x7f, 0x100000001}, 0xfb, 0x8}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000540)=ANY=[@ANYBLOB="d9ae31816a2f81fbf3735f0313407f9692ad3c5fbac9e6f596b83083d9115b71c2d9787cf84d7cb8ac133aba4dc94c869196c3f1b18172227b90a5a6f2068be03d5f"], &(0x7f0000000140)=0x1) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x1) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) chroot(&(0x7f0000001600)='./file0\x00') socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000300)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'io'}, {0x2d, 'rdma'}, {0x2b, 'memory'}]}, 0x12) umount2(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000280)) 14:09:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x0, 0x0) 14:09:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001900010200000000000000001d010000180004005a9972a978b31a5dfeee01d20000000000000000"], 0x1}}, 0x0) 14:09:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket(0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f0000000200)=0x80) r1 = add_key$user(&(0x7f0000004780)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000004800)="f6", 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100)='syz', r1) 14:09:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2b, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000a40)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) 14:09:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x80045439, 0x706000) 14:09:49 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000001300)) 14:09:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x20000102000004) [ 305.938270] binder_alloc: 8842: binder_alloc_buf size 2097168 failed, no address space [ 305.946759] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 305.956016] binder: 8842:8846 transaction failed 29201/-28, size 2097162-0 line 2970 14:09:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x20000102000004) 14:09:50 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xffffffffffffffff, &(0x7f0000000480)=0x8000000000000202, 0xffffffffffffff7c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast1}, 0xffffffffffffff77) listen(r0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x2b) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000380)={0x2, 0x8001, 0x80000001, 'queue1\x00', 0x200}) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x20, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000280)) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000340)={0x10001, 0x37c, 0x4, 0x8, 0x7fff, 0x0, 0x7, 0x80000000000, 0x37, 0x0, 0x0, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000100)={0x0, 0x0, 0x80000000, 0x8, 'syz1\x00', 0x7ff}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0x5) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000600)={{0x5, 0x0, 0x0, 0x0, 'syz0\x00', 0x81e}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x101, 'syz0\x00', &(0x7f0000000000)=["4c65746831813d2900"], 0x9, [], [0x5]}) 14:09:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) [ 306.144247] binder_alloc: binder_alloc_mmap_handler: 8842 20001000-20004000 already mapped failed -16 [ 306.182793] binder: BINDER_SET_CONTEXT_MGR already set [ 306.188268] binder: 8842:8846 ioctl 40046207 0 returned -16 14:09:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket(0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f0000000200)=0x80) r1 = add_key$user(&(0x7f0000004780)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000004800)="f6", 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100)='syz', r1) [ 306.231321] binder_alloc: 8842: binder_alloc_buf, no vma [ 306.237181] binder: 8842:8861 transaction failed 29189/-3, size 2097162-0 line 2970 14:09:50 executing program 1: prctl$setname(0xf, &(0x7f0000000040)="6c6f000acc0000000000000000002600") [ 306.381117] binder: undelivered TRANSACTION_ERROR: 29201 [ 306.390628] binder: undelivered TRANSACTION_ERROR: 29189 14:09:50 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) accept4(r0, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000240)=0x80, 0x80000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 14:09:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0x20000000a}, 0x10) 14:09:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000700)={0x3d, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="076304400400000004630440040000000c630000006340400000000000000000040000000000000000000000100000000000000000", @ANYPTR=&(0x7f0000000500)=ANY=[]], 0x0, 0x0, &(0x7f0000000680)}) 14:09:50 executing program 2: syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x4, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4048, 0x0, 0x12, r0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getitimer(0x0, &(0x7f0000000140)) 14:09:51 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000dda000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) 14:09:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 307.078925] binder: 8887:8888 DecRefs 0 refcount change on invalid ref 4 ret -22 [ 307.087234] binder: 8887:8888 IncRefs 0 refcount change on invalid ref 4 ret -22 [ 307.095084] binder: 8887:8888 transaction failed 29189/-22, size 32-0 line 2855 [ 307.119000] binder_alloc: binder_alloc_mmap_handler: 