[ 54.842467] audit: type=1800 audit(1538925337.870:27): pid=5896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 56.267959] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 60.159000] random: sshd: uninitialized urandom read (32 bytes read) [ 60.549981] random: sshd: uninitialized urandom read (32 bytes read) [ 62.905817] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. [ 68.604161] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/07 15:15:53 fuzzer started [ 73.170834] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/07 15:15:58 dialing manager at 10.128.0.26:36867 2018/10/07 15:15:58 syscalls: 1 2018/10/07 15:15:58 code coverage: enabled 2018/10/07 15:15:58 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/07 15:15:58 setuid sandbox: enabled 2018/10/07 15:15:58 namespace sandbox: enabled 2018/10/07 15:15:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/07 15:15:58 fault injection: enabled 2018/10/07 15:15:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/07 15:15:58 net packed injection: enabled 2018/10/07 15:15:58 net device setup: enabled [ 77.496689] random: crng init done 15:17:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000f, &(0x7f00001c9fff)="03", 0x1) [ 192.133608] IPVS: ftp: loaded support on port[0] = 21 [ 194.456375] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.462982] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.471500] device bridge_slave_0 entered promiscuous mode [ 194.612968] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.619431] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.627920] device bridge_slave_1 entered promiscuous mode [ 194.764165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.900105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.314957] bond0: Enslaving bond_slave_0 as an active interface with an up link 15:17:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000940)=""/131) [ 195.456148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.064184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.065018] IPVS: ftp: loaded support on port[0] = 21 [ 196.071223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.726556] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.734820] team0: Port device team_slave_0 added [ 196.946915] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.955197] team0: Port device team_slave_1 added [ 197.138800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.146001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.155018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.416405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.423569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.432747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.634854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.642585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.651537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.913735] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.921313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.930728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.844141] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.850637] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.859260] device bridge_slave_0 entered promiscuous mode [ 200.187106] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.193932] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.202596] device bridge_slave_1 entered promiscuous mode [ 200.494390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.509622] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.516155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.523173] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.529638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.538406] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 200.729169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 15:18:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488df25d5d6070") clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) [ 200.951968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.460131] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.779757] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.852528] IPVS: