[ 57.473715] audit: type=1800 audit(1539240998.502:28): pid=5994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.956132] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 60.453534] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.020972] random: sshd: uninitialized urandom read (32 bytes read) [ 63.999669] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.125' (ECDSA) to the list of known hosts. [ 70.060414] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 06:56:53 fuzzer started [ 74.739555] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 06:56:58 dialing manager at 10.128.0.26:39089 2018/10/11 06:56:58 syscalls: 1 2018/10/11 06:56:58 code coverage: enabled 2018/10/11 06:56:58 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 06:56:58 setuid sandbox: enabled 2018/10/11 06:56:58 namespace sandbox: enabled 2018/10/11 06:56:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 06:56:58 fault injection: enabled 2018/10/11 06:56:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 06:56:58 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 06:56:58 net device setup: enabled [ 79.293670] random: crng init done 06:58:55 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x0, 0x10000032, 0xffffffffffffffff, 0x0) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 195.561832] IPVS: ftp: loaded support on port[0] = 21 [ 197.047605] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.054211] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.062932] device bridge_slave_0 entered promiscuous mode [ 197.204116] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.210585] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.219339] device bridge_slave_1 entered promiscuous mode [ 197.360842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 197.500048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.936430] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.088562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.805427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 198.813804] team0: Port device team_slave_0 added 06:59:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x94c00, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x2}, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 198.950773] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.959099] team0: Port device team_slave_1 added [ 199.097218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.266909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.504684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.512567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.521816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.777968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.785820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.795308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.994013] IPVS: ftp: loaded support on port[0] = 21 [ 202.169030] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.175680] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.184348] device bridge_slave_0 entered promiscuous mode [ 202.317644] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.324268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.331268] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.337866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.347258] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.442841] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.449312] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.458073] device bridge_slave_1 entered promiscuous mode [ 202.640935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.921165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.062675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.630393] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.868965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.157396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 204.164662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.436811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.443985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 06:59:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @broadcast, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) [ 205.402002] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.410127] team0: Port device team_slave_0 added [ 205.707378] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.715637] team0: Port device team_slave_1 added [ 205.856304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.863492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.872663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.003735] IPVS: ftp: loaded support on port[0] = 21 [ 206.159423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.166654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.175814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.486233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.494053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.503368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.806511] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.814230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.823557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.922723] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.929230] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.937925] device bridge_slave_0 entered promiscuous mode [ 209.214484] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.220962] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.229680] device bridge_slave_1 entered promiscuous mode [ 209.488268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.817690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.483459] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.489948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.497011] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.503561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.512790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.552405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.726857] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.993634] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.268757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.276026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.534849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.541993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.506455] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.514806] team0: Port device team_slave_0 added [ 212.838694] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.847105] team0: Port device team_slave_1 added 06:59:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="6d656d6f72790100000016000000ea66571d6ef0133000", 0x26e1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)) [ 