8893 20002000-20007000 already mapped failed -16 14:09:51 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000280)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0xa00100, 0xc0fe, 0x0, 0x20000000]}, 0x10, &(0x7f0000000e40), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="040000000000000010000000000000002000000000000000"], 0x18, 0x3}, 0x0) [ 307.190387] binder: 8887:8901 DecRefs 0 refcount change on invalid ref 4 ret -22 [ 307.198326] binder: 8887:8901 IncRefs 0 refcount change on invalid ref 4 ret -22 [ 307.206303] binder: 8887:8901 transaction failed 29189/-22, size 32-0 line 2855 14:09:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() getpriority(0x2, r1) [ 307.304338] binder: undelivered TRANSACTION_ERROR: 29189 [ 307.309900] binder: undelivered TRANSACTION_ERROR: 29189 14:09:51 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000600)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x5, 0x0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000100)=["6367726f75707365637572697479042100"], 0x11, [], [0x5]}) 14:09:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280), &(0x7f0000000340)=0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") 14:09:51 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2b, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, &(0x7f00000003c0)}) [ 307.643391] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 14:09:51 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x820000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={"0200"}, &(0x7f00000001c0)="9c58a4383e19fdb5947eaadedec855db26921998b1b8af05535c924166fe53ca9893d30e42294161dd7d4380da5476a4a55a3f00f81b5551a4273230af85629045238c6bb23d7723f8e1253525a8584d1cc3ef699050dbf400", 0x59, 0xfffffffffffffffb) [ 307.833910] binder: 8920:8922 transaction failed 29189/-22, size 2097154-0 line 2855 [ 307.870067] binder: 8920:8925 transaction failed 29189/-22, size 2097154-0 line 2855 [ 307.910019] binder: undelivered TRANSACTION_ERROR: 29189 [ 307.921847] binder: undelivered TRANSACTION_ERROR: 29189 [ 307.973148] Option 'Œk²' to dns_resolver key: bad/missing value 14:09:52 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) accept4(r0, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000240)=0x80, 0x80000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 14:09:52 executing program 1: r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40), 0x0) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000740), &(0x7f0000000800)=[&(0x7f0000000780)='/dev/ptmx\x00']) 14:09:52 executing program 3: r0 = memfd_create(&(0x7f0000000080)="7b10", 0x2) fcntl$addseals(r0, 0x409, 0xb) 14:09:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x803, 0x8) sendmmsg$unix(r1, &(0x7f00000029c0)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000001cc0)=ANY=[]}], 0x1, 0x0) 14:09:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000300)={{}, 0x0, [], {0x0, 0x1c9c380}}) 14:09:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000000)={0x3, 0x0, @ioapic}) 14:09:52 executing program 1: 14:09:52 executing program 4: 14:09:52 executing program 2: 14:09:52 executing program 0: 14:09:52 executing program 1: 14:09:53 executing program 4: 14:09:53 executing program 5: 14:09:53 executing program 3: 14:09:53 executing program 2: 14:09:53 executing program 4: 14:09:53 executing program 0: 14:09:53 executing program 1: 14:09:53 executing program 3: 14:09:53 executing program 1: 14:09:53 executing program 4: 14:09:53 executing program 2: 14:09:53 executing program 0: 14:09:54 executing program 5: 14:09:54 executing program 3: 14:09:54 executing program 4: 14:09:54 executing program 1: 14:09:54 executing program 0: 14:09:54 executing program 2: 14:09:54 executing program 3: 14:09:54 executing program 5: 14:09:54 executing program 1: 14:09:54 executing program 4: 14:09:54 executing program 2: 14:09:54 executing program 0: 14:09:54 executing program 3: 14:09:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x5408, &(0x7f0000000180)) 14:09:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000140)='/dev/dlm_plock\x00', 0x7) fcntl$addseals(r1, 0x409, 0x8) 14:09:55 executing program 3: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x800000000114, 0x80000000000271b, &(0x7f0000000040), &(0x7f00000000c0)=0x555) 14:09:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x6) 14:09:55 executing program 0: epoll_create1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xe6) 14:09:55 executing program 2: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f0000000180)) write(0xffffffffffffffff, &(0x7f0000000340), 0x100000224) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) open(&(0x7f0000000040)='./file0\x00', 0x4, 0xc1) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'bridge_slave_0\x00', 0x400}) 14:09:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000280)="ad1a642306b6fde357876479c3e9f4ab901dac4a1b6368b9dd1a3326cfe43a", 0x1f}], 0x1) 14:09:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @loopback}}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:09:55 executing program 1: syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x110, 0x4, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) 