ftp: loaded support on port[0] = 21 [ 202.057585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.064685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.337834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.345033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.169180] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.177262] team0: Port device team_slave_0 added [ 203.475871] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.484083] team0: Port device team_slave_1 added [ 203.788336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.795539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.804385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.129190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 204.136449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.145516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.329340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.337433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.346599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.629758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.637536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.646733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.702757] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.709356] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.718030] device bridge_slave_0 entered promiscuous mode [ 207.011231] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.017818] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.026448] device bridge_slave_1 entered promiscuous mode [ 207.290519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.365438] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.371981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.378896] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.385463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.394343] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.558775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.262444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.490768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.812041] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.120652] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.127824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 15:18:12 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000008001, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000000c0)={0xe0001, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 209.420424] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.427642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.442149] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.450135] team0: Port device team_slave_0 added [ 210.490062] IPVS: ftp: loaded support on port[0] = 21 [ 210.806263] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.814869] team0: Port device team_slave_1 added [ 211.149153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.156458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.165440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.530581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.537773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.546946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.890127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.897850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.907089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.230646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.238445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.247574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.927124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.132627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.319754] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.326292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.334440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.359588] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.366215] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.374854] device bridge_slave_0 entered promiscuous mode [ 216.563591] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.570050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.577095] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.583623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.592442] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.718102] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.724852] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.733340] device bridge_slave_1 entered promiscuous mode [ 216.752091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.773268] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.088240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.414475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.433734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.786443] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.173546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.180660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.499019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 219.506214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 15:18:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) [ 220.783827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.792075] team0: Port device team_slave_0 added [ 221.018861] IPVS: ftp: loaded support on port[0] = 21 [ 221.154943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.163015] team0: Port device team_slave_1 added [ 221.486849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.494074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.503182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.841236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.848413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.857394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.239810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.247520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.256626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.352018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.666347] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.673984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.683162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.919926] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.498051] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.504588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.512453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:18:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c01000000000065750ede825e45a90f1c09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a915932f764b26916a0dc38b518cdf4dba35cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c720e6ff0000000000710e13"], 0x82) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0xfff}) 15:18:29 executing program 0: r0 = socket$inet(0x2, 0xf, 0x2000000088) sendto$inet(r0, &(0x7f0000000000), 0xc8, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0), 0x4000000000002e5, 0x40000040, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) epoll_wait(r1, &(0x7f0000000180), 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000680300000000000000000000000000008801000000000000d0020000d0020000d0020000d0020000d002000003000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086bd012d52bc5aa2ebb9f8785d00013028a2e6ddffbb36dd1eceb307943b9fafc083bb502248b83edefabf91ccc3728deb58f78321614c6cc1d6e51434a8a1d7477babe4"], @ANYBLOB="e000000200000000ffffffffff00000069726c616e30000000000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f00030400000000000000000000000000002801880100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000900000008000000020000000200000040007365740000000000000000000000000000000000000000000000000000000100000005000000feffffff05000000ff0300000000000001000000170405006000534554000000000000000000000000000000000000000000000000000000060000000200000007000000080000006a0800001b0000000180000080030100070000000000000005000000010000000500000000800000ffffffff01008000ac14140ae0000002ffffffff6c88233e6c6f000000000000000000000000000067726574617030000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000210003200000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000060000000800000000000000010000006000434c5553544552495000000000000000000000000000000000000000000000000000b45dab2d28f505000a000800130026002700070027002c002f003500060020001e0037003d000d0003000000010000003f0000000100010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3c8) r2 