213.182194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.189289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.198475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.537527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.545871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.554934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.923096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.958636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.966421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.975684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.298906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.306731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.315818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.703322] IPVS: ftp: loaded support on port[0] = 21 [ 215.382529] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.722722] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.729085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.737286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.082028] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.253849] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.260361] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.269235] device bridge_slave_0 entered promiscuous mode [ 218.316220] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.322754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.329716] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.336327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.345215] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.502059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.638104] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.644695] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.653488] device bridge_slave_1 entered promiscuous mode [ 218.985480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.312028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.345273] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.787744] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.148240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.155429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.542953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.550074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.659952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.668395] team0: Port device team_slave_0 added [ 223.001029] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.009508] team0: Port device team_slave_1 added [ 223.416272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.423932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.433337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.797541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.804765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.813776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:59:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff94}, {0x8000a0ffffffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 224.284018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.291857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.300947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.717753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.725540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.734811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.654453] IPVS: ftp: loaded support on port[0] = 21 [ 225.696699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.268515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.734962] ptrace attach of "/root/syz-executor0"[6156] was attempted by "/root/syz-executor0"[6784] [ 227.792868] ptrace attach of "/root/syz-executor0"[6156] was attempted by "/root/syz-executor0"[6784] 06:59:29 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") creat(&(0x7f0000000400)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, &(0x7f00000001c0)="73a8fe9e92e94bd73a8587247a94fb33bfe48e88e2f01911082592f8e5c36c683d79592bc46c747378f01bdd02ac1c77c39546ccb3e73a2ae2cafb5acee3ec86df0ee5c62ad26a4ce1eceaaee49b607a99da4fa2aba945699ce6787554304192c491e069e76b1a42110717fb38ca4b793b0073b04dae2c14a51263568aec1eef") [ 228.366270] tmpfs: Bad mount option s¨þž’éK×:…‡$z”û3¿äŽˆâð%’øåÃlh 06:59:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001000), 0x0) dup2(r1, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000340), 0xffffffc8) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x4010, r3, 0x12) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r3, &(0x7f0000000100)=0x4, 0x20000000009) r4 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x9) sendfile(r1, r4, &(0x7f00000000c0), 0x3c) accept$alg(r0, 0x0, 0x0) [ 228.426005] tmpfs: Bad mount option s¨þž’éK×:…‡$z”û3¿äŽˆâð%’øåÃlh [ 229.041534] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.048064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.056136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.760263] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.766889] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.775531] device bridge_slave_0 entered promiscuous mode [ 229.865383] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.871938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.878885] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.885490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.894135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 06:59:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="6419915a5527de12", 0x8, 0x0, &(0x7f00000000c0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) chmod(&(0x7f0000000040)='./file0\x00', 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0xa8f}, 0x8) [ 230.279896] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.286590] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.295758] device bridge_slave_1 entered promiscuous mode [ 230.581954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.690169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.713925] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.097370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 06:59:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="8c00000004a9ee1a0cbccbff5748764080d0ebf48c28d85a2986cf948f3cdf3d74e8917278cb848fbd948c8aa01c9a11b9c4d0bfc25f04583b43f6e313ad3e175635f48d2c07030037ab2feea167acb5d8a1a7409e12113e686903f3c5a20b25e9d937499494cee2bf83661c480c2c9951702e4a85324a405dc1edfc3597e5b1d1f4a0e01e50393fbbecc1b6b04dbf9d1f78530001a17dd7974645a24a2fc47f5f92a6334ee09af26bf3f7813cc1d9aea71f0b3ecdf0bb7512c79ab97ee9ac0447b5efb1df65470c7ecb1fd9894187ff33a8de6b0e6697ac6a86145669b6266edf3d144913b1cabe53dd70d9f830"], &(0x7f0000000200)=0x94) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000240)={r3, 0x8}, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6ec0c0, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000080)) bind(r0, &(0x7f0000000500)=@vsock={0x28, 0x0, 0x0, @my}, 0x80) 06:59:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) accept(r1, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) 06:59:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) accept(r1, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) [ 232.680884] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.128358] bond0: Enslaving bond_slave_1 as an active interface with an up link 06:59:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) accept(r1, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) [ 233.602291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.609405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.056927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 