Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. 2018/11/11 07:33:36 fuzzer started 2018/11/11 07:33:41 dialing manager at 10.128.0.26:36043 2018/11/11 07:33:41 syscalls: 1 2018/11/11 07:33:41 code coverage: enabled 2018/11/11 07:33:41 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/11 07:33:41 setuid sandbox: enabled 2018/11/11 07:33:41 namespace sandbox: enabled 2018/11/11 07:33:41 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/11 07:33:41 fault injection: enabled 2018/11/11 07:33:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/11 07:33:41 net packed injection: enabled 2018/11/11 07:33:41 net device setup: enabled 07:36:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"766c616e3a000000002000939800", 0x2003}) [ 253.399878] IPVS: ftp: loaded support on port[0] = 21 [ 255.841121] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.847907] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.856750] device bridge_slave_0 entered promiscuous mode [ 255.999600] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.006475] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.015401] device bridge_slave_1 entered promiscuous mode [ 256.156771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.298555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.730050] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.874707] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:36:31 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20001ffffffe) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) [ 257.758782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.767029] team0: Port device team_slave_0 added [ 257.909094] IPVS: ftp: loaded support on port[0] = 21 [ 257.909710] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.922641] team0: Port device team_slave_1 added [ 258.110647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.312232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 258.319387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.328473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.576478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.584316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.593585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.776222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.783971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.793332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.124516] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.131027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.138131] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.144709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.153590] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 261.642143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.698787] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.706328] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.715110] device bridge_slave_0 entered promiscuous mode [ 262.004432] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.010919] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.020077] device bridge_slave_1 entered promiscuous mode [ 262.225678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.378597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.080298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.298113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.504055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 263.532496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:36:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) [ 263.693214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.700462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.589357] IPVS: ftp: loaded support on port[0] = 21 [ 264.734765] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.743165] team0: Port device team_slave_0 added [ 265.039698] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.048248] team0: Port device team_slave_1 added [ 265.315952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.323268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.332363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.621887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.629000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.637969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.921802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.929538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.938863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.233197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.240870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.250034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.413600] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.420112] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.429001] device bridge_slave_0 entered promiscuous mode [ 269.545250] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.551837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.558763] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.565397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.574675] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 269.794171] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.800674] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.809495] device bridge_slave_1 entered promiscuous mode [ 269.933040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.054741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.327495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.163414] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.462266] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.784968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 271.792163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.112730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 272.119794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:36:46 executing program 3: r0 = memfd_create(&(0x7f0000000100)="00000600000000000000", 0x5) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x1000) [ 273.026828] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 273.035169] team0: Port