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000008, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000740)={0x8c, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, r2}, @acquire_done={0x40106309, r3, 0x1}, @decrefs={0x40046307, 0x3}, @increfs={0x40046304, 0x4}, @acquire={0x40046305, 0x3}, @reply_sg={0x40486312, {{0x2, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x60, 0x20, &(0x7f0000000100)=[@fda={0x66646185, 0x3, 0x1, 0xc}, @fda={0x66646185, 0x4, 0x1, 0x18}, @fda={0x66646185, 0x0, 0x2, 0xf}], &(0x7f0000000180)=[0x28, 0x30, 0x281fc439f535383c, 0x30]}, 0x3}}], 0x4b, 0x0, &(0x7f00000006c0)="7b50c0e1578196bda6f18dece14c89ed058323f4fab3751cca6512f788a6a01ef5fe93943e52d70c35eeb20f7f6c05c7595c5795fe2ae35710b16a74971ac42294706f1a626c2815afe812"}) [ 226.581882] QAT: Invalid ioctl [ 226.602375] QAT: Invalid ioctl [ 226.609073] QAT: Invalid ioctl [ 226.632639] QAT: Invalid ioctl 15:18:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmsg$nl_crypto(r1, &(0x7f0000000200)={&(0x7f00009dd000), 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10}, 0x10}}, 0x0) [ 227.149475] 8021q: adding VLAN 0 to HW filter on device team0 15:18:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)="765cba4304177678b9e6b7e79680bc1c7728f43dbead049e15f283bf45ad2ecb41b1d2944d5629f835dd9ef0bd0783809f23c06209f8b452e6c9ba64876e24e4b09e023bb4780000000000000000", 0x2008, 0x0) [ 227.330603] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.337159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.344183] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.350640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.359220] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.525074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 15:18:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff84, 0xa}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x52001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x100, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f00000001c0)=""/31) 15:18:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x4, 0x0, 0x4}, 0x6}}, 0x18) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x401c5820, 0x0) getpid() [ 228.380564] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.387122] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.395812] device bridge_slave_0 entered promiscuous mode 15:18:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd256766000") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x23, &(0x7f0000000280)={@remote}, 0x21) [ 228.789996] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.796769] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.805439] device bridge_slave_1 entered promiscuous mode 15:18:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="d7", 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x2400) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000040)={0x3, 0x1, 0x7, 0x1, 0x5}) [ 229.268721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.638760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.733657] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.015998] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.324887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.332133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.754604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.761885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.397312] ip (6947) used greatest stack depth: 53040 bytes left [ 232.691039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.699201] team0: Port device team_slave_0 added [ 232.871996] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.880065] team0: Port device team_slave_1 added [ 233.105035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.227488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 233.234691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.243598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.503957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 