234.064240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 06:59:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) accept(r1, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) [ 235.419186] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.427840] team0: Port device team_slave_0 added [ 235.682936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.807024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.815686] team0: Port device team_slave_1 added [ 236.186950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.194127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.203023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.662857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 236.669985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.678842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.964541] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.006856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.014510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.023433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.415889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.423730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.432914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.165139] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.171537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.179451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.328062] 8021q: adding VLAN 0 to HW filter on device team0 06:59:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x94c00, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x2}, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 240.583370] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.589867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.596911] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.603453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.612172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.618758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.511305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.454462] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 06:59:46 executing program 2: [ 245.300774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.307381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.315484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.863468] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.447807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.025197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 06:59:50 executing program 3: [ 249.587034] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.593585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.601688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.926889] 8021q: adding VLAN 0 to HW filter on device team0 06:59:53 executing program 4: 06:59:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) accept(r1, 0x0, &(0x7f0000000140)) 06:59:53 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x2000, 0x1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {0x7, 0x280000000000000, 0x6, 0x2}, 0x45, [0x80000001, 0x1, 0x1f, 0x7, 0x0, 0x3403, 0x6, 0x100, 0x9, 0x7, 0x1, 0x0, 0x8, 0x2, 0x8000, 0x0, 0x8000, 0x2, 0x1, 0x3, 0x3, 0x7, 0x100000001, 0x3, 0x6, 0x8, 0x0, 0x100000001, 0x3, 0x400, 0x82, 0x0, 0x9, 0x80000000, 0x1, 0x8, 0x80, 0x5, 0x7, 0x5, 0xffffffffffffffc1, 0x3, 0x8, 0x4000000000, 0x0, 0x1, 0x800, 0xfffffffffffffffb, 0x4, 0x676, 0x5, 0x80000000, 0x2e1, 0x20, 0xfff, 0x3, 0x0, 0x2, 0xfffffffffffffff7, 0x8, 0x2, 0x7, 0x8], [0x3, 0xff, 0x401, 0x5, 0x2, 0x5, 0x7, 0x2, 0x6, 0x2, 0x6, 0x7, 0x8001, 0xffffffff80000001, 0x5, 0x100000000, 0x2000000000000, 0x8, 0x3, 0x101, 0xffffffffffffff1f, 0x2, 0x0, 0xffff, 0x4, 0x3, 0x8, 0x10000, 0x3, 0x0, 0xff, 0xfffffffffffffffb, 0x7fffffff, 0x2b, 0x8, 0x2, 0x0, 0xe45e, 0x4, 0x8000, 0x0, 0x4, 0x6, 0x7, 0x7, 0x1, 0x8, 0x7, 0xffffffffffffef86, 0x100000001, 0xff, 0x8, 0x3, 0x6, 0xffffffffffffffff, 0x7f, 0x2, 0x1d, 0xefcb, 0x6, 0x4, 0xa00000000, 0xfbd, 0x2], [0x400, 0x1cdac8f8, 0x5a, 0x7f, 0x1, 0x2, 0x800, 0x3ff, 0x1, 0x9, 0x8, 0x1ff, 0x7ff, 0x8, 0xffffffff80000000, 0x9, 0xffff, 0x0, 0x5, 0x7, 0x1, 0x0, 0x0, 0x80, 0x4, 0x193824, 0x9, 0x5, 0x3c5, 0x6, 0x5, 0x9, 0xffffffffffffff81, 0x6, 0x401, 0x7, 0x80, 0x867b, 0x9, 0x400, 0x81, 0xa32, 0x100, 0x4, 0x0, 0x402d16fe, 0x9, 0xb0a9, 0x100000001, 0x4f, 0x1000000000000, 0x800, 0x86c, 0x40, 0x7, 0x4, 0x9, 0x7b2e, 0x8, 0x3ff, 0x80000001, 0x4, 0x100, 0x8000], [0x2, 0x5, 0xff, 0x4, 0x2, 0x0, 0x7f, 0x3, 0x2, 0xfffffffffffffffd, 0x5, 0x100000000, 0x3, 0x9, 0x0, 0x9, 0x401, 0x100000001, 0x8, 0x100000001, 0x3, 0x1000, 0xe036, 0x8, 0x0, 0x1, 0x80000000, 0x1, 0x6, 0x125a, 0x0, 0x0, 0x3, 0xe94, 0x8, 0xfff, 0x8, 0x8, 0x401, 0x1000, 0x8, 0x2, 0x4, 0x10001, 0xffffffff, 0x2, 0x0, 0x2, 0x1f, 0x6c, 0x0, 0x8, 0x0, 0x9, 0x2, 0x100000000, 0x2, 0x8, 0x4, 0x7ff, 0x4, 0x0, 0x1, 0xbbb2]}, 0x45c) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000540)=0x8) write$uinput_user_dev(r0, &(0x7f0000000580)={'syz0\x00', {0x4, 0x10000, 0x3, 0x80000000}, 0x46, [0x7542, 0x2, 0x7, 0x8, 0xffffffffffffffff, 0xd9, 0x946, 0x5, 0xfffffffffffffff8, 0x9, 0x2, 0x3e9, 0x0, 0x1, 0x1, 0x3, 0x5d1, 0x5c, 0x7f, 0x20, 0xfffffffffffffffc, 0x7, 0x5, 0x7, 0x80000000, 0x5, 0x7, 0x4, 0x2, 0x4, 0x4, 0x7, 0x100000000, 0x3, 0xfffffffffffffffc, 0x8001, 0x4, 0x2, 0x1, 0x9f, 0x61c, 0x2, 0x101, 0x2, 0x4, 0xfffffffffffffff8, 0x4, 0x40, 0xbde, 0x7, 0x2000000, 0x2, 0x6, 0x3, 0x1ff, 0x10000, 0x3, 0x7, 0x6, 0x3, 0x7, 0x0, 0x1, 0x1f], [0x9, 0x80, 0x100000000, 0x2, 0x2, 0x1, 0xd64000000, 0x4, 0x1, 0x3, 0x7fff, 0x0, 0x9, 0x8001, 0x3, 0xffff, 0x7400, 0x3, 0x8, 0x8001, 0x5, 0x2, 0x8, 0x1, 0x8, 0x3, 0x9, 0x9, 0x0, 0x3569, 0x1000, 0x7fff, 0x9, 0x3ff, 0xfffffffffffffff8, 0x7fffffff, 0xffffffffffffffdb, 0x2, 0xffff, 0x10001, 0x7ff, 0x6, 0x6, 0x7, 0x80000000, 0x7fffffff, 0x40, 0x305b, 0xfffffffffffffffe, 0x5, 0x8, 0x23f5274d, 0x100000001, 0x11cd, 0x0, 0x7, 0x404000000000, 0x10000, 0x12, 0x3, 0xfff, 0x7, 0x4], [0x6, 0xffffffffffffff21, 0x7ff, 0x6, 0x2, 0x8, 0x9, 0x10000000000000, 0x5, 0x1, 0x7, 0x80, 0x6, 0x0, 0xc, 0x2, 0xf898, 0x5, 0x10000000, 0x1, 0x3, 0x401, 0x4, 0x37a1, 0x97, 0x5, 0x3941, 0xffffffff, 0x200, 0x0, 0x3, 0xe34, 0x800, 0x4, 0x0, 0x1, 0x0, 0x6, 0x9, 0x800, 0xffffffff, 0x7, 0x1000, 0x800, 0x5, 0x0, 0x6, 0xa279, 0x7fffffff, 0x1f, 0x80000001, 0x8, 0x20000, 0x8, 0x5, 0x5, 0x3, 0x80000001, 0xfb17, 0x100000000000, 0x6, 0x1f, 0x4, 0x80], [0x81, 0xe4, 0x273, 0x2, 0x9, 0x7, 0x10000, 0x9, 0x7, 0xffffffffffff3a41, 0x2, 0x7, 0x0, 0x100000001, 0x8, 0x3, 0x4, 0x741af8d1, 0x3, 0x6, 0x100000001, 0xb2f, 0x7, 0xfffffffffffffff7, 0x3ff, 0x4, 0x1, 0x5, 0x4d38fce3, 0x6e6a, 0x40, 0xe74, 0xffffffffb41fb149, 0x7ff, 0x1f, 0xffffffffffffff00, 0xffffffffffffffff, 0x7f, 0x100, 0x196, 0x9538, 0x947b, 0xffffffffffffff80, 0x4, 0x5, 0x3, 0x6, 0x7, 0xfff, 0x800, 0x76, 0xf21, 0x7fff, 0x0, 0x4, 0xd3, 0x10001, 0xfff, 0x9, 0xff, 0xa42, 0x3, 0x1, 