device team_slave_0 added [ 273.260046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.386375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 273.394598] team0: Port device team_slave_1 added [ 273.703133] IPVS: ftp: loaded support on port[0] = 21 [ 273.709866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 273.717208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.726272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.057911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 274.065265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.074345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.380121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.387929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.397022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.747863] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 274.839346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.847337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.856433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.016032] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.022519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.030561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.400968] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.726800] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.733393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.740322] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.746957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.755969] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.473840] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.480343] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.489137] device bridge_slave_0 entered promiscuous mode [ 279.693162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.936811] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.943564] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.952299] device bridge_slave_1 entered promiscuous mode [ 280.240494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 280.613277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 281.827806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 282.174132] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 282.457385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 282.464580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 282.811787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 282.818837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.490144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.826136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 283.834436] team0: Port device team_slave_0 added [ 284.213870] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.222280] team0: Port device team_slave_1 added 07:36:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 284.608878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 284.616124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.625504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.981944] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.099527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 285.106926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.116009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.553793] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 285.561880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.571067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.856575] IPVS: ftp: loaded support on port[0] = 21 07:37:00 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000540)=""/136, 0x88) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10001) socket$inet6_sctp(0xa, 0x0, 0x84) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x70bd25}, 0x14}}, 0x0) [ 286.070969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 286.086098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.095672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.697573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 286.704214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.712468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:37:00 executing program 0: getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x2}, 0xfffffffffffffdef) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000120000000004000000000000000069127f0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93ae7ef35b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d00401eff2d718a063a44b44a701cdd350cfcc7ac9b06cfb20478fd4dcdc7c526854077b000000000000000000000000000000"], 0xa5) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000007c0)="feffffffffff19ff393200", 0x8000000000000002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYBLOB="d5544568f348ff5b813e9e50a5e92bedf22b3a05bf77065c5fa35a16425bd26062984439a424ca51"], &(0x7f0000000100)=0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000480)=ANY=[@ANYBLOB="207aff3a5b2308ea508d0fffffff05006918ecd0d8c3b83fb3a101abb189a08e660cc20ae9512dc1aec3"], 0x1}}, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x100000001, 0x8000000040087e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r7, &(0x7f0000001000), 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r2, &(0x7f0000000340), 0xa1, 0x1000) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/138, 0x8a}], 0x5, 0x0) memfd_create(&(0x7f0000000640)="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", 0x0) [ 287.007288] hrtimer: interrupt took 56566 ns 07:37:02 executing program 0: getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x2}, 0xfffffffffffffdef) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000120000000004000000000000000069127f0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93ae7ef35b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d00401eff2d718a063a44b44a701cdd350cfcc7ac9b06cfb20478fd4dcdc7c526854077b000000000000000000000000000000"], 0xa5) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000007c0)="feffffffffff19ff393200", 