14:09:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)={@mcast2}, &(0x7f0000000500)=0x14) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/179, 0xb3}], 0x1) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000480), &(0x7f0000000880)=0x4) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 14:09:55 executing program 0: epoll_create1(0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xe6) 14:09:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000380)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {0x0, 0x6505}, {0x0, 0x8}, @const={0x5}}}) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/38, 0x2a1}], 0x1, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x14) writev(r0, &(0x7f00000023c0), 0x1000000000000252) mlockall(0x1) 14:09:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x0) 14:09:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @loopback}}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:09:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541a, &(0x7f0000000180)) 14:09:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000380)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {0x0, 0x6505}, {0x0, 0x8}, @const={0x5}}}) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/38, 0x2a1}], 0x1, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x14) writev(r0, &(0x7f00000023c0), 0x1000000000000252) mlockall(0x1) 14:09:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x2) 14:09:56 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)="7374617409c0c2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000200)={0x7}, 0x7) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000340)={{0x2, 0x4e23, @loopback}, {0x0, @broadcast}, 0x0, {0x2, 0x2000000000000000, @multicast1}, 'veth1_to_team\x00'}) 14:09:56 executing program 1: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x800000, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) stat(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000700)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000008c0), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}}, 0xa0) 14:09:57 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f0000000400), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @remote, @ipv4, 0x0, 0x0, 0x0, 0xf8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 14:09:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000200)={0x7}, 0x7) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x10) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='$', 0xffffffffffffffff}, 0x30) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x0, {0x2, 0x2000000000000000, @multicast1}, 'veth1_to_team\x00'}) fcntl$setlease(r2, 0x400, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x400, 0x0) [ 313.098836] ptrace attach of "/root/syz-executor5"[9086] was attempted by "/root/syz-executor5"[9088] 14:09:57 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:09:57 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x820000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006800)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000380)="0e8041b161bc977a000614c957c47434cb344d5e161db29b81e1da213243fa8ac012cc", 0x23}], 0x1, &(0x7f00000019c0)=[@cred={0x20}, @cred={0x20}], 0x40, 0x4000000}], 0x1, 0x40000) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={"0200"}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 14:09:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) 14:09:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x4003}) write$cgroup_type(r1, &(0x7f0000001900)='th\b\x00aded\x00', 0xfdef) 14:09:57 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl(r0, 0x6681, &(0x7f0000000040)) [ 313.415364] Invalid option length (1043253) for dns_resolver key 14:09:57 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:09:57 executing program 3: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20000, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) r1 = memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x1) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c226397b30d3f0", 0x1a) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 313.614311] Invalid option length (1043253) for dns_resolver key 14:09:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541b, 0x706000) 14:09:58 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) [ 313.947442] mmap: syz-executor5 (9119) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 314.033261] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.039897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.046931] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.053564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.060481] device bridge0 entered promiscuous mode [ 314.066770] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:09:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="a48d43fe199de6155cd6000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="4a9c1f2b218caadd", 0x8}], 0x1, &(0x7f00000004c0)}, 0x0) recvmsg(r1, &(0x7f0000000580)={&(0x7f00000007c0)=@ax25, 0x44, &(0x7f0000000480)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000500)=""/99, 0x63}, 0x0) 