[ 56.571231] sshd (6040) used greatest stack depth: 53216 bytes left [....] Starting OpenBSD Secure Shell server: sshd[ 56.760310] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 60.328620] random: sshd: uninitialized urandom read (32 bytes read) [ 60.741000] sshd (6110) used greatest stack depth: 53184 bytes left [ 60.774060] random: sshd: uninitialized urandom read (32 bytes read) [ 62.262580] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.83' (ECDSA) to the list of known hosts. [ 67.943894] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/03 04:17:40 fuzzer started [ 72.553179] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/03 04:17:44 dialing manager at 10.128.0.26:45967 2018/10/03 04:17:45 syscalls: 1 2018/10/03 04:17:45 code coverage: enabled 2018/10/03 04:17:45 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/03 04:17:45 setuid sandbox: enabled 2018/10/03 04:17:45 namespace sandbox: enabled 2018/10/03 04:17:45 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/03 04:17:45 fault injection: enabled 2018/10/03 04:17:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/03 04:17:45 net packed injection: enabled 2018/10/03 04:17:45 net device setup: enabled [ 79.270643] random: crng init done 04:19:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 201.404091] IPVS: ftp: loaded support on port[0] = 21 [ 203.775372] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.782000] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.790664] device bridge_slave_0 entered promiscuous mode [ 203.955305] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.961932] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.970697] device bridge_slave_1 entered promiscuous mode [ 204.112546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.256094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:19:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x1d0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 204.687955] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.852282] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.146257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.153551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.391212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.398495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.449287] IPVS: ftp: loaded support on port[0] = 21 [ 206.109763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.117890] team0: Port device team_slave_0 added [ 206.275125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.283283] team0: Port device team_slave_1 added [ 206.528388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.535532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.544606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.731003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.738248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.747370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.953712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.961379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.970769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.198279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.206066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.215321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.153942] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.160416] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.169017] device bridge_slave_0 entered promiscuous mode [ 209.418608] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.425315] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.433848] device bridge_slave_1 entered promiscuous mode [ 209.698759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.825836] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.832457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.839470] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.846036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.855132] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.996080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.221866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:20:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 210.879534] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.176986] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.227851] IPVS: ftp: loaded support on port[0] = 21 [ 211.576512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.583755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.908546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.915886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.737892] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.746078] team0: Port device team_slave_0 added [ 213.110916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.119027] team0: Port device team_slave_1 added [ 213.456775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.463931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.472889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.800347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.807470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.816232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.117440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.125094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.134240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.466261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.474316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.483472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.106367] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.113141] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.121726] device bridge_slave_0 entered promiscuous mode [ 216.436059] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.442709] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.451124] device bridge_slave_1 entered promiscuous mode [ 216.776745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.048650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.674423] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.680904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.687952] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.694473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.703667] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.861240] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.151457] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:20:08 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000180), 0x4) [ 218.473174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 218.492047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.516636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.817727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.824854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.638936] IPVS: ftp: loaded support on port[0] = 21 [ 219.941060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.949384] team0: Port device team_slave_0 added [ 220.350837] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.359144] team0: Port device team_slave_1 added [ 220.826194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.833411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.842280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.233559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.240713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.249750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.608842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.616718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.625984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.956201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.058311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.066073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.075745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.255437] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.665341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.671869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.679863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.587084] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.593737] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.602373] device