0x8000000000000002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYBLOB="d5544568f348ff5b813e9e50a5e92bedf22b3a05bf77065c5fa35a16425bd26062984439a424ca51"], &(0x7f0000000100)=0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000480)=ANY=[@ANYBLOB="207aff3a5b2308ea508d0fffffff05006918ecd0d8c3b83fb3a101abb189a08e660cc20ae9512dc1aec3"], 0x1}}, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x100000001, 0x8000000040087e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r7, &(0x7f0000001000), 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r2, &(0x7f0000000340), 0xa1, 0x1000) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/138, 0x8a}], 0x5, 0x0) memfd_create(&(0x7f0000000640)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281e4ee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) [ 289.077087] 8021q: adding VLAN 0 to HW filter on device team0 07:37:03 executing program 0: getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x2}, 0xfffffffffffffdef) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000120000000004000000000000000069127f0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93ae7ef35b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d00401eff2d718a063a44b44a701cdd350cfcc7ac9b06cfb20478fd4dcdc7c526854077b000000000000000000000000000000"], 0xa5) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000007c0)="feffffffffff19ff393200", 0x8000000000000002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYBLOB="d5544568f348ff5b813e9e50a5e92bedf22b3a05bf77065c5fa35a16425bd26062984439a424ca51"], &(0x7f0000000100)=0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000480)=ANY=[@ANYBLOB="207aff3a5b2308ea508d0fffffff05006918ecd0d8c3b83fb3a101abb189a08e660cc20ae9512dc1aec3"], 0x1}}, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x100000001, 0x8000000040087e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r7, &(0x7f0000001000), 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r2, &(0x7f0000000340), 0xa1, 0x1000) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/138, 0x8a}], 0x5, 0x0) memfd_create(&(0x7f0000000640)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281e4ee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) 07:37:04 executing program 0: getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x2}, 0xfffffffffffffdef) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000120000000004000000000000000069127f0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93ae7ef35b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d00401eff2d718a063a44b44a701cdd350cfcc7ac9b06cfb20478fd4dcdc7c526854077b000000000000000000000000000000"], 0xa5) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000007c0)="feffffffffff19ff393200", 0x8000000000000002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYBLOB="d5544568f348ff5b813e9e50a5e92bedf22b3a05bf77065c5fa35a16425bd26062984439a424ca51"], &(0x7f0000000100)=0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000480)=ANY=[@ANYBLOB="207aff3a5b2308ea508d0fffffff05006918ecd0d8c3b83fb3a101abb189a08e660cc20ae9512dc1aec3"], 0x1}}, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x100000001, 0x8000000040087e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r7, &(0x7f0000001000), 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r2, &(0x7f0000000340), 0xa1, 0x1000) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/138, 0x8a}], 0x5, 0x0) memfd_create(&(0x7f0000000640)="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", 0x0) 07:37:05 executing program 0: getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x2}, 0xfffffffffffffdef) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000120000000004000000000000000069127f0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93ae7ef35b4c5f4e09e154fb199422ba5fbe2f6b026e54b8ee2a5a9d00401eff2d718a063a44b44a701cdd350cfcc7ac9b06cfb20478fd4dcdc7c526854077b000000000000000000000000000000"], 0xa5) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000580)='./file0//ile0\x00', &(0x7f00000007c0)="feffffffffff19ff393200", 0x8000000000000002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYBLOB="d5544568f348ff5b813e9e50a5e92bedf22b3a05bf77065c5fa35a16425bd26062984439a424ca51"], &(0x7f0000000100)=0x1) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000480)=ANY=[@ANYBLOB="207aff3a5b2308ea508d0fffffff05006918ecd0d8c3b83fb3a101abb189a08e660cc20ae9512dc1aec3"], 0x1}}, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000240)={0x0, 0x100000001}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x100000001, 0x8000000040087e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r7, &(0x7f0000001000), 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r2, &(0x7f0000000340), 0xa1, 0x1000) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/138, 0x8a}], 0x5, 0x0) memfd_create(&(0x7f0000000640)="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", 0x0) 07:37:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000000c0)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x14) write$evdev(r3, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x1, 0x400000000000038, 0x2}], 0xfddb) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000040)=""/62) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = gettid() r6 = socket$inet(0x2, 0x800, 0x6) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r6, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r6, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r6, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4000000004e23, @loopback}, 0x10) dup2(r4, r6) tkill(r5, 0x1000000000016) [ 291.978801] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.985384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.992517] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.000301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.008845] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 292.732896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:37:06 executing program 0: r0 = socket(0x200000000000011, 0x4000000003, 0x8000000000008) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000003c0)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f0000000000)="95275dc47f0b39d250765d04bf394938a1ffb7ffe99df2f18e5b63718df26cad563a", 0x22, 0x0, 0x0, 0x0) [ 293.949574] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.956291] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.965471] device