0xd341]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x14) clone(0x40000, &(0x7f0000000a00)="d836affa1c248cdebd3ad8de898d6c6efa188031387f43d09cb3e45d124edef05854d802eaec104fe3cd0ef3e6888a26f29e8eb128914849f57c13ba13326161229d7e1a1f63a248bd6d99d54a8403c4baea4698e1bfc85447c502047ced4092fc67327dd055dd95fdea3727673b374501adc82d75d8a8d8ec5b1131fd1976e81e6c783356b90d937461832de232fdbbbe30a21e9f04", &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="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") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000001b40)={0x6, 0x401, 0x10000, 0x8, 0x80}, 0x14) write$uinput_user_dev(r0, &(0x7f0000001b80)={'syz0\x00', {0x80, 0x6, 0x1, 0x71}, 0x1a, [0x3, 0x1, 0x4, 0x2, 0x1, 0x1, 0x59f, 0x8, 0x9, 0x3, 0x1, 0x6, 0x9, 0xcba, 0x6, 0x0, 0x5, 0x100000001, 0xfffffffffffffc01, 0xa00000000, 0x7, 0xffff, 0x9, 0x4, 0x5427, 0x0, 0x80000001, 0x1, 0xef, 0x2, 0x9, 0x530, 0x1, 0x7, 0x9, 0x100000001, 0x8, 0x7fffffff, 0xffffffffffffffc1, 0x709, 0x224, 0x4, 0x3dc, 0x80, 0x21d, 0x3, 0x1, 0x5, 0x8001, 0x0, 0x6, 0x194d, 0x1, 0x0, 0x7, 0x476b74af, 0x80000001, 0x528, 0x9, 0x80000001, 0x7, 0x8, 0x6, 0x800], [0x1d7a, 0xfffffffffffffff8, 0x400, 0x10001, 0x8, 0x40, 0x80000001, 0x6, 0x80000000, 0x800, 0x101, 0x6, 0x439, 0x7, 0x800, 0xd8, 0x2, 0xc0, 0x2, 0x7, 0x1, 0xec, 0x60, 0x7fff, 0x41b15fe8, 0x2, 0x0, 0x10000, 0x3, 0x6, 0x6, 0x1, 0x73bd, 0xfad, 0x0, 0x5, 0x10000, 0xffffffff, 0x37, 0x8001, 0x800, 0x452, 0x2db, 0x4, 0x0, 0x189, 0x2000000000000, 0x0, 0x24e30982, 0x6, 0x800, 0x3, 0x1, 0x8, 0x7fff, 0x2, 0x765, 0x0, 0x8, 0x6, 0x8, 0x7fffffff, 0x8001, 0x1], [0x6, 0x67, 0x0, 0x10000, 0x2, 0xfffffffffffffff9, 0xfff, 0x3, 0xff, 0x6, 0x7b12, 0x0, 0xad, 0x3, 0x0, 0x1, 0x380000000, 0x6, 0xfffffffffffff801, 0x8, 0x203, 0x7, 0x9, 0xa4, 0x6, 0x8a1, 0x6, 0x5, 0x8, 0x20, 0x1, 0xfff, 0x97, 0x80000000, 0x1, 0x1, 0x3, 0x401, 0x6, 0x7ff, 0x3, 0x42a0, 0x6, 0xe7, 0x6, 0x9, 0x7, 0x401, 0x6, 0x3, 0xffffffff, 0x7fffffff, 0x40, 0x3, 0xe0, 0x7, 0x20, 0x8, 0x3, 0x5, 0xe0df, 0x4, 0x1, 0x8], [0x401, 0x40, 0x8, 0x5, 0x1, 0x20, 0x2800000000000000, 0x9, 0x8, 0xb3, 0xfffffffffffffff7, 0xcfc9, 0x2, 0x5, 0x7, 0x7, 0x401, 0x0, 0xcbed, 0x8, 0x5, 0x1, 0x180000, 0x8, 0x6b, 0x97a, 0x7f, 0x5e6b617a, 0x80000000, 0x7, 0x800, 0x80000000, 0x18, 0x8, 0x9, 0x3, 0xc684, 0x1000, 0x5e3f, 0x2, 0x3, 0x4, 0x5, 0x3ff, 0x1, 0x4, 0x4, 0x0, 0x2, 0x5b7, 0x81, 0xe88, 0x2, 0xca, 0x0, 0x1, 0x2, 0x7d331f3f, 0x5b1, 0x7, 0x2, 0x7, 0x4, 0x80000000]}, 0x45c) flistxattr(r0, &(0x7f0000002000)=""/227, 0xe3) clock_nanosleep(0x7, 0x1, &(0x7f0000002100)={0x77359400}, &(0x7f0000002140)) prctl$getname(0x10, &(0x7f0000002180)=""/145) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000002240)) r1 = getpgid(0x0) ptrace$peekuser(0x3, r1, 0xffffffffffffffda) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000002280)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000002340)={{&(0x7f00000022c0)=""/64, 0x40}, &(0x7f0000002300), 0x8}, 0x20) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x9) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000002380)=""/152) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000024c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002500)=0x24) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002540)={r2, 0x101}, &(0x7f0000002580)=0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000025c0)=[@in6={0xa, 0x4e22, 0x601a0000, @ipv4, 0x9}, @in6={0xa, 0x4e24, 0x200, @ipv4={[], [], @multicast1}, 0x7ff}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e22, 0xe805, @local, 0x3}, @in={0x2, 0x4e21, @rand_addr=0x7fff}, @in6={0xa, 0x4e21, 0x4, @loopback, 0x40}, @in={0x2, 0x4e20, @remote}], 0xa0) timerfd_settime(r0, 0x1, &(0x7f0000002680)={{0x77359400}}, &(0x7f00000026c0)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000002700)={0x3e, @multicast1, 0x4e23, 0x4, 'nq\x00', 0x10, 0x37cd, 0x20}, 0x2c) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000002980)={0x1, 0x7, 0x1ff, 0x71, &(0x7f0000002740)=""/113, 0xdd, &(0x7f00000027c0)=""/221, 0x8e, &(0x7f00000028c0)=""/142}) pause() ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x100) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000029c0)={0x49, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e22, @rand_addr=0xfff}}}, 0x108) 06:59:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') pread64(r0, &(0x7f0000000080)=""/111, 0x6f, 0x0) 06:59:53 executing program 2: 06:59:53 executing program 3: 06:59:53 executing program 3: 06:59:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:59:53 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), 0x8) 06:59:53 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f000087bff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000c6afa4)) 06:59:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000300)={0x3, 0x7, 0x318, 0x8}, 0x10) accept(r1, 0x0, &(0x7f0000000140)) 06:59:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$alg(0x26, 0x5, 0x0) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'bond0\x00', 0x3cb}) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)) getgid() 06:59:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f00000001c0), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:59:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 253.904909] IPVS: ftp: loaded support on port[0] = 21 [ 254.883782] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.890185] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.898782] device bridge_slave_0 entered promiscuous mode [ 254.982886] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.989307] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.997596] device bridge_slave_1 entered promiscuous mode [ 255.079457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.161483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.404823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.489185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.572814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.579787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.658277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.665333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.754981] ip (7546) used greatest stack depth: 53056 bytes left [ 255.904434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.912487] team0: Port device team_slave_0 added [ 255.990117] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.997883] team0: Port device team_slave_1 added [ 256.076385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.159862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.239202] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 256.246548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.255702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.336356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.343871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.352798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.229286] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.235767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.242756] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.249223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.258052] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.561929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.520737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.818552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.109707] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.116041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.124167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.420864] 