bridge_slave_0 entered promiscuous mode [ 225.974065] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.980541] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.989131] device bridge_slave_1 entered promiscuous mode [ 226.025713] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.069675] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.076515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.083544] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.090092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.098784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.404872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.729151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.812917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.945558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.312182] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.664117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.671185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.018843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.026139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:20:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000fc0)="153f623406000000766070ff062bc32a7e5b825a154e2ff694b89227a414d443994e51e92660d502edbae9a411dfbacf9ed1e6fae1a8295144d1a865f8f293a8f09f411e5f") r1 = socket(0x5, 0x2, 0x101) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000ac0)={0x78, 0x8000, 0x2, 0x6740bc6a, 0x7}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000001fc0)=@filter={'filter\x00', 0xe, 0x6, 0x39e, [0x0, 0x20000d00, 0x20000e70, 0x20001178], 0x0, &(0x7f0000000cc0), &(0x7f0000001100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000100000000f976657468315f746f5f626f6e640000006272696467655f736c6176655f31000076657468315f746f5f7465616d00000076657468310000000000000000000000ffffffffffffffff00ffffffffffffffffff00ff00ffff000000f0000000380100007001000064657667726f757000000000000000000000000000000000000000000000000018000000000000000a000000010000000000000008000000070000000000000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000030000000000009a02000000000000004552524f5200000000000000000000000000000000000000000000000000000001580000000000006a3445977106d85496f3b63a5be08362838bb4dce8a71da76e470253edea0000646e6174000000000000000000000000000000000000000000000000000000001000000000000000ffffffffffff0000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000001000000090000000400000008067465616d5f736c6176655f300000920064756d6d79300000000000000000000064756d6d79300000000000000000000076657468300000000000000000000000aaaaaaaaaa0a00ffff0000ff0180c200000300ffff0000ff00007000000070000000b8000000455252ff520000000000000000000000000000000000000000000000000000002000000000000000649293e6412fa035ef98ef37571a0a5cfd6e004d3fa3eac4dfc9b15c84a400001e2287df240b4489849b714c542be83d172852b89355afc35b12b0f7c3369fd5a51cf0e2cadca0b66147e3a09bb3040348ecaf0ca6d89a04dd9b8757b0df6708af423fdf7debaf2ce790195b4c2d48d8a5154b6e45b55fef4b1bcba26a886f40b297ad5b873b93dc66c84e57a787c84a417c96d16ec8e55310f58093df7786a6e0e1daecff16bf87bbe59217db287850487e573c871241e2a1d190a36a0b725282d38e8e099eae7922d378815d1c71fbb1e3c592acc1e5ec69272eec5a64021b7cdd040ec5d27ece9712a9376e95bdd33f7d85fa58701b8f6ab6457757738c3dfbacebf254c2"]}, 0x416) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000140)=""/231, 0x1a3}, {&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/221, 0xdd}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/62, 0x3e}], 0x7, &(0x7f00000006c0)=""/23, 0xfffffffffffffd6c, 0x80}, 0x2000) recvmsg(r2, &(0x7f0000000a40)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/134, 0x86}, {&(0x7f0000000880)=""/143, 0x8f}], 0x2, &(0x7f0000000980)=""/155, 0x9b}, 0x60) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000c80)={'syzkaller1\x00', {0x2, 0x4e22, @remote}}) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r5 = socket$inet6(0xa, 0x6, 0xffffffffffffffff) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x800, 0x30, 0x2, 0x3}, &(0x7f0000000b40)=0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000b80)={r6, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000c40)=0x84) socket$inet(0x2, 0x5, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r7 = accept(r3, 0x0, &(0x7f0000000080)=0x291) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000000e40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000014c0)=ANY=[]}}], 0x1, 0x0) [ 230.342240] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.350291] team0: Port device team_slave_0 added [ 230.750294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.758523] team0: Port device team_slave_1 added [ 231.036691] IPVS: ftp: loaded support on port[0] = 21 [ 231.189722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.197085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.206352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.652130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.659256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.668516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.041500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.049260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.058614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.483595] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.491377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.500969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.983819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.470789] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:20:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000000), 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) [ 236.388163] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.394819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.402937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:20:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000440), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') recvmmsg(r0, &(0x7f0000001440)=[{{&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/217, 0xd9}, {&(0x7f00000002c0)=""/170, 0xaa}, {&(0x7f0000000100)=""/73, 0x49}, {&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000480)=""/130, 0x82}, {&(0x7f0000000540)=""/201, 0xc9}, {&(0x7f0000000640)=""/212, 0xd4}, {&(0x7f0000000400)=""/53, 0x35}], 0x8}, 0x3}, {{&(0x7f00000007c0)=@ipx, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/32, 0x20}], 0x1, &(0x7f00000008c0)=""/212, 0xd4, 0x91}, 0x7}, {{&(0x7f00000009c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000a40)=""/195, 0xc3}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)=""/7, 0x7}], 0x3, &(0x7f0000000c00)=""/9, 0x9, 0x575}, 0x401}, {{&(0x7f0000000c40)=@nfc, 0x80, &(0x7f0000001300)=[{&(0x7f0000000cc0)=""/93, 0x5d}, {&(0x7f0000000d40)=""/233, 0xe9}, {&(0x7f0000000e40)=""/207, 0xcf}, {&(0x7f0000000f40)=""/124, 0x7c}, {&(0x7f0000000fc0)=""/182, 0xb6}, {&(0x7f0000001080)=""/185, 0xb9}, {&(0x7f0000001140)=""/158, 0x9e}, {&(0x7f0000001200)=""/231, 0xe7}], 0x8, &(0x7f0000001380)=""/167, 0xa7, 0x3f}, 0x8b}], 0x4, 0x2000, &(0x7f0000001540)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001580)={'vcan0\x00', r2}) [ 