bridge_slave_0 entered promiscuous mode [ 294.340347] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.347093] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.355863] device bridge_slave_1 entered promiscuous mode [ 294.649769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 295.028365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 295.935432] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.333249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 296.389524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.648620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 296.655966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.074467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 297.081897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.730052] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 298.244939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 298.253952] team0: Port device team_slave_0 added [ 298.624484] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 298.632786] team0: Port device team_slave_1 added 07:37:12 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20001ffffffe) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) [ 298.978380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 298.985747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 298.994874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.023985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 299.040069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.048179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.273585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 299.280713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 299.290428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.471496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 299.479569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.488869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.749818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 299.757690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.766769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.942580] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.137651] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.144272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.151299] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.157950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.166533] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.174162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.945366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.701920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 07:37:19 executing program 2: [ 305.487068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.493685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.501893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.057680] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.339246] 8021q: adding VLAN 0 to HW filter on device bond0 07:37:23 executing program 3: [ 309.865371] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 310.183998] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 310.190264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.198291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.480401] 8021q: adding VLAN 0 to HW filter on device team0 07:37:26 executing program 4: 07:37:26 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/145) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1e) shmget(0x1, 0x2000, 0x20, &(0x7f0000ffb000/0x2000)=nil) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x7, 0x4) getpeername(r1, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000200)=0x80) geteuid() listen(r2, 0x102f) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) write$binfmt_script(r2, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'posix_acl_access:'}, {0x20, 'ipvs\x00'}, {0x20, '[vmnet1*$'}, {0x20, 'ipvs\x00'}, {0x20, 'ipvs\x00'}, {0x20, "2a2d87276370757365742c28"}, {0x20, '*{['}], 0xa, "7f4928194c90d7f95037e824e14eaef34af868d5849a85e2907ef18e69d1a26d5d4b7a38ce769c51619945d34bc5ba85247086337437b3770a334460d12a2c0e61a7"}, 0x8c) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000380)) sendmsg$nl_crypto(r1, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)=@get={0x120, 0x13, 0x321, 0x70bd2d, 0x25dfdbfb, {{'cbc(aes-aesni)\x00'}, [], [], 0x2400}, [{0x8, 0x1, 0x44da}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x100000001}, {0x8, 0x1, 0x400}, {0x8, 0x1, 0x10000}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x7ca}]}, 0x120}, 0x1, 0x0, 0x0, 0x80}, 0x1) write$P9_RXATTRWALK(r0, &(0x7f00000005c0)={0xf, 0x1f, 0x2, 0x2}, 0xf) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000600)={0xf9, 0x0, [0x0, 0x5, 0x66a3, 0x5]}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000680)={0x0, 0xb00}, 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r3, 0x4032}, 0x8) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000700)={0x6, 0x9, 0x9, 0x90, 0xfffffffffffffa95, 0x3ffc0000000000, 0x1, 0xffffffff, 0x6}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000800)={0x10, 0x30, 0xfa00, {&(0x7f00000007c0)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x18}, 0x40}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000840)={0x11, 0x10, 0xfa00, {&(0x7f0000000780), r6}}, 0x18) r7 = dup2(r1, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r7, 0x400448c8, &(0x7f0000000980)={r0, r4, 0x8, 0x1, &(0x7f0000000880)="02f97f711797bd9beb8b02c662755091afc7ed52188d8c0de941a6a242fdf50be1cfc82158a074b5fb775fa1c8b1609058d36241dddf58f4f1c729fd8bb1a337e7e93cdeb08e7bfb6188aa50467a8db62b2f715727cca699869723ff13e727e767925e14adbde776f7f2ba71ce5cc0dd583df9cd5c8ead3274812ae4ed3eed9d1b258703e50888b40fd1c5c036537160bfbabea57b68295f4cb2ce3e90ce870c8ca442fc7cd3e6e0b3018e9cf25151322212de795608cccdfe72800edbefdd6a52f892f0806fcb831fbb90dd49e52a5c15160f58818daa3c7c44401e009c", 0x10000, 0xffffffff, 0x100000001, 0xfffffffffffffffb, 0x9, 0x9, 