8021q: adding VLAN 0 to HW filter on device team0 07:00:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x94, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000"]}, 0x10c) 07:00:05 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), 0x8) 07:00:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x490200, 0x0) accept(r1, 0x0, &(0x7f0000000140)) 07:00:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) 07:00:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$alg(0x26, 0x5, 0x0) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'bond0\x00', 0x3cb}) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)) getgid() 07:00:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f000087bff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0xc02c5341, &(0x7f0000c6afa4)) 07:00:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f00000001c0), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 264.494776] kernel msg: ebtables bug: please report to author: entries_size too small 07:00:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x94, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000"]}, 0x10c) 07:00:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) 07:00:05 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x2) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 264.838010] kernel msg: ebtables bug: please report to author: entries_size too small 07:00:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x94, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000"]}, 0x10c) 07:00:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) r2 = socket(0xa, 0x2, 0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340)={0x7}, 0x4) accept(r1, 0x0, &(0x7f0000000140)) 07:00:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) 07:00:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x94, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000"]}, 0x10c) 07:00:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x190, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000010008060300736630000010000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff0000000000000000d0000000d0000000000100006172700000000000000000000000000000000075b032eeedef89893da72dad0000000000000000000000000038000000000000000000000000000000e0000001000000007f00000100000000000000000000000000000000aaaaaaaaaa000000000000000000000000000000726564697265637400000000000000000000000000000000000000000000000008000000"]}, 0x208) 07:00:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x0) [ 265.659081] kernel msg: ebtables bug: please report to author: Unknown flag for inv bitmask [ 265.692335] kernel msg: ebtables bug: please report to author: entries_size too small 07:00:06 executing program 3: 07:00:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) 07:00:07 executing program 4: 07:00:07 executing program 2: 07:00:07 executing program 5: 07:00:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) socket(0xa, 0x2, 0x3) accept(r1, 0x0, &(0x7f0000000140)) 07:00:07 executing program 3: 07:00:07 executing program 4: 07:00:07 executing program 1: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) 07:00:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0xfffffffffffffff3) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000340)='/dev/binder#\x00'}, 0x30) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) unshare(0x40000000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x100) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0x0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 07:00:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req={0x4, 0x9, 0x1fd, 0x19}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000140)=0x40) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) getpgrp(0xffffffffffffffff) r3 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) socket$packet(0x11, 0x3, 0x300) [ 266.682826] hrtimer: interrupt took 43476 ns 07:00:07 executing program 4: io_setup(0x40d, &(0x7f0000000100)=0x0) io_getevents(r0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000080)) 07:00:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=""/32, &(0x7f0000000440)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x1f, @mcast2, 0x7031}}, 0x3, 0x7, 0x80000001, 0x3}, &(0x7f0000000380)=0x98) sendto$inet(r0, &(0x7f00000001c0), 0xc8e6, 0x400b519, 0x0, 0xfffffed4) [ 267.114955] IPVS: ftp: loaded support on port[0] = 21 07:00:08 executing program 1: r0 = socket(0x0, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) 07:00:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shutdown(r0, 0x1) accept(r1, 0x0, &(0x7f0000000140)) [ 267.481013] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:00:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000100)={{0x0, 0x0, 0xffff, 0x0, 0x9}, 0xb47, 0x1, 'id0\x00', 'timer1\x00', 0x0, 0x0, 0x100, 0x20000, 0x4}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=""/32, &(0x7f0000000440)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x1f, @mcast2, 0x7031}}, 0x3, 0x7, 0x80000001, 0x3}, &(0x7f0000000380)=0x98) sendto$inet(r0, &(0x7f00000001c0), 0xc8e6, 0x400b519, 0x0, 0xfffffed4) [ 268.010300] IPVS: ftp: loaded support on port[0] = 21 [ 268.250700] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:00:09 executing program 1: r0 = socket(0x10, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) 07:00:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) keyctl$set_reqkey_keyring(0xe, 0x0) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=""/32, &(0x7f0000000440)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x1f, @mcast2, 0x7031}}, 0x3, 0x7, 0x80000001, 0x3}, &(0x7f0000000380)=0x98) sendto$inet(r0, &(0x7f00000001c0), 0xc8e6, 0x400b519, 0x0, 0xfffffed4) 07:00:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept(r1, 0x0, &(0x7f0000000140)) 07:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000100)={{0x0, 0x0, 0xffff, 0x0, 0x9}, 0xb47, 0x1, 'id0\x00', 'timer1\x00', 0x0, 0x0, 0x100, 0x20000, 0x4}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000400)=""/32, &(0x7f0000000440)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x1f, @mcast2, 0x7031}}, 0x3, 0x7, 0x80000001, 0x3}, &(0x7f0000000380)=0x98) sendto$inet(r0, &(0x7f00000001c0), 0xc8e6, 0x400b519, 0x0, 0xfffffed4) 07:00:10 executing program 1: socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000000), 0x20a154cc) [ 270.139115] QAT: Invalid ioctl 07:00:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req={0x4, 0x9, 0x1fd, 0x19}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000140)=0x40) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) getpgrp(0xffffffffffffffff) r3 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) socket$packet(0x11, 0x3, 0x300) 07:00:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, 0x0, &(0x7f0000000140)) 07:00:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4000000000004006) 07:00:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001c7, 0x0) 07:00:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000100)=@req={0x4, 0x9, 0x1fd, 0x19}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000140)=0x40) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) getpgrp(0xffffffffffffffff) r3 