237.520455] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.527029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.534075] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.540578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.549293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.083560] 8021q: adding VLAN 0 to HW filter on device team0 04:20:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="0000000a7b8937", @ANYRES32=r1, @ANYBLOB="0000010014000100fe8000000000000000000000000000bb"], 0x346}}, 0x0) [ 238.471494] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.478811] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.487548] device bridge_slave_0 entered promiscuous mode [ 238.495767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:20:28 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x183800) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = dup2(r2, r1) write$P9_RSTAT(r3, &(0x7f0000000140)={0x55, 0x7d, 0x0, {0x0, 0x4e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, 'GPLvmnet1', 0xd, './cgroup.cpu\x00', 0x0, "", 0x5, "8a70726f63"}}, 0x55) pipe(&(0x7f0000000200)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x200, 0x7, 0x6, 0x7, 0x0, 0x4, 0x1, 0x1, 0x61, 0x5, 0xc9f, 0x200, 0x8, 0x8, 0x4, 0x9, 0x6, 0x40, 0x7, 0x200, 0xfffffffffffffff8, 0x401, 0x7, 0x1f, 0x5, 0x6f, 0x6, 0x0, 0x9, 0x2, 0x5, 0x20, 0x33d, 0x1, 0x8000, 0x1f, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x8000, 0x2, 0x4, 0x7, 0xcc, 0x6, 0x800}) [ 238.914614] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.921210] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.930511] device bridge_slave_1 entered promiscuous mode 04:20:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x220000) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0x887, 0xffffffffffffffff, 0x9, 0xff, 0x3, 0x3}) sendmmsg$alg(r1, &(0x7f0000006940)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="d2", 0x1}], 0x1, &(0x7f0000000240), 0x0, 0x804}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000880)=""/44, 0xf}, {&(0x7f0000000d80)=""/4096, 0x1000}], 0x2) [ 239.420735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:20:29 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) write(r0, &(0x7f00000005c0)="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", 0x185) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 239.800591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:20:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x812, r1, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040), &(0x7f0000000400)) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f00000000c0), &(0x7f0000000000)=0x32c) r2 = dup(r0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000040)={0xffff, 0x2, 0x5}) 04:20:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x101000, 0x81) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x1, 0x0, 0xd4e}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f00000000c0)={0x0, 0x2, 0x18fa8f3a, 0x400, 0x80000001}) [ 241.178297] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 241.578110] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.961780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.970605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.283507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 242.290601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.068635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.273920] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.282238] team0: Port device team_slave_0 added [ 243.598554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.606814] team0: Port device team_slave_1 added [ 243.815805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.823121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.832050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.037535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.045071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.053982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.234480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.278055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.285787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.294726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.612289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.619835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.628711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.312032] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.318500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.326532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:20:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x5, 0x0, 0x0, {{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 246.564601] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.499621] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.506180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.513260] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.519722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.528749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.535431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.229614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.034783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.730820] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.737295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.745165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.768327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:20:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 252.013220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 252.465388] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.949387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.492384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:20:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000000140)=ANY=[], 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000120725cfffeb32484b00000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0x0) msgsnd(r1, &(0x7f0000000000)={0x2}, 0x8, 0x0) [ 256.034890] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.041142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.049465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.419403] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.268136] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 258.344556] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:20:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000fc0)="153f623406000000766070ff062bc32a7e5b825a154e2ff694b89227a414d443994e51e92660d502edbae9a411dfbacf9ed1e6fae1a8295144d1a865f8f293a8f09f411e5f") r1 = socket(0x5, 0x2, 0x101) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000ac0)={0x78, 0x8000, 0x2, 0x6740bc6a, 0x7}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000001fc0)=@filter={'filter\x00', 0xe, 0x6, 0x39e, [0x0, 0x20000d00, 0x20000e70, 0x20001178], 0x0, &(0x7f0000000cc0), &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}, 0x416) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000140)=""/231, 0x1a3}, {&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/221, 0xdd}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/62, 0x3e}], 0x7, &(0x7f00000006c0)=""/23, 0xfffffffffffffd6c, 0x80}, 0x2000) recvmsg(r2, &(0x7f0000000a40)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/134, 0x86}, {&(0x7f0000000880)=""/143, 0x8f}], 0x2, &(0x7f0000000980)=""/155, 0x9b}, 0x60) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000c80)={'syzkaller1\x00', {0x2, 0x4e22, @remote}}) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r5 = socket$inet6(0xa, 0x6, 0xffffffffffffffff) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x800, 0x30, 0x2, 