233.511016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.519993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.790828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.798597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.807598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.018327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.026103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.035131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.227945] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.245157] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.251821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.259601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.329426] input: syz1 as /devices/virtual/input/input5 [ 235.385430] input: syz1 as /devices/virtual/input/input6 15:18:38 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000500)=""/4096}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00', 0x22}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) dup3(r0, r1, 0x0) [ 235.880533] input: syz0 as /devices/virtual/input/input7 [ 235.991231] input: syz0 as /devices/virtual/input/input8 [ 236.390082] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.170057] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.176621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.183716] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.190184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.198844] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.205655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.529711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.336761] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.190427] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.196948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.204979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:18:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488df25d5d6070") clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) [ 242.080561] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.794900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.331422] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 15:18:48 executing program 3: [ 245.821023] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.827591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.835665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.119304] 8021q: adding VLAN 0 to HW filter on device team0 15:18:51 executing program 4: 15:18:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, 0xfffffffffffffffd, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x581000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000a00)={r2, 0x1, 0x6, @remote}, 0x10) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40040) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3c, 0xfffffffffffff000]) 15:18:51 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xb10b, 0x800) sendmsg$kcm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000040)="228fbef6614919f75384abcbfeff96dc4138b54bd352e6c03bddf5a956d24d88af1b5d59de132a85eef4f5fcc8d1ca34d651c9b2826c23cdcc9549b60a0d47079b82b2a7c3cfeb39d1cee4bb60b9384a0efac2197eb504", 0x57}, {&(0x7f00000000c0)="ad", 0x1}, {&(0x7f0000000100)="754cfb5202490bc64f75514f9f6d13e106ef8b1fa998fb22b34088b0287ad147843384604cbdc0ed935c5afc1a6646510cf44bc77fa59b1af09717d1303db41cf57e4b066930334d62d565fcd1198f9af3cb3c7a8af5c42b6a10d89d6798b7876dd4e24b61e10f3f8b7f702a35c77f949c098e1ec85d25b44a2bef6e7586810b", 0x80}, {&(0x7f0000000180)="68a456fb9f2840697be2376fe963a9d16c84d8f9bd4f882b9d213624c036bbb794c679714a2da21710fbd02ae027c794be04b5ccfccf040da589f296fc3c617531d12d3d94ca9ffde5f849aee942c96d2b02240ad8ecfe044f26016d896e394401e67332e362c87565b04d6609368129cd6614aeafa8cd5ac25694f6e49ae28b86ac06d43c700441cf9c11ee4df4ecfdd74854fe9e1645beea054169de2a38ea8625d64b2b1c3c4eb3a59c03d4237e31b740d2abd3261b75fb467c03202ef74a200299496916229e60233da179d2f2246ef7d15545556c239539cab633c72cf93148b5032c136cd22028bea45b994315463571688d2e7eda22112d6cf0b71f84e6ac13927ffda863d93bfb373b823c453b3efd60b4241158e7376774318bcfe0b370794c12177e4507907f637d2dbf4cd8d6c