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) socket$packet(0x11, 0x3, 0x300) 07:00:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mmap(&(0x7f000058d000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)=ANY=[]) 07:00:16 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() tkill(r0, 0x12) 07:00:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x80000000000000d, 0x32, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x33, &(0x7f0000abaff9)={0x3, 0xfff}, 0x10) 07:00:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, 0x0, &(0x7f0000000140)) 07:00:18 executing program 3: getrandom(&(0x7f0000001740)=""/40, 0x102ca, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvfrom(0xffffffffffffffff, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x707000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) timer_getoverrun(0x0) 07:00:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000003dc0)=0x4, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2, @empty={[0x0, 0x0, 0x0, 0x0, 0x89060000]}}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 07:00:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000e40)=@rc, 0x80, &(0x7f0000000cc0)}, 0x44) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000f00)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001100), 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001280)={0xffffffffffffffff, 0xfffffe94, &(0x7f0000000d40)}, 0xffffffffffffffd0) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000008c0)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000700)=""/65, 0x41}, {&(0x7f0000000780)=""/105, 0x69}], 0x3, &(0x7f0000000b80)=""/115, 0x73}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000c40)=@can, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f00000011c0)=ANY=[], 0x0, 0x40000}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000540)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000040000006a0a00fe000000008500000008000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x4a, &(0x7f0000000080)="b5bbec02108f84a83520d926997a", &(0x7f0000000100)=""/74, 0x10000}, 0x28) 07:00:30 executing program 2: 07:00:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, 0x0, &(0x7f0000000140)) 07:00:30 executing program 5: 07:00:30 executing program 1: 07:00:30 executing program 3: 07:00:30 executing program 5: 07:00:30 executing program 3: 07:00:30 executing program 1: 07:00:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x0, 0x18002) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000680)={{0x1, 0x400}, 'port1\x00', 0x41, 0x0, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1, 0x7fff}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) socketpair$inet6(0x2c, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000580)='trusted.overlay.redirect\x00', 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000007c0)=0x9) socket$inet6(0x2, 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) tkill(r2, 0x11) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) 07:00:31 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x84, &(0x7f0000000100)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x0, @ipv4, 0x1}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev}}, @in6={0xa, 0x0, 0x6, @mcast1, 0x2bc}]}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r3, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x78006) 07:00:32 executing program 4: 07:00:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x2) write(r0, &(0x7f0000c34fff), 0x1000002c1) 07:00:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x1a4, 0x0) 07:00:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 07:00:32 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x0, 0x18002) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000680)={{0x1, 0x400}, 'port1\x00', 0x41, 0x0, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1, 0x7fff}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) socketpair$inet6(0x2c, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000580)='trusted.overlay.redirect\x00', 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000007c0)=0x9) socket$inet6(0x2, 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) tkill(r2, 0x11) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) 07:00:33 executing program 5: 07:00:33 executing program 4: 07:00:33 executing program 4: 07:00:33 executing program 1: 07:00:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 07:00:34 executing program 5: 07:00:34 executing program 4: 07:00:34 executing program 1: 07:00:34 executing program 3: 07:00:34 executing program 5: 07:00:34 executing program 2: 07:00:34 executing program 4: 07:00:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 07:00:34 executing program 4: 07:00:34 executing program 5: 07:00:35 executing program 1: 07:00:35 executing program 3: 07:00:35 executing program 2: 07:00:35 executing program 4: 07:00:35 executing program 5: 07:00:35 executing program 2: 07:00:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept(r1, 0x0, &(0x7f0000000140)) 07:00:35 executing program 1: 07:00:35 executing program 4: 07:00:35 executing program 3: 07:00:35 executing program 5: 07:00:36 executing program 2: 07:00:36 executing program 1: 07:00:36 executing program 4: 07:00:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept(r1, 0x0, &(0x7f0000000140)) 07:00:36 executing program 5: 07:00:36 executing program 3: 07:00:36 executing program 1: 07:00:36 executing program 2: 07:00:36 executing program 5: 07:00:36 executing program 1: 07:00:37 executing program 3: 07:00:37 executing program 4: 07:00:37 executing program 2: 07:00:37 executing program 5: 07:00:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept(r1, 0x0, &(0x7f0000000140)) 07:00:37 executing program 1: 07:00:37 executing program 2: 07:00:37 executing program 4: 07:00:37 executing program 3: 07:00:37 executing program 5: 07:00:37 executing program 1: 07:00:37 executing program 2: 07:00:38 executing program 4: 07:00:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept(r1, 0x0, &(0x7f0000000140)) 07:00:38 executing program 3: 07:00:38 executing program 1: 07:00:38 executing program 5: 