0x3}, &(0x7f0000000b40)=0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000b80)={r6, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000c40)=0x84) socket$inet(0x2, 0x5, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r7 = accept(r3, 0x0, &(0x7f0000000080)=0x291) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000000e40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000014c0)=ANY=[]}}], 0x1, 0x0) 04:20:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xba, 0x201, 0x1, 0x5, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x2, 0x276, 0x2, 0x6, 0x8, 0xa59, 0x9, 0x924a, r1}, 0x20) restart_syscall() r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r2, &(0x7f0000001a40)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)=""/185, 0xb9}}], 0x1, 0x0, &(0x7f0000001ac0)) close(r2) r3 = accept4(r0, 0x0, &(0x7f0000000340)=0xff92, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a30cdc1dc60afa29216299e4b5a9bd71ae992bca565f123995b7574e25cc96c3853be6ce2fbf2f198e4c04373d2602600fd5c56a424ef6c2d33cb160399ec16c0deb4f578d013fcc9e6040a6bf5e915bf502bb7"], 0x34000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$inet6_int(r3, 0x29, 0x37, &(0x7f0000000040)=0x5, 0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000240)=""/178, &(0x7f0000000300)=0xb2) 04:20:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x5, 0x0, 0x0, {{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 04:20:48 executing program 5: r0 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="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", 0xfc, 0xfffffffffffffff9) keyctl$get_security(0x11, r0, &(0x7f0000000180)=""/4096, 0x1000) setrlimit(0xf, &(0x7f0000001180)={0x0, 0x401}) r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x101000, 0x4) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000001200)=""/4096) r2 = memfd_create(&(0x7f0000002200)='bdev\x00', 0x4) getsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f0000002240), &(0x7f0000002280)=0x4) rt_sigaction(0x24, &(0x7f0000002380)={&(0x7f00000022c0)="c4e1f910688bc461bf5c504bc46119fc89021000008fa840978447ab110000e6c462119ade433875cd64450fe713dbd68f6978d691050000003e0f0f156d00000090", {0x7}, 0x50000000, &(0x7f0000002340)="d9f9c402fd9044a34ef2a7c4c1796f49b6f3460f5aa77f7b736c2e66470f3a0e1306c4417ae67200c421fa5bfc26f20f5871c10f38f0453f"}, &(0x7f0000002480)={&(0x7f00000023c0)="cff20fc78a11d39d16f0ff8f00000081f3ddc9c4e1fc2b36400f9a226566460fae3f46eb8fc4c17bf09c2afdff00002e47d18df6ffffff", {}, 0x0, &(0x7f0000002400)="c4a2559a3500000000c4c239ddbc02defdb006c403154b87846d67ea5d64c6872bb90e2eb366400f3831d1470ff3098fa878c2f900660f6ead0b000000460ff977fe672e26460f2b4302"}, 0x8, &(0x7f00000024c0)) keyctl$unlink(0x9, r0, r0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000002500)=0x9, 0x4) inotify_add_watch(r1, &(0x7f0000002540)='./file0\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000002580), 0x4) fcntl$notify(r1, 0x402, 0x10) unshare(0x30000) r3 = getgid() setgid(r3) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000002740)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20002600, 0x200026d0, 0x20002700], 0x0, &(0x7f00000025c0), &(0x7f0000002600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x22f0, 'syz_tun\x00', 'veth0_to_bridge\x00', 'bcsf0\x00', 'sit0\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1a8) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000027c0), &(0x7f0000002800)=0x4) recvmsg$kcm(r1, &(0x7f0000002b80)={&(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000028c0)=""/15, 0xf}, {&(0x7f0000002900)=""/218, 0xda}, {&(0x7f0000002a00)=""/96, 0x60}, {&(0x7f0000002a80)=""/44, 0x2c}], 0x4, &(0x7f0000002b00)=""/103, 0x67, 0x7}, 0x20) clock_gettime(0x0, &(0x7f0000002c40)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000002bc0)={0x6936}, &(0x7f0000002c00), &(0x7f0000002c80)={r4, r5+10000000}, 0x8) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000002cc0)='trusted.overlay.nlink\x00', &(0x7f0000002d00)={'L-', 0x2}, 0x28, 0x3) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000002d40)={'filter\x00'}, &(0x7f0000002dc0)=0x44) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000002e00)={0x5, 0x0, 0x20a, 0x351e}) fcntl$setflags(r1, 0x2, 0x1) pread64(r2, &(0x7f0000002e40)=""/228, 0xe4, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x5, &(0x7f0000002f40), &(0x7f0000002f80)=0x4) fchdir(r2) accept4(r1, &(0x7f0000002fc0)=@hci={0x1f, 0x0}, &(0x7f0000003040)=0x80, 0x80800) sendmsg$xdp(r1, &(0x7f0000003200)={&(0x7f0000003080)={0x2c, 0x3, r6, 0x9}, 0x10, &(0x7f00000031c0)=[{&(0x7f00000030c0)="65dac4d00a2d4adf978a8b59ab1ca63b9169d2492475fe5eaf6d4efd7595fd262b1b428e5098da64f3e1e3468a6067c2584419c90a790812fbe22180484755f86e878597971a33d7b0c35be69afa96a881eba06038023e459833c3fd2c706eb17d7e392816673f06e05ab966ac70c7a5067ecfcd21f737f0756ccf49099aa20a1709ac0bf309fd545cc517df13f5358c227cbc54d77993bc4bd67aa06d5e480e8d30b83fae848b0c6fac6e2e595d9e1fc1a66a9c52d3f2dd1f8354912cc7244b38bcb897a90b8f732d5272d3", 0xcc}], 0x1, 0x0, 0x0, 0x4000}, 0x20000010) 04:20:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:20:48 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100)) [ 258.548985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 258.658105] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:20:48 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 04:20:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:20:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000740)=""/246) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}, {r0}], 0x2, &(0x7f0000000080), &(0x7f0000000100), 0x8) [ 258.959370] hrtimer: interrupt took 214345 ns [ 259.040574] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:20:49 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000240)=""/4096) 04:20:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:20:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000fc0)="153f623406000000766070ff062bc32a7e5b825a154e2ff694b89227a414d443994e51e92660d502edbae9a411dfbacf9ed1e6fae1a8295144d1a865f8f293a8f09f411e5f") r1 = socket(0x5, 0x2, 0x101) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000ac0)={0x78, 0x8000, 0x2, 0x6740bc6a, 0x7}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000001fc0)=@filter={'filter\x00', 0xe, 0x6, 0x39e, [0x0, 0x20000d00, 0x20000e70, 0x20001178], 0x0, &(0x7f0000000cc0), &(0x7f0000001100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000100000000f976657468315f746f5f626f6e640000006272696467655f736c6176655f31000076657468315f746f5f7465616d00000076657468310000000000000000000000ffffffffffffffff00ffffffffffffffffff00ff00ffff000000f0000000380100007001000064657667726f757000000000000000000000000000000000000000000000000018000000000000000a000000010000000000000008000000070000000000000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000030000000000009a02000000000000004552524f5200000000000000000000000000000000000000000000000000000001580000000000006a3445977106d85496f3b63a5be08362838bb4dce8a71da76e470253edea0000646e6174000000000000000000000000000000000000000000000000000000001000000000000000ffffffffffff0000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000001000000090000000400000008067465616d5f736c6176655f300000920064756d6d79300000000000000000000064756d6d79300000000000000000000076657468300000000000000000000000aaaaaaaaaa0a00ffff0000ff0180c200000300ffff0000ff00007000000070000000b8000000455252ff520000000000000000000000000000000000000000000000000000002000000000000000649293e6412fa035ef98ef37571a0a5cfd6e004d3fa3eac4dfc9b15c84a400001e2287df240b4489849b714c542be83d172852b89355afc35b12b0f7c3369fd5a51cf0e2cadca0b66147e3a09bb3040348ecaf0ca6d89a04dd9b8757b0df6708af423fdf7debaf2ce790195b4c2d48d8a5154b6e45b55fef4b1bcba26a886f40b297ad5b873b93dc66c84e57a787c84a417c96d16ec8e55310f58093df7786a6e0e1daecff16bf87bbe59217db287850487e573c871241e2a1d190a36a0b725282d38e8e099eae7922d378815d1c71fbb1e3c592acc1e5ec69272eec5a64021b7cdd040ec5d27ece9712a9376e95bdd33f7d85fa58701b8f6ab6457757738c3dfbacebf254c2"]}, 