0xd8, "aeb75f200708d18b0bd771a6e869458c489509d2ed0a1dac439447d11754a3b24cdbcb81f0e407cfde66471f4b02877cea7243949645c6e0e9cf66896d62453a6c74cdfe039a0d716931ba9ac4797275c1"}) write$binfmt_elf32(r5, &(0x7f0000000a00)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffff800, 0x0, 0x6, 0x1, 0x80000001, 0x3, 0x3f, 0x6, 0x232, 0x38, 0xc5, 0x100000001, 0x1, 0x20, 0x2, 0x9, 0x9, 0xffffffff7fffffff}, [{0x6, 0x4, 0x80, 0x9, 0x1, 0x1, 0x9, 0x4}, {0x70000000, 0x6456, 0xfffffffffffffff7, 0x9, 0xfffffffffffffffb, 0x1, 0x2, 0x6}], "a57dfdde032b4a02d9d84e70aa8da437919cc34e1d961a717653b31bacdb021bbbef83dca71eacc87e32ffb041a808fe5bedcf589c32a2ffdf05734ac8279da50b2871096f69c3a836a965ca9b339590449d0720e2405848ccfa38fc9e91bdf84833b31a369109335d2d70c7745ff3b32c641b5d6bc05c8d038842aae4abd1c42564e6191df1c336aa1a76f54672295d294255427b5a213e931a357cf4b123ae47eb3b347305afc14a63c82b9a6a236e81d4292cfd", [[], []]}, 0x32d) socket$unix(0x1, 0x5, 0x0) r8 = gettid() r9 = syz_open_procfs$namespace(r8, &(0x7f0000000d40)='ns/uts\x00') write(r9, &(0x7f0000000d80)="ce1241e3a82e31aa577110941dd7b80354715a7155e0f7385b12ba457e5a07d6735a764713ad59642ec2e90d4a580aab879be8c790db575a3317d0d84ace7e857d81a1e495553e9d06e6f5960f44f9f6c02d77d005923529ac5705fb773fcf42443071359225c362294ad4f79ea20605302d35f70808bf57ba33a9dcd9d4bb94819a6964c0cc2c34ef0fa7ed0241ce2a9c9569ee1c1c5fc2d99f3d301b7be420a287fbfd7c6f011e0d3858847827b2b48a370c44afe9a199dc35793fb0bcbc275cf9c4b3b0b787b6c6960c921dd08a651a5469e2b0b5a7e9c7f2a70f", 0xdc) 07:37:26 executing program 2: 07:37:26 executing program 0: syz_emit_ethernet(0xffffffffffffffe3, &(0x7f00000000c0)={@empty, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x3, 0x6, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, &(0x7f0000000080)) 07:37:26 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20001ffffffe) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x4) 07:37:26 executing program 3: 07:37:26 executing program 2: 07:37:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x8000) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000040)) pwrite64(r0, &(0x7f0000000280)="80", 0x1, 0x0) 07:37:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000008a80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000001c0)=""/92, 0x5c}}], 0x349, 0x0, &(0x7f0000009f00)={0x77359400}) shutdown(r1, 0x1) 07:37:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x2) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000080)=0xffffffffffffffff) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x2, {{0x2, 0x3, 0x1}, 0xffffffff80000001}}, 0x18) 07:37:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000), 0x4) fchmod(r0, 0x18) 07:37:27 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000040)={0x90, 0x0, [0x800000000002, 0x4, 0x6, 0x9]}) 07:37:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create(0xffffffffffffffe0) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x2c, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0xc, 0x2b, [@nested={0x8, 0x1, [@generic="4b97e19e"]}]}]}, 0x2c}}, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x279, 0x4000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in6=@mcast2, 0x4e23, 0x8, 0x4e20, 0xfffffffffffffffc, 0xa, 0x20, 0xa0, 0x3b, r1, r6}, {0x400, 0x39, 0x2, 0x8001, 0x99f2, 0x100, 0x6, 0xff}, {0x20, 0xffffffffffffff68, 0x3, 0x3}, 0x1ff, 0x6e6bc0, 0x1, 0x1}, {{@in6, 0x4d4, 0x32}, 0x0, @in=@remote, 0x3505, 0x3, 0x5ae4217375305294, 0x200000000000000, 0x37, 0x400, 0x6}}, 0xe8) chmod(&(0x7f0000000180)='./file0\x00', 0x21) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={r5, 0x0, 0x5}, &(0x7f0000000140)=0x8) [ 313.931081] IPVS: ftp: loaded support on port[0] = 21 [ 315.247094] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.253614] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.261327] device bridge_slave_0 entered promiscuous mode [ 315.343310] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.349749] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.358073] device bridge_slave_1 entered promiscuous mode [ 315.436415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 315.512977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 315.751195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 315.834569] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 315.985737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 315.992774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.227840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 316.235591] team0: Port device team_slave_0 added [ 316.313703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 316.321513] team0: Port device team_slave_1 added [ 316.399401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.479353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.562183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 316.569578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.579828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.654406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 316.661932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.670997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.975906] ip (8154) used greatest stack depth: 53216 bytes left [ 317.556495] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.562976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.569719] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.576305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.584273] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 317.931931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.802877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.099512] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 321.387862] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 321.394215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.402087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.692225] 8021q: adding VLAN 0 to HW filter on device team0 07:37:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000002c0)={0xfff, 0x24f, 0x10001}) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x2) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x1, 0x7, 0x1, 