07:00:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x208200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r2, &(0x7f00000017c0)=ANY=[@ANYBLOB="73797a30fb9ddca730549b77e3f4a2975d3bfad88c4585ae54ee75a8af08f28c5fc21f196f8f7f75409bbf9d8ca3d6b70874b134c87666ce641780fe9fd51afc13342d46a8a2f5d66eac02797a7e265529178d58f9e1642752aab42172059b50594443d87dc16f09290f6dd6ef05d4c64a96010548ccf5071885898d65f2a3ef719bfd7682efabb9219bc440e9fe684e2dca6e715bdca44da666c9c1b00fd6506120823088412dd9ed6f2a61ded4fbc55f8b3031aa755f533d9cb9a257e46541e399fa930091ff374441c7f7e76584944332c3c787c5668ba87cd00595147746d9a2fa14e306f97e66958d40ac04c443ee7e5d3c5111e5407737106bdc311e055ac054ad5c7ee0c5f405350335d742652f9ccedc601bdc5b0a7464df1b6cf87e73dc637e9059028fe53fe58071aa2d128e8be21e7b26675e218fe872d9cc7472e6388422184f5f33a4721e2765e3e6445e551b860d7a66f09385d4c6624eab90aa401df731047c36743e5409d2a9e4c07ca542cbe598061c10af534552e9540b78ccc45cf79cb2c596d2ca6eea8572a8ab2a368bfcdec4c183b2606c835a2fb1b9d92bed163c4e9a9762227c3b24a1222745eb70b97fdc734156a1fc6c438a627a97562fe27d770db1c8e657f16317c012fe1114952e02c90ab51999be4db9a0d189185841074522267a9a738aa941ecf8ec24903173e941826c808114a93ddffcf820c382f7d3f463312d45f103a92564cc3d316bdce457e37301597ca57bb5f2bfc0e1ee70f5e1fef7e61d038d549a1bee2dc79a738d5ec00672153ca9a92c93e1e0765c80cff42b73d2d1cd343ebcc5c51ee2987201cd74e72375a4cc2977445b47de86f5c2bdf6bdd33018543499ffdc70b3a8eadfb7f819940dacac8a10b537fe744142fb777dce106a475a0b8657034e4476b4ce97e533ec7611f36155705612c03c7a1d5c5eff0263ac28d803b000429e5743e6e720d38f0c12bc4699db9dfb6279ca3ab49de4521da62f1df67814010894e4a6be70d4f15187a01c1f9fd65cc52a625614035ae18a351a4f94427e8b613d2a3bcf009b48edc167bdeabb8372f3f76eb7665e7f6dd5c190a84b2d3190ebf99f007e29a905b0d0c1638d920c1aedc909b194fee7a7ca2f21f49d15583de2e75f4fed53c172eda73922cf920353b25bdda6512647cbd993a23e376c3fe5a4b94afe2c317c85b812456c4e27a2f73de7f233567bd066043a98d25f7a79338943b691919a56d9af8c22c899781a4869311cc642368872969c92ec6f9027e22b87d0cdde96f9f478c968eaf4f930cfc3b65dec52b9fd834baab6667f7dd639f8059ad038e26b7a685440adacca134fed2f018403de51d80c4286fb9ba3ad46df22f6707c7f827c593ab7de703ccafe56130cb06b1a6870a3171d73e68e8a5bcf6dd58c8da00038a54cb8ccb000c6d9bb13f60366bc17d7968858c9df67f6a814151fb3a2d717fe494903e74a4899741b4d743756ae0b277dbe818a4ae5837032addc08c2a99316a99439d60d36d4a5f682b9e9684595c8b810cdb4bd3a1cad959e54cacae157bbb51a150ebeb981e92383b6431ff0b47458ac7576999419a5a1634cbf7187e6ac4a5b1d0cd3b8f71fae3e3675527288c7ce918abde387a5e1e3ddbf7a8649a99dae3f45be7f51709e3eac57c5f95268cbc2ad0724afb918126835b82a603add722718d42daadbc4b4bfedc857c6f5b69b92bd89d9ad893bc6f7d70eb97c1d735e85b9cd97b1d2a22287221e6eee4a90edc3b3453e35738b0f740ae2a4959f06df82967873e33da04b98498b32ea8ca264e4ce25bc7db0436530fff9de243a4c23ea53cef2a47d625821de4fd350872a35a57866fa5f5f4aa109fff432a82a9f5cae1ddba12a2142499a9403f00c1c8b1e4bc3e4cd198cc235e320bd88e9038d828a1fceb86f41ac0fa50356ba294a4f2d7c46c3603bf0496ce2c383346cc8f6654419100308a5ae066eaa14e0bd592eb1db6b50bb212cf5d9070e8e23c813e5756f07b4514fe7db573dc18410a0cd158331517e7d2bbf37145789ab84f676d720de0719564b52b056fa5b690ea531a0e1acc0ea33a8240e4ef8757f59f11dcf6627b5852251c7d2a5f8139e50ef058f09fb17a63d27d9b4cdaa58f0fd04e73f08b62c9e393766434ec6d1f7355d9322528a38fcf8f0b9769850321ac41555070bb8247cd28791ff30943283fdbd75135866714f6a9652c3427b184ecb53d304836f5d57d7372a5da0b516af5f4d109b4273cb90c22fb47d11b66f2090910d55306a049094cedf657e49d924244500db240ae3e9ae1f66e9c024c4b6f89241499976802e0da9d56464ba57fbdae277ef7323c6a45be88c15e1b34ab3d68a516fd84615425ef2f5d2ec5bc1f7f6695ddc9d863dbc728b6b9470f6918c4ef2f889cb9d465f3d36aca85b970eccca75aaea2fcd537db2ea64f751b9461adb968cddeb3dcaccbeec9f43bd8d2eebd1cb7ae49df7b27269a9f7a8b682b78e259999a33e4941d6258e9777f379011de94f6db301b5be504ef24f79ab847ffb586f3a06496a5e65a6d3b56d3686188ae0bacbf199c842fe295bc357f608a2ebff1a30d498123408003c38754b649a863c15e4c0c737b59b8c4bc23ad1ab98ba45fe54f01dd9ec3e73ffcfff155b42a20b1d337139ff90c10d441144967d42b8495f9124c577d9d58e2b82bf0b9f74980780bc77ee11dd7a8d6cf3776e64ae89a30581d49d91fe67ce7d2bd5af75b73bbff3156fbb9b2ae25beab52bb50d194ae0f9f7e066bd54f52cb3387b3a734d4cb6994226051161a79b2d80198b1e1b4238936c102f49de568558996b66fccd27d834c53db9578d86edeae2784bcb1b52b4e5b1f054a5ac04c150854fe67806c82ef3af1cd48fc7be01e5c5abcf7c2586135f278e9108cf159ba0a3a67306ed8da189101cb20955920ecbe20366ac06727cfe8932194e4e6450f02d685009a7f3db05aa3acfafb8712fd9f1061fa354988b2455ed77f3d5eed2f28e1000a3a2cd17d821a67a56d6e42f2d76674f487506b760243f2a5e7b62489e4342d8c8014076be72e98b36c6436ce1efc43b24ee3fecda843fe74c68b4b2b8c9932d84130ed7b4a0c4486921c09682fa3c8c1f9648cccc4846dac02bbeb13a5033748f323e8fe1d51bea4aa60315939df8a0fe2a46def7e2db9c863f6e507092e4f7e219f525b083df33f6ed393f126d7a1eb1afa4b129a49d83ce99ec78e3bdced40cc211bb12c24e7691611e8f2de5f546770455bb277c7aba1aef04f4ae8d2043dd48f0fbbe49565ce48681ff0097f55fb921c8242d67fb597dd5137ead0e9f909497d83df6e22629ccc0b70e4799e4eb0897cc8d74a8e8831085deffc651e48021c03de8f9d756a3364423e1226b3a957f9efa3c52de6a10d8bc7db7e49bacee68d356c08352bd086c5da4be0bf6394b7bb4015aa6930afcbf3ec780a4563a28d5ab2a55d09b4c769ce7f50074f29b3ec53e590d2ba4be9e34a895c065811098cec2a165003e82456b813900000000b1b7477b9d20059a93c41f342e9752a998149631c69a6ed1ec7a01cdda43e70049826cbdfaa7852171325dbcb76ae71df0d6ed6f98c7995f39aeb0f5d62d0f72dced57a30bb2f2290bcb878ed2c7a81f6993c3bbeffd4d828b1bc18a3174c7193f5f1f818367ce79a03a3b0cd9996bfef12ce0f9fde96b2053e703c3fe60265a6babe64bbdefe637cbd6d0820894977f5cf2d0c6c03c907c784acf87c3c5722061a5a8d49d0f87695f724be0c485c8de40820d40844d6e9173656bca4899e80158f4da4f5449b56b0c56d1ad95ec744643f26e8f0605e163b9b4306da071aa76de7c6d364faabe12404c8bbae88f85f33ee19256312ed11e147418d8c336cdd0580dd47902894069e1c0cdc9d8460458b0b2f7bd3a0f0a91d059078c151d5c8dcd8653820c4ada561d552fb386a4d615855d9143729b6bcd8b93f3f43eb1a7733d861eba3ce10d741f656c612f276183010e2be685e0cedc73b2ce9c216fc0481e93d9a2b2d1d8ea08cb8912fbc3599bfb595445320747026f8e747a1e47148aafa1d19223a187efeeecd37ca7bb2ffa672ebda25d7f3d5dc82df45fafee89def760488cee3cb64a96684ec43551e5b6fda995a393e766e44ee5f44ae05b7a2898624b326eeb48c70f4979e97757397895f0cc18463770df38cd0ee0f52ed05f4edabffb03aeed64743f933034f2562b979fba55302701614884706ddd54c9bff0d1431a73dddccfa81098e2f7d0f1d0bd5ee2bc392b6395fd554748d63e658cd5ce7f50d364b35264cd1906500f2187306c58846379b1a953a79650f2044b2f28793f15dac3b69e6e165a0a013328b35abfc13f41ff2883ba7a6353dfa19f6f24af0e123b4989c8078a7a61a193e7fc347418585db4c49f3c21a3c5650a996455e2c4a31e68174fecb728b835cd4a2be5056504619c106959bd00c19d9fe1aaa9b62d0be7bed1c95550a849284fbcc627580ef271bb1c378a3bbe426558f28039fd6b25151d2b190b6160061e89f1cee44c5a6c55785b491cd90c9caf120d784a9eb1a4247c3c8a072d6e3bb5084f16748dae2c521fa17f38942a66ae43c656f5a712b7d03f735765b89061d3936434f2a6330a9d811d601c16a10c48629b3a6aa55f3bb0137bb7deb3c1549fa7ecfa784915c34242f3b9574630d3bb817dc1f9dbe23601d1af005311bad69d7ebf33beae6c7df64c16792b0dfbe34513ad6a77b52907bec43306c3d8111c4bbba81ffc1a9001e6deb037d1ea1677c01b94bd1f082cf84900b0ab89ea5884b34b28c189dd8c78a28b7f564c4a67312026090111d10a3a2f1913a556a9232d1cfcf6ecdd36e8a12c864b5dce086226c70def6bed439299667e6a635d205364cf9593040f15f8d7090d260b7feaa3c9fa88838fb4337a9818d3e11f9909458a3669aa68ff05fe6ba68d9aacdb5e106165e3063ecb9cdf46c7de45906ccecb6ce9b38b4c65deb056c24c1291a31df52c7c2bc1ef4f92f922ad88e12849a9639e023ef76745aaa4134eb1b1b350067ad5bc27e0285573035a0deb9c8788c8e05ad23cc2f865232d3f70ebc84acde4c945b0ab77805543b984783940453579db2378866b91f2176d5adc304f697215645f8f5a8b7880676ac566c4e6984742d20cb64e19a0446286e774dc1c489fcbbaa2b40311c7aeba10c1c57925c0e01d7678a3dcace12485ceafe3f320514f41fee14beb9af0ac288bd2a753c1d00735b8ce95b94f14490c999ce0beea157bfd38a61e90643ceb65669a6a2d386a618580d7a4ab74eab28fb2862571905713f0dd61a9d136cb7b31441ac17d40f91300742d8c7fef689fd1ba683896c391ead92344c832d06558018ec3633a97b042484272680632ee5d8b480172c4fd6fd775fb823f82768b92ac59e8d9a4a759c608d6ba49138c98b9b64697bf42de42bb926662783359d99a726b90daab556daa0894dcc0688a2a41a9e2617172b28a5af8bc1d1732deb1c2c5d2eed79e2a2b4ba916350f90ae9d325605e8849a839405c5383f279e1b5ad5b3e1a1f360c645d9b918d11cdf100caaf4cebe2c3d2e4fc89fe2a97e66b4bdfe704077cee00db1533520af191cd5ff686c43208fc65cedc85136687a1ea4a899fd57c25e699c768e1d89b8fd6adacc6e0c8c709b7cff43a5909f937cfb559817ce8ba97203a778f8407628bf78da99f1433e3385af00000000000000000000"], 