0x416) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000140)=""/231, 0x1a3}, {&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/221, 0xdd}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/62, 0x3e}], 0x7, &(0x7f00000006c0)=""/23, 0xfffffffffffffd6c, 0x80}, 0x2000) recvmsg(r2, &(0x7f0000000a40)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/134, 0x86}, {&(0x7f0000000880)=""/143, 0x8f}], 0x2, &(0x7f0000000980)=""/155, 0x9b}, 0x60) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000c80)={'syzkaller1\x00', {0x2, 0x4e22, @remote}}) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r5 = socket$inet6(0xa, 0x6, 0xffffffffffffffff) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x800, 0x30, 0x2, 0x3}, &(0x7f0000000b40)=0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000b80)={r6, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000c40)=0x84) socket$inet(0x2, 0x5, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r7 = accept(r3, 0x0, &(0x7f0000000080)=0x291) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000000e40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000014c0)=ANY=[]}}], 0x1, 0x0) 04:20:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:20:49 executing program 0: setrlimit(0x7, &(0x7f0000000080)) memfd_create(&(0x7f0000000040)='\x00', 0x0) 04:20:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa10000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000400005f5a1fad689900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000"]}, 0x258) [ 259.869991] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 259.912034] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 259.998932] IPVS: ftp: loaded support on port[0] = 21 [ 261.618236] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.624794] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.633079] device bridge_slave_0 entered promiscuous mode [ 261.710785] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.717279] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.725544] device bridge_slave_1 entered promiscuous mode [ 261.803470] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.882041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.116674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.199515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.279928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 262.286966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.362838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 262.369786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.597407] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 262.605056] team0: Port device team_slave_0 added [ 262.680939] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 262.688571] team0: Port device team_slave_1 added [ 262.764323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.845580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.926110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.933587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.942759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.027398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 263.034897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.044227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.909540] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.916034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.922987] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.929387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.937643] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 264.272045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.050460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.335442] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.613751] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 267.619975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.628011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.904417] 8021q: adding VLAN 0 to HW filter on device team0 04:21:00 executing program 5: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) 04:21:00 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:00 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000240)=""/4096) 04:21:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) read(r0, &(0x7f0000000080)=""/123, 0x7b) shutdown(r0, 0x0) 04:21:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000fc0)="153f623406000000766070ff062bc32a7e5b825a154e2ff694b89227a414d443994e51e92660d502edbae9a411dfbacf9ed1e6fae1a8295144d1a865f8f293a8f09f411e5f") r1 = socket(0x5, 0x2, 0x101) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000ac0)={0x78, 0x8000, 0x2, 0x6740bc6a, 0x7}, 0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000001fc0)=@filter={'filter\x00', 0xe, 0x6, 0x39e, [0x0, 0x20000d00, 0x20000e70, 0x20001178], 0x0, &(0x7f0000000cc0), &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}, 0x416) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000140)=""/231, 0x1a3}, {&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/221, 0xdd}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/62, 0x3e}], 0x7, &(0x7f00000006c0)=""/23, 0xfffffffffffffd6c, 0x80}, 0x2000) recvmsg(r2, &(0x7f0000000a40)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/134, 0x86}, {&(0x7f0000000880)=""/143, 0x8f}], 0x2, &(0x7f0000000980)=""/155, 0x9b}, 0x60) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000c80)={'syzkaller1\x00', {0x2, 0x4e22, @remote}}) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r5 = socket$inet6(0xa, 0x6, 0xffffffffffffffff) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x800, 0x30, 0x2, 0x3}, &(0x7f0000000b40)=0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000b80)={r6, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000c40)=0x84) socket$inet(0x2, 0x5, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r7 = accept(r3, 0x0, &(0x7f0000000080)=0x291) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000000e40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000014c0)=ANY=[]}}], 0x1, 0x0) [ 270.664406] kernel msg: ebtables bug: please report to author: entry offsets not in right order [ 270.694941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 270.795550] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 04:21:00 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:01 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x8ad) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f00000006c0), 0x8000fffffffe) 04:21:01 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:01 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000002031f001cfffd946fa2830020200a000900010000a326c9e4317dfff9001000", 0x24}], 0x1}, 0x0) [ 271.118642] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 271.244606] kernel msg: ebtables bug: please report to author: entry offsets not in right order 04:21:01 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 271.311943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 271.349743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 271.385295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 271.386764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 04:21:01 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) [ 271.497447] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 271.709262] kernel msg: ebtables bug: please report to author: entry offsets not in right order 04:21:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x5, 0x7f, 0xcb61, 0x8, 0x0, 0xffffffffffffff9c}, 0x2c) 04:21:01 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x8ad) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f00000006c0), 