9901ed0fc9308d96a6820929c065cb7cb26784cdba57aadc196e5d3334d1320395d943a096e0eb03de305e3879a944e8244f7ccbde2e2b802d9fe69d08a0445f0fb08a4bb73ca33d7087a605910e8c4c75dc8a6fb51058d54948dc0dc1b40d28058bbfcabe13779f2e33cd5a4075b31266828240439b3e7cd133312018ab439a8436ef8e8d1976aafa94adcbf01e45e04a2970cf8ea5ab6a7363c6a3df10c39814f4e969f234b62b8be16c5cd4527b70298a4bba7bcc2034cacbd23524ba2ca43d8b66d9c1cfa9af905288f1da36104f55ffbea897af589577f79e502e6048c472d8217157a9416f0172dbacd43af6b724bc2898a0d2901c60268fdc8496aa834a4b623ef1bada04706d152100aadb9e6081c9d4027c8cf59ff042a21bbcfbadd7f70a43b4a1b002ecd83bb5c9cf16a1cd985d4a3855145202747afb5f31e6d483f9380f75a0418dcc30fba2064507eb63a28abbbcc6f9a5db83041f417159d90c42cccb4a0dbf72351d0ee350dec6e0f14235bfa91da8028db250543d00a7f3bfe542629545fb45457826c560271286b8ca5376e4e81e5d1b9dfcc068d67f80db34a6567ba40eead8bd01ff5c39e120ebdbf52d86fc05d5105b302c3a58d7cb5a1aee97991c1046c2bd6f60dd97179156ef4f3bb4fc1969dce29a7c0d4e434afc986175f85c1718d77ae702f22e99ed6b044a5b5759dd2b869ea20de3b3a80c0b7a12fad2047f3b7fac994f6fa9220ab60b823f510446c44a3a01567563f1f2173379a786338f63c49b624ae0867e24c5c7d190714861738694fbf0097daefcad0fd972d8bbcb9ba51b2168f686398b95b5712c6ffea837b5af1ce06f83b1a0ed50b253ec3a6d9037e4bcd4851cfe0c3091008722e4d9d8e0925033b492e26cba44f2cca084217642ebfad9fd81e8cc432ca11090b0c628e53c052f75b486123733061ab388159ee4b1939dcee512e55d55a46b76c4794823a4cac3a36961f6bcaba6b340fe9b2408ddb570a1ed6b3e4ddc5b3222d798f179f3ed880c21219bc8467ddc553b9713fe8abe8a8a433e9d646d67e01b93c68a7c9e2ec623b5c6aed2547e3c801d85590cf2fb76506f33c18657348eb702394a0751d1be098c4d5f862cd553ff0aa3e716d32bdb8c95a357f1d5dc0156dec9076b52fb80ab295ae10ce7492939b2b762f65231c02af034c3a8d5a88a4568c83bb224e7b60fa11983d707e472e73a0328a4dac01d8b4b121222b734b4c0692ffd808a86c88170bac5f34ad4b528e2f7b6a11c481a02db34aff5179f2b11c4e623eabdd75a0be4567cc58b3c26b0d23e9269d0de0b748d9fe9c4c1eeb2d1ad2df121e8d0e51f18ce1f381a20ee692646be6522981ba26a4a6348e25b4fc0e90118e66921f28159e12b23904ee0782e2cee6990c94dbf1ea7ea561bcd52b47398b2a1fb4b1750f9d409d21ab3d3941a7e9f478e9d7b0014e6a28ac781f53895e295b43d2f25df282a8ddc74eecd9ad748fbf776c2bf45112d944ed5589a50186480c9b15f2929dfd0afe0534bd46d7de790824265edbf4506b5f54742908316de4e0198502583d30c404dbbc08a8ec4a447e85b64575f21abdf8f693735772dfe4d52a62145718d3d3945ac5ebaf85fdcf498f2c5774effa5709dc4eb560d8a567e5bad1c5187b1c7e1bfde8a67e6ed508b4f1c16ddd0457ffc2236a79c156909f44176c14d9f262e8d4a7715daed3f4d55e5debd66020d250eb038a153d3430f2750b5665cbe84c6f4a83bbf0bd3e25f43f4e1332f746a162457d4a0ef914e47021a7ec04f023530ef1d6c3670dada027d64459919fc73ef216f76762a980d62a244025230d4620ba35e318ac2f3c3b9fb7379bdc1134a66686a37a711a533c8c2ffd4fecee066bce5eabcb1add5f73c630b884bd97c586d450d4843676823f8643ea10899a375f3d91a7383d2be087feb30fd1eb084b7a48297723a878cb80eaba9ba097de3ac7131fc64bd36302b0515208e71bddb24d52f0f21bdb589b157384794737090a9e0b267d6ee2508c4fd5cd09d7d4751cc8570c76858dfc0af1912a036d2167ef9c946f406b98ec62891becf01844c88b13851347f2be6441d3cddd07ca74ee6bcd3185994fdca36caf9b043a8cf7927f324cc1c4766d0c0ba064a01dc3b4f03dae6dbaf83fb61b1cfd0b0e2e88a44cca22ef5a10c1f082e08db3466453aa832ca93174b9064ef50eecbc7c4dc2df4ab2ec54495b9815bbbf4eca054a56c3f1af4658a08b9181f4fc2123253c922aded884112f1a81f66116ea9de6e569facd340623f6fc12bd781e6b34fe2cc1c08ae9a288ea0ac78bc68a0ae24185012fdd8bf4580f7864fd55ed5b406226c795e9f0140c017550f0d4ea4abdec67fa79b9dabc4c5825af61b236151d98abd7232b5a75fe609ba77714be702fee530c3011a5e0cc32c87e2d79464e6f16e148e21482ac958a03b4c20acc475f454f05705d9b5ea8dfd932a24361111d5c095e3f63e8c3d60dd34eb0b549d49555d5ffa572affd4e49a96af4dce2145556628aa1b8473c71912572010dacbb41227a436196afb2f696cc6e70c477b5eb11323ab3cb557c9434fece4382250061c8d3b38dc8962237d7044b5554e0b48d18197c4e0a93118bd5ea998b95d96d42cb1240824d31e776e7f2818ea3023ec0e23f7609c10b261d1b5e5fbb3e4e4890752350cf07aba3d76b03b7f6c80229c219dc62126383f27bfb8ae97e5192798b3eb112b59c54be72b8cc902d4f47b07b757125923f3faf0c21dc5b25e3f2bd5907a934725b8a9807a698d8d3589bbc233ec03e157b8bee09445671f7f9fa31080bb779261ddc95cb5bd5d617c5bb1d99672d6ae222abee4f9bfab48a3d58d49596a440674902f4ea547cb69e3c041ea19e2caa74c13a0609c4cf3667fece733f58c384f29055dcacb1fdbd5e6397c7a8323bbf0bedaa35c63d898ad2b2984493