14:09:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000780)=[@text16={0x10, &(0x7f0000000740)="b8e3000f00d83ef30f11bb2ce80f01cf66b9bd0200000f320f320fc76b6d260f2391650f01b8ec0066b9800000c00f326635010000000f3036f20f01df", 0x3d}], 0x1, 0x0, &(0x7f00000007c0), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000880)=0x7ff) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:09:58 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) [ 314.822855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.902665] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.909393] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.916267] device bridge0 left promiscuous mode 14:09:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) r0 = creat(&(0x7f0000000440)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 14:09:59 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:09:59 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:09:59 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:09:59 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) accept(r0, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000000)=0x80) 14:09:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000300)=""/246) pread64(r0, &(0x7f0000000800)=""/240, 0xf0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) [ 315.980204] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.986777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.993748] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.000205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.007447] device bridge0 entered promiscuous mode 14:10:00 executing program 3: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000b40), 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900), 0x84000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) 14:10:00 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:00 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000180)={0x7, 0xc, [0xff, 0x800, 0x0]}) 14:10:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000000c0)) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:system_cron_spool_t:s0\x00', 0x29, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x802, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xf130, 0x6, 0x8000, 0x800000000, 0x2, 0x0, 0x4, 0x283, 0x40, 0x37, 0xc5, 0x6, 0x38, 0x2, 0x5, 0x7, 0x1ad4a267}, [{0x3, 0x5, 0x0, 0x8000000000000, 0xdde6, 0x8000, 0xc69, 0x80000000}], "ebd824640d6624f8d50b27d9abbc5135cfdea8cdddf08e68", [[], [], [], []]}, 0x490) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="3771150000b9f04990723653128fe87f084ec3df521539ec11386845f16c07dc822513258d3e5eb98af8abffcd6faa4eff07021bba"], 0x1, 0x2) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'TPROXY\x00'}, &(0x7f0000000380)=0x1e) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) sched_setaffinity(0x0, 0x3, &(0x7f00000000c0)=0x9) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) syncfs(r5) write$UHID_CREATE(r4, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f00000006c0)=0x9, &(0x7f0000000700)=0x2) quotactl(0x4, &(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)="1e8bba8091654b89ad4704b15696c585c63c772b46cd50836ed703506ed8006ffe62a135d8f3f68ff58c3514f1095f56c510d46be1e7e89aaf4f5361f33484493598bec3ebabdfe02d414d4e9eed13f179768dc3c073fe598af5d87c18341ccf4a23428dcf34f1520304c99af1bdb3b02e0e3302f60eff55926109326de15e5b65099a98f7") prctl$void(0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000300)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @broadcast}, {}, 0x1000008, {0x2, 0x4e21, @rand_addr}, 'veth0_to_bond\x00'}) 14:10:00 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 14:10:00 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) [ 316.522828] hid-generic 0000:0000:0000.0001: unknown main item tag 0x7 [ 316.529672] hid-generic 0000:0000:0000.0001: item fetching failed at offset -1929773861 [ 316.538523] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 14:10:00 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000165154"], &(0x7f0000003fc0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x8002a0ffffffff, 0xe, 0xd7, &(0x7f0000000140)="3c08000000f08b41637c2fee86dd", &(0x7f0000000380)=""/215, 0x631}, 0x28) geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) r1 = getpgid(0xffffffffffffffff) r2 = fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{}, 0x0, 0x200, 0x0, 0x0, 0x80000001, 0x0, r1, r2}) [ 316.703746] QAT: Stopping all acceleration devices. 14:10:00 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000100)) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000019, 0x0) [ 317.271264] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.274751] hid-generic 0000:0000:0000.0002: unknown main item tag 0x7 [ 317.278062] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.284504] hid-generic 0000:0000:0000.0002: item fetching failed at offset 518838267 [ 317.291298] device bridge0 left promiscuous mode [ 317.299255] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 14:10:01 executing program 0: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49ba3be6f5195c8c226", 0x15) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900), 0x84000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) 14:10:01 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000180)) [ 