0x4}) getxattr(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000b29f57)=@known="73656375726974792e6361706162696c69747900c9bd3012983e02155960196a2a84585f19c1c826172982a8de1ccc4cdc6987ffc9715cef22cee4c673d4388d5e5604a0b838afb35bd352e4c9ee649a771208309ca436bf919fd9636bfa255ff4b31f40f88ecc9c2d812171c412624f0c142fc54f65f49239f27686c17d489e925da19bf31e30ec75cd92237957661ce8a1568418e6d3d428174f89a11cc821fbf64122a36f6b411c", &(0x7f0000227f74)=""/140, 0x0) 07:37:37 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt(r2, 0x3, 0x3ff, &(0x7f0000000200)=""/94, &(0x7f0000000280)=0x5e) setsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000140)=0x80, 0x4) 07:37:37 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x7, 0x1000, 0x4, 0xfffffffffffffff7}, 0x8) fstat(r0, &(0x7f0000000080)) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read(r1, &(0x7f0000000100), 0x0) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0xc0, 0x3, 0x1}, 0x5}}, 0x18) 07:37:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='timers\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00'], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r1, 0xb4}, 0xfffffffffffffda4) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) r2 = socket$kcm(0x2, 0x3, 0x2) setsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000140)="81ddcf828ad60ea06eac870c0e87b756247e3330c06f75586422efe5fe1122b6", 0x20) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000070000008307040000001800"], 0x18}, 0x0) 07:37:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000100)=""/147, 0x20000}, 0x18) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0xffffffffffffffa2, &(0x7f00000000c0), 0x282, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000048a696335a7f2ce34d99d273aa51769cd7e8dd7abf2f803602e287cef9d1578e01606b1ad7da81f7e2043df2101e95fe5d8b8a9ad7f425f40c847f25d1dc", @ANYRES32=r1, @ANYRES32=r0], 0x18}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ppoll(&(0x7f0000000040)=[{r0}, {r2, 0x100}], 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) r3 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x0, 0x2) write$FUSE_LSEEK(r3, &(0x7f0000000240)={0x18, 0x0, 0x2, {0x4}}, 0x18) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000)=0xb9, 0x4) 07:37:37 executing program 3: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)="6367726f75702e70726f63730081605bb2222ec065df9c88726df8844eb0cf6340854cece5484be84c90c5800991c11affe00b79bf", 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) socket$inet_sctp(0x2, 0x0, 0x84) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x100000000000008a, 0x0) 07:37:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000180)="0a5c2d02402b6285717070") open_by_handle_at(r0, &(0x7f0000000080)={0xd6, 0x6, "2d1fc2b5516f91fc116b1b82c73ff7febc92b980cf961840ad892a45ad2182dabef2f418346291043472750ec42f0a3ff281300c22b554e600844d250ce9da3441fd5d8ff2a0840db754771748bce0148d59bbb9ee0d92da7c6d98ce17f164de8767ab5e36d984882c73fa861d4ebd6de3f8ade226162dc902064a429f2a865f6f70835ef41cd29d10bc5b8da56c333de76114ca75cf42b95053574848b840e6cbdcdf0f0fe0c12c7c09872c2771f02f177e800ac074ceca479e3f7ecd044aca0bc35b332ee7e01adc8c8fbbb281"}, 0x94000) syz_emit_ethernet(0xff27, &(0x7f0000000000)=ANY=[@ANYBLOB="ffe0ffffffffffffffdeffff08004500fec300000000002f9078ac14ffbbe0000001000043050008907845486676ae387baf3e3b85e63c9170dbd751b5e6d826"], 0x0) 07:37:38 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x1ff, [0x400, 0xfffffffffffffff7, 0x0, 0x9, 0x9, 0xff, 0x4, 0x9, 0x6, 0x167d, 0xfff, 0x8, 0x0, 0x3, 0x2, 0x3, 0xb0b5, 0x80000001, 0x2, 0x401, 0x7fffffff, 0x0, 0x1ff, 0x7, 0x3, 0x2, 0x6, 0x0, 0xe83d, 0x1, 0x9, 0x2d800000, 0xfffffffffffff000, 0x800, 0x100000001, 0x12126c0c, 0x92, 0xfcf, 0x4, 0x1, 0x3, 0xa000000000000, 0x9d43, 0x7ff, 0x3, 0xfffffffffffffffe, 0x6, 0xb08], 0x1}) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) 07:37:38 executing program 4: syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r0 = getpid() wait4(r0, &(0x7f00000000c0), 0x1, &(0x7f00000001c0)) r1 = memfd_create(&(0x7f0000000000)='/dev/snd/seq\x00', 0x1) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0xe, 0x2, 0x1, {0x3, 0x8, 0x4ba8}}) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x5017, {0x4, 0x9, 0x187, 0x8, 0xffff, 0xffffffffffffdc7d}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}) lseek(r1, 0x0, 0x3) 07:37:38 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000480)=@req={0x28, &(0x7f0000000440)={'syz_tun\x00', @ifru_hwaddr=@dev={[], 0x1c}}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x10000000004e24, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000280)={0x6, 0x8200, 0x3, 0x9, 0x0}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x856, 0xaa, 0x1, 0x2, 0x20}, 0x98) syncfs(r1) bind$inet(r1, &(0x7f0000dc7ff0)={0x2, 0x4e24, @local}, 0x10) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000200)={0x800, 0x89, 0x0, [], &(0x7f00000001c0)=0x100}) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000140)=0x9, &(0x7f0000000180)=0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)=""/147, &(0x7f0000000000)=0x93) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000003c0)={'lo\x00', 0x400}) preadv(0xffffffffffffffff, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0x7f}], 0x1, 0x102) 07:37:38 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000002c0)={0xfff, 0x24f, 0x10001}) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x2) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x1, 0x7, 0x1, 0x4}) getxattr(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000b29f57)=@known="73656375726974792e6361706162696c69747900c9bd3012983e02155960196a2a84585f19c1c826172982a8de1ccc4cdc6987ffc9715cef22cee4c673d4388d5e5604a0b838afb35bd352e4c9ee649a771208309ca436bf919fd9636bfa255ff4b31f40f88ecc9c2d812171c412624f0c142fc54f65f49239f27686c17d489e925da19bf31e30ec75cd92237957661ce8a1568418e6d3d428174f89a11cc821fbf64122a36f6b411c", &(0x7f0000227f74)=""/140, 0x0) 07:37:38 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0x3, 0x1000000200007d}) 07:37:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x80, 0x800) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r4 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x7, 0x48040) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x0, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {r5, 