0x8000fffffffe) 04:21:01 executing program 4: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000480)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r1 = dup2(r0, r0) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000440), &(0x7f0000001580)) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'yam0\x00', {0x2, 0x0, @loopback}}) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 04:21:01 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:01 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) fsync(r1) 04:21:02 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) [ 272.014023] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:02 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4000200000000, 0x807f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000480), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 04:21:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:02 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xfd27) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000680)=""/4096) dup2(r0, r1) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) 04:21:02 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:02 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4000200000000, 0x807f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000480), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) [ 272.631280] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:03 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:03 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 273.289313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="d5454c46000000000000000000000000000040000000000000003a6191c2000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b30000000000"], 0x78) 04:21:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') read$eventfd(r0, &(0x7f0000000040), 0x8) 04:21:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:03 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:03 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000380)={"627269646765300000000000000001f8", 0xfffffffffffffffd}) 04:21:03 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) [ 273.963583] device bridge0 entered promiscuous mode 04:21:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="d5454c46000000000000000000000000000040000000000000003a6191c2000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b30000000000"], 0x78) 04:21:04 executing program 5: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) clone(0x410a0000, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) prlimit64(0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)) mknod$loop(&(0x7f0000000140)='./file1\x00', 0x10c, 0xffffffffffffffff) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 04:21:04 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) dup2(r0, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000000c0)) 04:21:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:04 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 274.851991] IPVS: ftp: loaded support on port[0] = 21 04:21:05 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:05 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:05 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 275.810432] IPVS: ftp: loaded support on port[0] = 21 04:21:05 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) [ 275.908048] nla_parse: 3 callbacks suppressed [ 275.908073] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) 04:21:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:06 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) [ 276.463525] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:06 executing program 1: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:06 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x2000)=nil, 0x2000, 0x0, 0x40006011, r1, 0x0) madvise(&(0x7f00001c1000/0x1000)=nil, 0x1000, 0xb) clone(0x0, &(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000200), &(0x7f0000000100)) [ 276.939851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:07 executing program 1: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) 04:21:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 277.555570] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:07 executing program 1: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa10000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000400005f5a1fad689900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000"]}, 0x258) 04:21:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:08 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:08 executing program 1: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x258) [ 278.180893] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:08 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:08 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[]}, 0x78) [ 278.690768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:08 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) [ 278.925867] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:21:09 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[]}, 0x78) 04:21:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) [ 279.364163] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 279.390044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:09 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:09 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[]}, 0x78) 04:21:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 279.879282] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:21:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) [ 279.953270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:10 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:10 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) 04:21:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 280.457522] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 280.526722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) 04:21:10 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) close(r1) 04:21:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488d") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:11 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) [ 281.062663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) [ 281.185988] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:21:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488d") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:11 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) close(r1) 04:21:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 04:21:11 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) 04:21:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 281.714547] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 281.761393] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:21:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0xf0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaa"]}, 0x168) 04:21:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488d") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:12 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) close(r1) 04:21:12 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) [ 282.140897] kernel msg: ebtables bug: please report to author: entries_size too small [ 282.201284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:12 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 04:21:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0xf0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaa"]}, 0x168) 04:21:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d76") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:12 