0xff2) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7}, 0x7) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 07:00:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x802, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x9) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000400)=""/163) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r3, r4+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r2, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r5 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="04ccf7b1fc0a0000000ea4c38200b82af76b0e30b8e3274d552ace47cfc919dc9eaad09c26529f2364b09fadafc576119e294d177ec3c49c4c89918a00a4be47642acfa2056e9123", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000200)=0x5) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r6, 0xffff}, &(0x7f0000000280)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a45322, &(0x7f00000002c0)) ftruncate(r5, 0x8007ffc) sendfile(r0, r5, 0x0, 0x45a3) 07:00:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = memfd_create(&(0x7f0000000e00)="0fc5d4e13fd144bbf9daf670ef2ff42c2503df76b6a5a8122b40164ba81c781200000000cd5faf6ba8217417e69eb7566f581b7580be20c876cb0fd107b06d", 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="b7"], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0xf, 0x11, r3, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000001c0)={[{}, {}, {0x0, 0x0, 0xfffffffffffffffb}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:00:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[0x0, 0x30030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:38 executing program 3: [ 297.814405] ================================================================== [ 297.821863] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 297.825613] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 297.828997] CPU: 0 PID: 8205 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #66 [ 297.829012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.829023] Call Trace: [ 297.829056] dump_stack+0x306/0x460 [ 297.829101] ? vmap_page_range_noflush+0x975/0xed0 [ 297.871357] kmsan_report+0x1a2/0x2e0 [ 297.875200] __msan_warning+0x7c/0xe0 [ 297.879039] vmap_page_range_noflush+0x975/0xed0 [ 297.883870] map_vm_area+0x17d/0x1f0 [ 297.887630] kmsan_vmap+0xf2/0x180 [ 297.891218] vmap+0x3a1/0x510 [ 297.894377] ? relay_open_buf+0x81e/0x19d0 [ 297.898660] relay_open_buf+0x81e/0x19d0 [ 297.902778] relay_open+0xabb/0x1370 [ 297.906544] do_blk_trace_setup+0xaf7/0x1780 [ 297.911012] __blk_trace_setup+0x20b/0x380 [ 297.915301] blk_trace_ioctl+0x274/0x970 [ 297.919424] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 297.924900] ? alloc_set_pte+0x95d/0x2530 [ 297.929085] ? kmsan_set_origin_inline+0x6b/0x120 [ 297.933956] ? __msan_poison_alloca+0x17a/0x210 [ 297.938666] ? blkdev_ioctl+0x327/0x55e0 [ 297.942756] ? block_ioctl+0x16f/0x1d0 [ 297.946684] blkdev_ioctl+0x1aaa/0x55e0 [ 297.950702] ? task_kmsan_context_state+0x6b/0x120 [ 297.955668] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 297.961064] ? vmalloc_to_page+0x57d/0x6b0 [ 297.965362] ? kmsan_set_origin_inline+0x6b/0x120 [ 297.970243] block_ioctl+0x16f/0x1d0 [ 297.973992] ? block_llseek+0x190/0x190 [ 297.978011] do_vfs_ioctl+0xcf3/0x2810 [ 297.981946] ? security_file_ioctl+0x92/0x200 [ 297.986484] __se_sys_ioctl+0x1da/0x270 [ 297.990497] __x64_sys_ioctl+0x4a/0x70 [ 297.994417] do_syscall_64+0xbe/0x100 [ 297.998249] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.003462] RIP: 0033:0x457519 [ 298.006682] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.025604] RSP: 002b:00007f4d6c5d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.033365] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 298.040658] RDX: 0000000020000340 RSI: 00000000c0481273 RDI: 0000000000000004 [ 298.047949] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 298.055240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6c5d36d4 [ 298.062530] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 298.069837] [ 298.071480] Uninit was created at: [ 298.075047] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 298.080170] kmsan_kmalloc+0xa4/0x120 [ 298.083992] __kmalloc+0x14b/0x440 [ 298.087551] kmsan_vmap+0x9b/0x180 [ 298.091113] vmap+0x3a1/0x510 [ 298.094245] relay_open_buf+0x81e/0x19d0 [ 298.098331] relay_open+0xabb/0x1370 [ 298.102093] do_blk_trace_setup+0xaf7/0x1780 [ 298.106525] __blk_trace_setup+0x20b/0x380 [ 298.110778] blk_trace_ioctl+0x274/0x970 [ 298.115063] blkdev_ioctl+0x1aaa/0x55e0 [ 298.119062] block_ioctl+0x16f/0x1d0 [ 298.122803] do_vfs_ioctl+0xcf3/0x2810 [ 298.126710] __se_sys_ioctl+0x1da/0x270 [ 298.130708] __x64_sys_ioctl+0x4a/0x70 [ 298.134619] do_syscall_64+0xbe/0x100 [ 298.138481] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.143682] ================================================================== [ 298.151053] Disabling lock debugging due to kernel taint [ 298.156528] Kernel panic - not syncing: panic_on_warn set ... [ 298.156528] [ 298.163921] CPU: 0 PID: 8205 Comm: syz-executor5 Tainted: G B 4.19.0-rc4+ #66 [ 298.172517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.181888] Call Trace: [ 298.184507] dump_stack+0x306/0x460 [ 298.188183] panic+0x54c/0xafa [ 298.191451] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 298.196931] kmsan_report+0x2d3/0x2e0 [ 298.200768] __msan_warning+0x7c/0xe0 [ 298.204611] vmap_page_range_noflush+0x975/0xed0 [ 298.209454] map_vm_area+0x17d/0x1f0 [ 298.213210] kmsan_vmap+0xf2/0x180 [ 298.216784] vmap+0x3a1/0x510 [ 298.219921] ? relay_open_buf+0x81e/0x19d0 [ 298.224197] relay_open_buf+0x81e/0x19d0 [ 298.228318] relay_open+0xabb/0x1370 [ 298.232104] do_blk_trace_setup+0xaf7/0x1780 [ 298.236572] __blk_trace_setup+0x20b/0x380 [ 298.240865] blk_trace_ioctl+0x274/0x970 [ 298.244963] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 298.250686] ? alloc_set_pte+0x95d/0x2530 [ 298.254875] ? kmsan_set_origin_inline+0x6b/0x120 [ 298.259750] ? __msan_poison_alloca+0x17a/0x210 [ 298.264459] ? blkdev_ioctl+0x327/0x55e0 [ 298.268545] ? block_ioctl+0x16f/0x1d0 [ 298.272472] blkdev_ioctl+0x1aaa/0x55e0 [ 298.276490] ? task_kmsan_context_state+0x6b/0x120 [ 298.281455] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 298.286849] ? vmalloc_to_page+0x57d/0x6b0 [ 298.291128] ? kmsan_set_origin_inline+0x6b/0x120 [ 298.296011] block_ioctl+0x16f/0x1d0 [ 298.299775] ? block_llseek+0x190/0x190 [ 298.303785] do_vfs_ioctl+0xcf3/0x2810 [ 298.307719] ? security_file_ioctl+0x92/0x200 [ 298.312259] __se_sys_ioctl+0x1da/0x270 [ 298.316276] __x64_sys_ioctl+0x4a/0x70 [ 298.320195] do_syscall_64+0xbe/0x100 [ 298.324032] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.329244] RIP: 0033:0x457519 [ 298.332465] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.351403] RSP: 002b:00007f4d6c5d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.359137] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 298.366427] RDX: 0000000020000340 RSI: 00000000c0481273 RDI: 0000000000000004 [ 298.373722] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 298.381013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d6c5d36d4 [ 298.388299] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 298.396600] Kernel Offset: disabled [ 298.400262] Rebooting in 86400 seconds..