f2dca6281f9886012d84db72b032c1059b54ca460cfbe3e3fb4e725760f54554abdcce6d8bb801cc8414a1b5a893e47b7153b68d4d6f214287a8e3046e30b6842535eaf9366a3d9bd721ac55c92a0bc5de38039a82f400ec33031872b616cc2f0c70a054c2aadc92078d0cdd7b72b69fc7d0dcf18e2166ee8c39c2f24339e59760df6bf2c74663a5093399d4444f27bb85c96abf5bfe1282116d249e5d627dfea840ef1ca070e3fe81a854c7e5553a942fd24d621631e89641abc6aa010f780a0162a723bddef746754a5c67c153766d416ec86cc2bf015485fbf3ca5dac330df4ab5dbb1aa10739d242fcb0ae4d3e8a20a0a698743cea67af66c0c82baaf60df737ab1ca64c53149f6f2bce33c3b5a19d511b0a11e36f94d47b3490bb85c816db9bf93cf50a492c8d65424e3a754a9bb6357e86b5c72993f1f616ae6164d407f6b4b44d3dff66b70ff519a77b241cc7b75fe9b64fb2ff7299a5652f7aca8cd39891c6cb31a42bd8f17e586c536aa3e54889beaae7d436b17ca118a1b6e8b581b208532a2275984de10ec766f582fac7d7d7e92cfeee637f0368efd8238cdf9cdfd599716afed67d86c863eca0862497da0a5353a092ecdf886b27a55a5ee078464188e9b7d5a3a062d2d915f2b28bed7b26f5e7636cea1923d1703f597eac7e1675e023f75ac6a7ed5ece4b6519d072cd33c0d84708ab4b8f443af6aadf56494299c7c3740908463d857d858348445d3b6219cdc7949bee0f54fa692708584c46deb9650d06cdc3118b1a7095da2667438510bb77fb140dfbc3cd411cadb4a25e3a270edc9273db90af557945290c0742b5bfa2f872c5a3419ac7cb3fc0b70fa35d88094ed5b32cf6741815623ccf282862d7d3c61488272663d6b96198bf4ec216f74962e8a0bbc61e56c1359b6426d46896a09a44b71ff6c4123697ab071ffdc2d11f973b893ba0b0bdb9022e51bdd4e3701b656aea09819e3a19026db531077b5e15fe7c24f36c9449a21710fea8492232160a1dc330d925c41d4fd84aebcde619bc2dc711f34cbda5b48f803a324780343b2109ddd81411fc2caee21779b2bd4f60492b062df4e40b1f4ce574851c8ffcddf45d9f4af203307f95fc5246c0e285d7abbfdb11396bbbbbbc9d7599ba0e4a7b240e5a53bf0555771dc8e71b12a0402a5d7f34e650f8747b8f5a38d54205d39b4bc6f92241507880243c37043fedd266ee4b8765136c68fb8ef5625460bf679aecbe6a88a82a05d39a2a52aac3219fccdd1040158d68b1102eab337684409dad118c7c91b1dccdb82509a25adb89b6d3a000fbc6150f6c8e5ab373be7fe77820d196ad22e106e038838e02ea4f9aafa1c09142db87d90b8d84a652febac62546e9342da1958536008bcc91b0b09d4d558ca36aa43ea18bb99f499f21c3b61317aa9146155c3c95c8416e1d1a08e1f29f39f78763a177fd9db2d37af2840511eff2350a8f991c89657e2c5ebac7a479b3b398fd021ccb19223220eace6cb5cae94396d9fee2aaab143a691c8c0f9a3141d5ebb547b28e51ba91ee3bb54fd279883209cac42a8bef1f5be6a47a6e09c847a5530c36a8bfd5fcc9699a726658bb9afb893a96b90dd68f03e741a833192474a1ba817b13c39b9aadc1919630d3dd17c8f11d3cd95aaacebee24e92b1ac4e793f85670c41075613e13111e4109b2bae4566a33d60dddaab4e11c3161b07f0c7f685c3a497f91c427453b72a4d266d76b548b8693f5d936c2643f51514b110882f8aeff4bfeb466b9beff36619463de79943c2616851d72265a6689de494d6aa5333cce7c61af598f7932cf1fd78fd570924010902dc91000b6704826de21b0f6c17297723e2bea1757dd4a8dcfabb84d076c8d727e0e968fa7c0cb7b58671f7b0558a26bc885f3a95759c640d44d5534bb2c4ca59aebaff9da967ed729e32c3b33936bfa835aa3b05cf6cc00a6be7bda5459dff3ad83e6bf81caf5a55ec30665ad69b730274c9932d7981fbb67d954983fb0e4180683bb96395dda33770fe3a96fcd86e344dd53928f6b790988448994039a7a95cba877b4f183650d2e20119f9cccbb6aac9d869a1b06623d683a2dc85600d6bcf9ccdb76dc7fe7a4cecf34b86f55e45d1f16dc2185ab97a55b25e2114ab1ca1d18da36b753d4acff0cf19dee7950ad871d5df31d6d864e7845cb4a8410155adeea6527927f97d7c8cad19bde84c0088e20d6a15a65e66be48932905449ab8befd5ae2496e072d8545295047273b1a0779b39a88b19a9ecf6ec89e1b89f76ae6625150a0a9b290a445ffe30f4bd3166542574c6dd2189cebf3848e25f9bdc8d0db319b296764893365831e9a56a347baca53fb718be2ea1c101fd573fc33", 0x1000}, {&(0x7f0000001180)="ae8804fc49069096e8bf6a343843c0cfd123cda79e4a2c76b0f8304361c1", 0x1e}, {&(0x7f00000011c0)="6c3020cd71269a61cceded4d6f506832b650e4e98b9ca98d7dfca3336384c48058dc50", 0x23}, {&(0x7f0000001200)="3dfaf8439606dc202f6b377a78ff5d2e4e2904bb3ca432379f7cbf2ca566ed6a26a42c9ea67cb75da827a0859d86225a6a1b7e5f448bd36bb64b812d4399ef80ef7523ab2d04a5eda70ae8c7ccde23caa3fa23ce06a1b53fe6767a90589c737a70581b588f348e78aa43c57d39616e47cb8311ea8bea9c835850d6ff2f1a3882634573f14f56df310057e94733d6a48d1c4257ed334cdc1841", 0x99}, {&(0x7f00000012c0)="d4d79a0ace0f93fa3c2235ecb29ad311a63c0c652e2107ee111f7a6f9ab4bbf6ee979a9fa2811785c9875991057de81e7998ad13d46c3c0b1df8039d6f89d1c1760f8cbdcba974ac697a216938a45f72ff8c8e7b91821e", 0x57}, {&(0x7f0000001340)}, {&(0x7f0000001380)="a79daf6d9344e088d9f4d7d33ea766f88d138656d1de0f17d2437b3fa5475d896b249a1056a3959f", 