320.009903] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.016555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.023619] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.030060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.037207] device bridge0 entered promiscuous mode [ 320.174723] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.181636] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.188320] device bridge0 left promiscuous mode [ 320.567872] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.574573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.581503] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.588153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.596604] device bridge0 entered promiscuous mode [ 320.613061] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.619662] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.626525] device bridge0 left promiscuous mode [ 320.918024] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.924531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.931407] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.937971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.944912] device bridge0 entered promiscuous mode 14:10:05 executing program 3: 14:10:05 executing program 5: socket$inet(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x1) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 14:10:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:05 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:10:05 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:10:05 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) [ 321.446528] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.453106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.460012] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.466639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.473810] device bridge0 entered promiscuous mode [ 321.480055] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:10:05 executing program 0: 14:10:05 executing program 3: [ 321.821663] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.856253] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.901638] device bridge0 left promiscuous mode 14:10:05 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r7, &(0x7f0000000540)=""/30}) r8 = socket$inet6(0xa, 0x3, 0x2) ioctl(r8, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r9 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r9, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r9, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r9, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r9, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) 14:10:06 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:06 executing program 3: 14:10:06 executing program 0: [ 325.649721] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.656298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.663362] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.669798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.676675] device bridge0 entered promiscuous mode [ 325.682896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:10:09 executing program 5: 14:10:09 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:09 executing program 0: 14:10:09 executing program 1: 14:10:09 executing program 3: 14:10:09 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:10 executing program 1: 14:10:10 executing program 3: 14:10:10 executing program 5: 14:10:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:10 executing program 0: 14:10:10 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:10 executing program 3: 14:10:10 executing program 1: 14:10:10 executing program 5: 14:10:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/94, 0x43}], 0x1) 14:10:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) [ 326.662696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:10:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)="7374617409c0c2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}, 0x10) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast1}, 'veth1_to_team\x00'}) 14:10:10 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r10, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/94, 0x43}], 0x1) 14:10:11 executing program 1: 14:10:11 executing program 5: 14:10:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:11 executing program 3: 14:10:11 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r10, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r10, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:11 executing program 1: 14:10:11 executing program 0: 14:10:11 executing program 5: 14:10:11 executing program 3: 14:10:11 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:11 executing program 1: 14:10:12 executing program 0: 14:10:12 executing program 5: 14:10:12 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) r9 = socket$inet6(0xa, 0x3, 0x2) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:12 executing program 3: 14:10:12 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:12 executing program 1: 14:10:12 executing program 3: 14:10:12 executing program 0: 14:10:12 