0x83}}, 0x10) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000180)={0x401, 0x7, 0x4, 0x11040, {r2, r3/1000+10000}, {0x1, 0x8, 0x7fffffff, 0xb8, 0xd09, 0x0, "a3124ced"}, 0x3, 0x3, @userptr=0x5, 0x4}) r6 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0xaa40, 0x8001) fcntl$getownex(r4, 0x10, &(0x7f0000000540)) ioctl$DRM_IOCTL_WAIT_VBLANK(r6, 0xc018643a, &(0x7f00000003c0)={0x40000000, 0x3, 0x24}) read(r0, &(0x7f00000000c0)=""/182, 0x3b) r7 = socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x80001, 0x100000000) r8 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x8001, 0x935696b08fda2095) ioctl$KVM_PPC_GET_SMMU_INFO(r8, 0x8250aea6, &(0x7f00000002c0)=""/139) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x9}, 0x8) r9 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x1, 0x400000) write$input_event(r9, &(0x7f0000000240)={{0x0, 0x2710}, 0x17, 0xffff, 0x1000}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000500)={@mcast1, 0x100000000, 0x1, 0x0, 0x1, 0x8, 0x100000000, 0x80}, 0x20) 07:37:38 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x1ff, [0x400, 0xfffffffffffffff7, 0x0, 0x9, 0x9, 0xff, 0x4, 0x9, 0x6, 0x167d, 0xfff, 0x8, 0x0, 0x3, 0x2, 0x3, 0xb0b5, 0x80000001, 0x2, 0x401, 0x7fffffff, 0x0, 0x1ff, 0x7, 0x3, 0x2, 0x6, 0x0, 0xe83d, 0x1, 0x9, 0x2d800000, 0xfffffffffffff000, 0x800, 0x100000001, 0x12126c0c, 0x92, 0xfcf, 0x4, 0x1, 0x3, 0xa000000000000, 0x9d43, 0x7ff, 0x3, 0xfffffffffffffffe, 0x6, 0xb08], 0x1}) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) 07:37:38 executing program 4: r0 = socket$inet(0x2, 0x0, 0x81) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) shutdown(r0, 0x1) select(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) socket$xdp(0x2c, 0x3, 0x0) 07:37:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x80000) ioctl$KDDELIO(r2, 0x4b35, 0x3) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) 07:37:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) socket$kcm(0x29, 0x9, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="06000000000000101909000001000000000000000000000004000000ff0f00004700000000000000000000000000000000000000000000000400000007000000000000000000000000000080000010000700000000000000000000000000000000000000000000001f000000060000000000000000000000080000000100000000000000000000000000000000000000000000000000000028ffffff03000000000000000000000068000000010000000000000000000000000000000000000000000000000000000200000005000000000000000000000007000000020000000000000000000000000000000000000000000000000000000000000002000000000000000000000081000000000000000300000000000000050000000000000003000000700a0000"]) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x3ff}, &(0x7f0000000240)=0x8) 07:37:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5f, 0x800, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b40)={r0, &(0x7f00000000c0), &(0x7f0000000100)=""/2}, 0x18) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/llc\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000072c0)={'gretap0\x00', 0x0}) connect$packet(r2, &(0x7f0000007300)={0x11, 0x17, r3, 0x1, 0x79a, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) setsockopt(r1, 0x3a, 0x1, &(0x7f0000000080)="16", 0x1) syz_emit_ethernet(0x66, &(0x7f0000101000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [], @rand_addr}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 07:37:39 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x1ff, [0x400, 0xfffffffffffffff7, 0x0, 0x9, 0x9, 0xff, 0x4, 0x9, 0x6, 0x167d, 0xfff, 0x8, 0x0, 0x3, 0x2, 0x3, 0xb0b5, 0x80000001, 0x2, 0x401, 0x7fffffff, 0x0, 0x1ff, 0x7, 0x3, 0x2, 0x6, 0x0, 0xe83d, 0x1, 0x9, 0x2d800000, 0xfffffffffffff000, 0x800, 0x100000001, 0x12126c0c, 0x92, 0xfcf, 0x4, 0x1, 0x3, 0xa000000000000, 0x9d43, 0x7ff, 0x3, 0xfffffffffffffffe, 0x6, 0xb08], 0x1}) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) 07:37:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") socketpair(0x11, 0x800, 0x1682, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000180)={"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"}) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000140)={0x56aa, 0x11, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000007000/0x2000)=nil, 0x2, 0x0, 0x6012, r4, 0x2000) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x218) rt_sigreturn() 07:37:39 executing program 1: r0 = getpgrp(0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000000000)={0x15, 0xffffffffffffffa0, 0x7ff, 0x9981}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xfd, 0xfffffffffffffffe, &(0x7f0000000100)='GPL\x00'}, 0x48) 07:37:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232aeb414ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)="290400"}, 0x30) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) 07:37:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000300)=0x2, 0x4) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f00000005c0)=ANY=[]}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x80102, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000200)={0xf, 0x1f, 0x1, 0x1a1b20}, 0xf) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000240)={0x322a, 0x1, {0x0, 0x3, 0x1ff, 0x1, 0x8}}) [ 325.598084] x86/PAT: syz-executor2:8414 map pfn RAM range req write-combining for [mem 0x199e92000-0x199e92fff], got write-back [ 325.721115] PANIC: double fault, error_code: 0x0 [ 325.725988] CPU: 1 PID: 8414 Comm: syz-executor2 Not tainted 4.19.0+ #82 [ 325.732870] ================================================================== [ 325.740273] BUG: KMSAN: uninit-value in irq_work_claim+0x153/0x390 [ 325.746619] CPU: 1 PID: 8414 Comm: syz-executor2 Not tainted 4.19.0+ #82 [ 325.753480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.762848] Call Trace: [ 325.765453] <#DF> [ 325.767636] dump_stack+0x32d/0x480 [ 325.771299] ? irq_work_claim+0x153/0x390 [ 325.775494] kmsan_report+0x19f/0x300 [ 325.779335] kmsan_internal_check_memory+0x35f/0x450 [ 325.784482] ? __msan_poison_alloca+0x1e0/0x2b0 [ 325.789210] kmsan_check_memory+0xd/0x10 [ 325.793655] irq_work_claim+0x153/0x390 [ 325.797674] irq_work_queue+0x44/0x280 [ 325.801597] vprintk_emit+0x693/0x790 [ 325.805454] vprintk_default+0x90/0xa0 [ 325.809379] vprintk_func+0x26b/0x2a0 [ 325.813212] printk+0x1a3/0x1f0 [ 325.816578] dump_stack_print_info+0x2c4/0x3c0 07:37:39 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x1ff, [0x400, 0xfffffffffffffff7, 0x0, 0x9, 0x9, 0xff, 0x4, 0x9, 0x6, 0x167d, 0xfff, 0x8, 0x0, 0x3, 0x2, 0x3, 0xb0b5, 0x80000001, 0x2, 0x401, 0x7fffffff, 0x0, 0x1ff, 0x7, 0x3, 0x2, 0x6, 0x0, 0xe83d, 0x1, 0x9, 0x2d800000, 0xfffffffffffff000, 0x800, 0x100000001, 0x12126c0c, 0x92, 0xfcf, 0x4, 0x1, 0x3, 0xa000000000000, 0x9d43, 0x7ff, 0x3, 0xfffffffffffffffe, 0x6, 0xb08], 0x1}) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) [ 325.821204] show_regs_print_info+0x37/0x40 [ 325.825587] show_regs+0x38/0x170 [ 325.829090] df_debug+0x86/0xb0 [ 325.832401] do_double_fault+0x362/0x480 [ 325.836510] double_fault+0x1e/0x30 [ 325.840165] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 325.845635] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 [ 325.864749] RSP: 0018:fffffe000003d000 EFLAGS: 00010086 07:37:39 executing program 5: capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x0) [ 325.870163] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 325.877470] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe000003d150 [ 325.884782] RBP: fffffe000003d018 R08: 0000000000000000 R09: 0000000000000000 [ 325.892080] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 325.899372] R13: fffffe000003d1c0 R14: fffffe000003d1a8 R15: fffffe000003d1a8 [ 325.906687] [ 325.908942] [ 325.912286] kmsan_memmove_origins+0xbd/0x1d0 [ 325.916832] ? kmsan_memmove_shadow+0xad/0xe0 [ 325.921365] __msan_memmove+0x6c/0x80 [ 325.925207] fixup_bad_iret+0x9b/0x130 [ 325.929146] error_entry+0xad/0xc0 [ 325.932701] RIP: 0000: (null) [ 325.936627] Code: Bad RIP value. [ 325.940017] RSP: a3fb7f:00007fc5636d99c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 325.947930] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 325.955216] RDX: 92e34f766a540900 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.962709] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 325.970000] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 325.977294] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 325.984605] ? general_protection+0x8/0x30 [ 325.988868] ? general_protection+0x8/0x30 [ 325.993146] [ 325.996527] [ 325.998178] Local variable description: ----__ai_ptr@irq_work_claim [ 326.004679] Variable was created at: [ 326.008429] irq_work_claim+0x4b/0x390 [ 326.012349] irq_work_queue+0x44/0x280 [ 326.016261] [ 326.017913] Byte 7 of 8 is uninitialized [ 326.022206] Memory access of size 8 starts at fffffe0000045a38 [ 326.028335] ================================================================== [ 326.035724] Disabling lock debugging due to kernel taint [ 326.041211] Kernel panic - not syncing: panic_on_warn set ... [ 326.041211] [ 326.048633] CPU: 1 PID: 8414 Comm: syz-executor2 Tainted: G B 4.19.0+ #82 [ 326.056882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.066266] Call Trace: [ 326.068865] <#DF> [ 326.071058] dump_stack+0x32d/0x480 [ 326.074748] panic+0x57e/0xb28 [ 326.078026] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 326.083516] kmsan_report+0x300/0x300 [ 326.087357] kmsan_internal_check_memory+0x35f/0x450 [ 326.093013] ? __msan_poison_alloca+0x1e0/0x2b0 [ 326.097741] kmsan_check_memory+0xd/0x10 [ 326.101836] irq_work_claim+0x153/0x390 [ 326.105856] irq_work_queue+0x44/0x280 [ 326.109817] vprintk_emit+0x693/0x790 [ 326.113675] vprintk_default+0x90/0xa0 [ 326.117600] vprintk_func+0x26b/0x2a0 [ 326.121438] printk+0x1a3/0x1f0 [ 326.124801] dump_stack_print_info+0x2c4/0x3c0 [ 326.129436] show_regs_print_info+0x37/0x40 [ 326.133797] show_regs+0x38/0x170 [ 326.137291] df_debug+0x86/0xb0 [ 326.140601] do_double_fault+0x362/0x480 [ 326.144701] double_fault+0x1e/0x30 [ 326.148365] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 326.153834] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 [ 326.172753] RSP: 0018:fffffe000003d000 EFLAGS: 00010086 [ 326.178148] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 326.185432] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe000003d150 [ 326.192718] RBP: fffffe000003d018 R08: 0000000000000000 R09: 0000000000000000 [ 326.200010] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 326.207297] R13: fffffe000003d1c0 R14: fffffe000003d1a8 R15: fffffe000003d1a8 [ 326.214608] [ 326.216856] 07:37:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x10080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r3) r4 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x1, 0x0, {0xffffffffffffffff, 0x3, 0x3, 0x1, 0x5}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r9 = accept$alg(r8, 0x0, 0x0) r10 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r10, 0x0, 0x0, 0x73e0) sendfile(r9, r10, &(0x7f00007ed000), 0xc1) io_getevents(r7, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000001c0)) close(r6) socket$xdp(0x2c, 0x3, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000240)=""/59) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000008, 0x0, r6, &(0x7f0000000140), 0x700000000000}]) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000002c0)=0x0) ptrace$getenv(0x4201, r11, 0x4c00000, &(0x7f0000000300)) [ 326.220172] kmsan_memmove_origins+0xbd/0x1d0 [ 326.224699] ? kmsan_memmove_shadow+0xad/0xe0 [ 326.229228] __msan_memmove+0x6c/0x80 [ 326.233071] fixup_bad_iret+0x9b/0x130 [ 326.236995] error_entry+0xad/0xc0 [ 326.240557] RIP: 0000: (null) [ 326.244480] Code: Bad RIP value. [ 326.247863] RSP: a3fb7f:00007fc5636d99c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 326.255778] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 326.263072] RDX: 92e34f766a540900 RSI: 0000000000000000 RDI: 0000000000000000 [ 326.270361] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 326.277651] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 326.284944] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 326.292265] ? general_protection+0x8/0x30 [ 326.296564] ? general_protection+0x8/0x30 [ 326.300836] [ 326.305229] Kernel Offset: disabled [ 326.308883] Rebooting in 86400 seconds..