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(0xffffffffffffffff) [ 282.769815] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) [ 282.858785] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0xf0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaa"]}, 0x168) [ 283.195140] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d76") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:13 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) 04:21:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 04:21:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 283.494813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x168, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1e0) 04:21:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d76") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) 04:21:14 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) [ 283.974357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d7660") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-sse2)\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 04:21:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x168, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa10000000000000000000736e617400000000000000000000000000000000000000000000000000000000"]}, 0x1e0) 04:21:14 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) [ 284.507349] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) 04:21:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 284.714837] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d7660") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:15 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) 04:21:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) 04:21:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x168, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1e0) [ 285.253381] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:15 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/138, 0x8a) [ 285.466535] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) 04:21:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d7660") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:15 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) [ 285.688257] kauditd_printk_skb: 3 callbacks suppressed [ 285.688292] audit: type=1326 audit(1538540475.734:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8361 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 285.825342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 04:21:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1a4, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x21c) 04:21:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) 04:21:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:16 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) [ 286.121850] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 286.334792] audit: type=1326 audit(1538540476.374:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8361 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1a4, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x21c) 04:21:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 286.704227] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)) 04:21:16 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') 04:21:16 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1a4, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001d0000000000000000007465616d5f736c6176655f30000000006272696467655f736c6176655f300000626f6e645f736c6176655f310000000076657468315f746f5f62726964676500000000000000000000000000aaaaaaaaaa0ac87732de6e3a0500000000002f0100ff500100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa10000000000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000400005f5a1fad689900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x21c) [ 287.200247] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:17 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) clock_gettime(0x0, &(0x7f0000001880)) 04:21:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 287.391180] audit: type=1326 audit(1538540477.434:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8422 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1c2, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x23a) 04:21:17 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") getxattr(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)=@random={'security.', 'security.selinux\x00'}, &(0x7f0000000640)=""/4096, 0x1000) 04:21:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 287.654928] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1c2, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x23a) 04:21:18 executing program 3: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r1}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 04:21:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) [ 288.093568] kernel msg: ebtables bug: please report to author: entries_size too small [ 288.150048] audit: type=1326 audit(1538540478.194:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8422 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:18 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000500)=""/246) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) prctl$setptracer(0x59616d61, r4) pwritev(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f00000005c0)='./file0//ile0\x00') syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') socket$inet6(0xa, 0x0, 0x0) 04:21:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1c2, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x23a) 04:21:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 288.648932] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:18 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d1, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x249) 04:21:19 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) [ 289.037792] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x0, 0x5, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 289.242931] audit: type=1326 audit(1538540479.294:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8496 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 [ 290.026452] audit: type=1326 audit(1538540480.074:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8496 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32f6c104000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x34000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:21:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d1, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x249) 04:21:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}], 0x1, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:21 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x20000004e20}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000100)=0x59aa, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) recvmmsg(r1, &(0x7f0000001680)=[{{&(0x7f0000000640)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000001400)=""/252, 0xfc}}], 0x1, 0x0, &(0x7f0000002800)) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) [ 291.347147] kernel msg: ebtables bug: please report to author: entries_size too small [ 291.436156] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:21:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d1, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x249) 04:21:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) [ 291.748113] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003ff) fallocate(0xffffffffffffffff, 0x0, 0x8000, 0x0) unshare(0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000040)}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x0, 0xdb, [], 0x0, &(0x7f0000000800), &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20200, 