executing program 5: 14:10:12 executing program 1: 14:10:12 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) socket$inet6(0xa, 0x3, 0x2) r9 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r9, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r9, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r9, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r9, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:12 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:12 executing program 3: 14:10:12 executing program 0: 14:10:13 executing program 5: 14:10:13 executing program 1: 14:10:13 executing program 3: 14:10:13 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:13 executing program 0: 14:10:13 executing program 5: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) mlock2(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x1) remap_file_pages(&(0x7f0000006000/0x4000)=nil, 0x7fffdfff9000, 0x0, 0x0, 0x0) 14:10:13 executing program 1: syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x101, 0x200) 14:10:13 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x4, 0x4000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x40404) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) fallocate(r0, 0x0, 0x100000, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r4, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000016, 0x8001, 0x10000001010) r5 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r5, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x40) socketpair(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000600)={r8, &(0x7f0000000540)=""/30}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r9 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r9, 0xaf01, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_VRING_ADDR(r9, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r9, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r9, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000240)) 14:10:13 executing program 3: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20000, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) r1 = memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x1) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000080), 0xffe) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="100025bd7000fedbdf250d000000f5cd0100087e04004e20000014000304000000000000003258e04c7dd81c91"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000b40)="8f36be1ab89efdf54cb881f49b", 0xd) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000740), &(0x7f0000000800)=[&(0x7f0000000780)='/dev/ptmx\x00', &(0x7f00000007c0)='bridge0\x00']) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900), 0x84000) 14:10:13 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) 14:10:13 executing program 0: socket$inet(0x10, 0x3, 0xc) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20000, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2e) memfd_create(&(0x7f0000000c40)='bridge0\x00', 0x1) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000006c0), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 14:10:13 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x7fffffff}, 0x8, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/162, 0xa2}], 0x1) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x3, 0x0, @thr={&(0x7f0000001480), &(0x7f0000000100)}}, &(0x7f00000001c0)) timer_settime(0x0, 0x100000001, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 14:10:14 executing program 1 (fault-call:2 fault-nth:0): socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a07006051b159a0797d0b54d2ff00000020") [ 330.213283] FAULT_INJECTION: forcing a failure. [ 330.213283] name failslab, interval 1, probability 0, space 0, times 1 [ 330.225022] CPU: 0 PID: 9471 Comm: syz-executor1 Not tainted 4.19.0+ #82 [ 330.231910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.241305] Call Trace: [ 330.243912] ================================================================== [ 330.251288] BUG: KMSAN: uninit-value in show_trace_log_lvl+0x53f/0x11e0 [ 330.258051] CPU: 0 PID: 9471 Comm: syz-executor1 Not tainted 4.19.0+ #82 [ 330.264892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.274248] Call Trace: [ 330.276852] dump_stack+0x419/0x480 [ 330.280492] ? show_trace_log_lvl+0x53f/0x11e0 [ 330.285099] kmsan_report+0x19f/0x300 [ 330.288918] __msan_warning+0x76/0xd0 [ 330.292728] ? stack_type_name+0x14/0xe0 [ 330.296799] show_trace_log_lvl+0x53f/0x11e0 [ 330.301342] ? dump_stack+0x32d/0x480 [ 330.305158] show_stack+0x12e/0x170 [ 330.308825] dump_stack+0x32d/0x480 [ 330.312476] should_fail+0x11e5/0x13c0 [ 330.316388] __should_failslab+0x278/0x2a0 [ 330.320644] should_failslab+0x29/0x70 [ 330.324544] __kmalloc_node+0x257/0x1520 [ 330.328616] ? __kernel_text_address+0x250/0x350 [ 330.333382] ? __get_vm_area_node+0x28c/0x820 [ 330.337895] ? __save_stack_trace+0x2d9/0x310 [ 330.342408] __get_vm_area_node+0x28c/0x820 [ 330.346756] __vmalloc_node_range+0x290/0x12a0 [ 330.351350] ? dev_ethtool+0x929a/0xefa0 [ 330.355428] ? kmsan_set_origin+0x83/0x130 [ 330.359689] vzalloc+0xd8/0xf0 [ 330.362896] ? dev_ethtool+0x929a/0xefa0 [ 330.366974] dev_ethtool+0x929a/0xefa0 [ 330.370886] ? kmsan_set_origin+0x83/0x130 [ 330.375153] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.380540] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 330.385663] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.391047] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 330.396195] ? update_cfs_rq_load_avg+0x5e1/0xa10 [ 330.401066] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.406440] ? update_load_avg+0x12ae/0x1db0 [ 330.410953] ? kmsan_set_origin+0x83/0x130 [ 330.415210] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 330.420595] ? __msan_get_context_state+0x9/0x30 [ 330.425359] ? INIT_BOOL+0xc/0x30 [ 330.428832] ? mutex_lock+0x2f7/0x420 [ 330.432663] dev_ioctl+0xadc/0x1f50 [ 330.436314] sock_do_ioctl+0x48c/0x730 [ 330.440229] sock_ioctl+0x81b/0xe00 [ 330.443872] ? do_vfs_ioctl+0x187/0x2d30 [ 330.447944] ? sock_poll+0x4c0/0x4c0 [ 330.451667] do_vfs_ioctl+0xf77/0x2d30 [ 330.455580] ? security_file_ioctl+0x92/0x200 [ 330.460094] __se_sys_ioctl+0x1da/0x270 [ 330.464091] __x64_sys_ioctl+0x4a/0x70 [ 330.467992] do_syscall_64+0xcf/0x110 [ 330.471812] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.477007] RIP: 0033:0x457569 [ 330.480222] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.499138] RSP: 002b:00007f5d05670c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.506868] RAX: ffffffffffffffda RBX: 00007f5d05670c90 RCX: 0000000000457569 [ 330.514146] RDX: 0000000020000100 RSI: 0000000000008946 RDI: 0000000000000004 [ 330.521433] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 330.528712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d056716d4 [ 330.535991] R13: 00000000004c89a0 R14: 00000000004d0df8 R15: 0000000000000005 [ 330.543287] [ 330.544937] Local variable description: ----state@show_trace_log_lvl [ 330.551431] Variable was created at: [ 330.555174] show_trace_log_lvl+0xb3/0x11e0 [ 330.559518] show_stack+0x12e/0x170 [ 330.563249] ================================================================== [ 330.570620] Disabling lock debugging due to kernel taint [ 330.576080] Kernel panic - not syncing: panic_on_warn set ... [ 330.576080] [ 330.583466] CPU: 0 PID: 9471 Comm: syz-executor1 Tainted: G B 4.19.0+ #82 [ 330.591705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.601074] Call Trace: [ 330.603685] dump_stack+0x419/0x480 [ 330.607339] panic+0x57e/0xb28 [ 330.610583] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 330.616056] kmsan_report+0x300/0x300 [ 330.619880] __msan_warning+0x76/0xd0 [ 330.623695] ? stack_type_name+0x14/0xe0 [ 330.627767] show_trace_log_lvl+0x53f/0x11e0 [ 330.632225] ? dump_stack+0x32d/0x480 [ 330.636042] show_stack+0x12e/0x170 [ 330.639683] dump_stack+0x32d/0x480 [ 330.643340] should_fail+0x11e5/0x13c0 [ 330.647277] __should_failslab+0x278/0x2a0 [ 330.651530] should_failslab+0x29/0x70 [ 330.655432] __kmalloc_node+0x257/0x1520 [ 330.659504] ? __kernel_text_address+0x250/0x350 [ 330.664286] ? __get_vm_area_node+0x28c/0x820 [ 330.668795] ? __save_stack_trace+0x2d9/0x310 [ 330.673316] __get_vm_area_node+0x28c/0x820 [ 330.677669] __vmalloc_node_range+0x290/0x12a0 [ 330.682269] ? dev_ethtool+0x929a/0xefa0 [ 330.686347] ? kmsan_set_origin+0x83/0x130 [ 330.690606] vzalloc+0xd8/0xf0 [ 330.693810] ? dev_ethtool+0x929a/0xefa0 [ 330.697885] dev_ethtool+0x929a/0xefa0 [ 330.701796] ? kmsan_set_origin+0x83/0x130 [ 330.706065] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:10:14 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x7}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000800000010000000500000008000a0027"]) [ 330.711446] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 330.716573] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.721957] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 330.727091] ? update_cfs_rq_load_avg+0x5e1/0xa10 [ 330.731963] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.737346] ? update_load_avg+0x12ae/0x1db0 [ 330.741779] ? kmsan_set_origin+0x83/0x130 [ 330.746124] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 330.751528] ? __msan_get_context_state+0x9/0x30 [ 330.756302] ? INIT_BOOL+0xc/0x30 [ 330.759771] ? mutex_lock+0x2f7/0x420 [ 330.763606] dev_ioctl+0xadc/0x1f50 [ 330.767267] sock_do_ioctl+0x48c/0x730 [ 330.771204] sock_ioctl+0x81b/0xe00 [ 330.774859] ? do_vfs_ioctl+0x187/0x2d30 [ 330.778942] ? sock_poll+0x4c0/0x4c0 [ 330.782676] do_vfs_ioctl+0xf77/0x2d30 [ 330.786618] ? security_file_ioctl+0x92/0x200 [ 330.791136] __se_sys_ioctl+0x1da/0x270 [ 330.795136] __x64_sys_ioctl+0x4a/0x70 [ 330.799041] do_syscall_64+0xcf/0x110 [ 330.802860] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.808054] RIP: 0033:0x457569 [ 330.811259] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.830175] RSP: 002b:00007f5d05670c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.837910] RAX: ffffffffffffffda RBX: 00007f5d05670c90 RCX: 0000000000457569 [ 330.845194] RDX: 0000000020000100 RSI: 0000000000008946 RDI: 0000000000000004 [ 330.852470] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 330.859744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d056716d4 [ 330.867019] R13: 00000000004c89a0 R14: 00000000004d0df8 R15: 0000000000000005 [ 330.875575] Kernel Offset: disabled [ 330.879210] Rebooting in 86400 seconds..