0x0) keyctl$revoke(0x3, r1) 04:21:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d9, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x251) 04:21:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x0, 0x0, 0x0, {0x5}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 292.125142] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:22 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 292.356645] audit: type=1326 audit(1538540482.404:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8549 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32f6c104000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x34000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:21:22 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) 04:21:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}], 0x1, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d9, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x251) 04:21:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 292.644751] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1d9, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x251) 04:21:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 04:21:23 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) [ 292.916981] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1dd, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x255) [ 293.131909] audit: type=1326 audit(1538540483.174:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8549 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0xffff0000 04:21:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 293.335432] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:23 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="153f6234488dd2be7d6070") r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r0) 04:21:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_RESVSP(r0, 0x89e0, &(0x7f0000000000)) 04:21:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32f6c104000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x34000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:21:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1dd, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x255) 04:21:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 04:21:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(khazad-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/100, 0x64}], 0x1, &(0x7f0000000600)=""/64, 0x40}, 0x0) 04:21:23 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000005000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xf, 0xab, &(0x7f0000000280)="151f210829f3f003fd75c55bf1465a", &(0x7f0000000400)=""/171, 0xb8b}, 0x28) [ 294.043868] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 04:21:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000005000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xf, 0xab, &(0x7f0000000280)="151f210829f3f003fd75c55bf1465a", &(0x7f0000000400)=""/171, 0xb8b}, 0x28) 04:21:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f00000000c0)="153f6234488dd2be7d6070") r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000bcf000), 0x4) close(r1) 04:21:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1dd, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, &(0x7f0000000040), &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x255) [ 294.520048] kernel msg: ebtables bug: please report to author: entries_size too small 04:21:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)={0x14, 0x28, 0x5, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 04:21:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 294.833921] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 294.916433] ================================================================== [ 294.923862] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 294.930469] CPU: 0 PID: 8631 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #63 [ 294.937667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.947057] Call Trace: [ 294.949674] dump_stack+0x306/0x460 [ 294.953338] ? _raw_spin_lock_irqsave+0x227/0x340 [ 294.958235] ? vmx_create_vcpu+0x10df/0x7920 [ 294.962686] kmsan_report+0x1a3/0x2d0 [ 294.966558] __msan_warning+0x7c/0xe0 [ 294.970396] vmx_create_vcpu+0x10df/0x7920 [ 294.974659] ? kmsan_set_origin_inline+0x6b/0x120 [ 294.979545] ? __msan_poison_alloca+0x17a/0x210 [ 294.984289] ? vmx_vm_init+0x340/0x340 [ 294.988217] kvm_arch_vcpu_create+0x25d/0x2f0 [ 294.992754] kvm_vm_ioctl+0x13fd/0x33d0 [ 294.996792] ? __msan_poison_alloca+0x17a/0x210 [ 295.001494] ? do_vfs_ioctl+0x18a/0x2810 [ 295.005582] ? __se_sys_ioctl+0x1da/0x270 [ 295.009772] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 295.014640] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 295.019544] do_vfs_ioctl+0xcf3/0x2810 [ 295.023481] ? security_file_ioctl+0x92/0x200 [ 295.028018] __se_sys_ioctl+0x1da/0x270 [ 295.032044] __x64_sys_ioctl+0x4a/0x70 [ 295.035959] do_syscall_64+0xbe/0x100 [ 295.039798] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.045011] RIP: 0033:0x457579 [ 295.048230] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.067249] RSP: 002b:00007fb16a5acc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.074983] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 295.082285] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 295.089577] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 295.096881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb16a5ad6d4 [ 295.104170] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 295.111477] [ 295.113126] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 295.120064] Variable was created at: [ 295.123805] vmx_create_vcpu+0xd5/0x7920 [ 295.127894] kvm_arch_vcpu_create+0x25d/0x2f0 [ 295.132394] ================================================================== [ 295.139770] Disabling lock debugging due to kernel taint [ 295.145252] Kernel panic - not syncing: panic_on_warn set ... [ 295.145252] [ 295.151151] kernel msg: ebtables bug: please report to author: entries_size too small [ 295.152655] CPU: 0 PID: 8631 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #63 [ 295.152670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.152680] Call Trace: [ 295.152724] dump_stack+0x306/0x460 [ 295.152773] panic+0x54c/0xafa [ 295.152848] kmsan_report+0x2cd/0x2d0 [ 295.192061] __msan_warning+0x7c/0xe0 [ 295.195900] vmx_create_vcpu+0x10df/0x7920 [ 295.200711] ? kmsan_set_origin_inline+0x6b/0x120 [ 295.205600] ? __msan_poison_alloca+0x17a/0x210 [ 295.210313] ? vmx_vm_init+0x340/0x340 [ 295.214232] kvm_arch_vcpu_create+0x25d/0x2f0 [ 295.218766] kvm_vm_ioctl+0x13fd/0x33d0 [ 295.222789] ? __msan_poison_alloca+0x17a/0x210 [ 295.227494] ? do_vfs_ioctl+0x18a/0x2810 [ 295.231587] ? __se_sys_ioctl+0x1da/0x270 [ 295.235798] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 295.240671] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 295.245549] do_vfs_ioctl+0xcf3/0x2810 [ 295.249493] ? security_file_ioctl+0x92/0x200 [ 295.254030] __se_sys_ioctl+0x1da/0x270 [ 295.258053] __x64_sys_ioctl+0x4a/0x70 [ 295.261969] do_syscall_64+0xbe/0x100 [ 295.265805] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.271012] RIP: 0033:0x457579 [ 295.274229] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.293154] RSP: 002b:00007fb16a5acc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.300892] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 295.308176] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 295.315462] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 295.322758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb16a5ad6d4 [ 295.330050] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 295.338303] Kernel Offset: disabled [ 295.341947] Rebooting in 86400 seconds..