0x28}], 0xa, &(0x7f0000001480)=[{0x38, 0x0, 0x7, "5df785ef6e3d6cd74e26141730a3ef9ed4d7f43d6b35772c0f427d348eb522deaabd"}, {0xd8, 0x105, 0xd15, "568ecb596fb79646a9c464e68730533892ea1216c82dcf793003abd55f064eaf3abb83315e17e561f98095c20d583882add79401bddf18edb4f2a504cdd753d11041b153313b3600403a33d5bf25abe8feb53b95e29df714d794f5e1324695e44118d4c1528f7e682f2a2b26f322343c6d918d670968409da07c346dbce3561e92d0093cf213b87b88de345e45f4bbf6a3d913fa80415ace6d6a324afc9bd3cdc6d688c0f3ffb01c75147a4517fd2318289257af54ff5d4df00aa9bcc51481910f"}, {0x40, 0x0, 0xbb3c, "ac38cc395b831945987da6fc79170c8af2a5d6b5948392e6bb5c2bb9479e8e46ce8187d929708081ba68d9ab8f93"}, {0xf8, 0x11f, 0x8, "5b9fe0c1ef3a55ecf9a798bb52834ef79c8503ef7fddf9d87d3c6c596d20acbb087e87a6d34dc1dddd9b7a9544a68553017859d966c647c614f13203c31ab99892abd7c01a9def647bf62c5e0507e1ef72bb35a03c419a28b6063ab850a30b236e8b760b131ea3871b8dd5a168f419c6af7f44f8346c87c910ca4edc32ecf75b656e14cc9e5268759759356aa5afd4ba4c9f184b13cb7a731dc98fd5540b8f9f1efc976ee57303e2eeee15079f2d948feae0cbb91a07c02cf752d516e31677643bc143fc9f0ba87c7036e134e25a70b720d4a1006dafdcc6184ec2b944e7201de350b0e964a46343"}, {0x108, 0x114, 0x4, "c636e37dee1b1d09f95975913c1753f58c941013c1d7e3465bcd0376158df745e40a055cff91f88199f4fc560b98605d21fabad7a23af15d6cabaac5456ed2cf20ae2a96722198d11b07b00d71b6c7d036070efc4470048b178384accf55290d1b1f9916a86848d4328d7208c96cc777a30f6e322754b0f1e3d5b4e8544fe18374d92646cea1d4e53373379ae889dcd407b7c7a60b008986efe33b912492fb293cc1e5dddf03bca6d28f36abdfe3a97a724b014ac8071055bac1a3ade90171d264927caffe47c5357e6d7e36c959ba830c150826ab942735609273b7604ae5201e18618f7015e56f83ee5dbcc08fcefc14"}, {0x38, 0x117, 0x3, "ae196a197e247eb03a2d23370fc6317b4109fc1defea4f0c0f46ca710957a7669ce5d4190a0e26"}, {0x90, 0x0, 0x1, "2b98f30f749143d2955a1412c73172a25285b06de8139f918d37be83442807d57f8c0d6115ee30b26f9c921853d56f89b90049cecec37314017cb5ff4b13596c5cb8b0c9eedd0ed46c9562f06deee0f556c0084d7b928f4c2cffd1ec5e3c43d59510585f0b1bad7307ac7f6f60c9b7de1f3b8b552ee11d8dedd214"}], 0x418, 0x10}, 0x20000000) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000001900), &(0x7f0000001940)=0x30) pipe2(&(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r1, &(0x7f00000019c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0xc0000) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000001a00)='nr0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a80)={0x0, r0, 0x0, 0x2, &(0x7f0000001a40)='%\x00', 0xffffffffffffffff}, 0x30) r5 = syz_open_procfs$namespace(r3, &(0x7f0000001ac0)='ns/user\x00') setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000001b00)=0x7fff, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001b40)={0x26f8, 0x1, 0x2000}, 0x4) recvmmsg(r1, &(0x7f0000003180)=[{{&(0x7f0000001b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/142, 0x8e}], 0x2, 0x0, 0x0, 0x8}, 0xb1d}, {{&(0x7f0000002d00)=@sco, 0x80, &(0x7f0000003040)=[{&(0x7f0000002d80)=""/117, 0x75}, {&(0x7f0000002e00)=""/111, 0x6f}, {&(0x7f0000002e80)=""/30, 0x1e}, {&(0x7f0000002ec0)=""/68, 0x44}, {&(0x7f0000002f40)=""/71, 0x47}, {&(0x7f0000002fc0)=""/74, 0x4a}], 0x6, &(0x7f00000030c0)=""/133, 0x85, 0xa3f}, 0xff}], 0x2, 0x40, 0x0) sendmsg$nl_route(r2, &(0x7f00000032c0)={&(0x7f0000003200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000003280)={&(0x7f0000003240)=@ipv6_getnetconf={0x2c, 0x52, 0x414, 0x70bd27, 0x25dfdbfb, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3ff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @NETCONFA_IFINDEX={0x8, 0x1, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4001) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000003300)=""/199, &(0x7f0000003400)=0xc7) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003440)=r4, 0x4) fstat(r5, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r8) execveat(r2, &(0x7f0000003500)='./file0\x00', &(0x7f0000003740)=[&(0x7f0000003540)='\x00', &(0x7f0000003580)='%\x00', &(0x7f00000035c0)='cgroupnodev\x00', &(0x7f0000003600)='(\x00', &(0x7f0000003640)='[@#vmnet1mime_type\x00', &(0x7f0000003680)='nr0\x00', &(0x7f00000036c0)='{\x00', &(0x7f0000003700)='nr0\x00'], &(0x7f0000003840)=[&(0x7f0000003780)='md5sum:\x00', &(0x7f00000037c0)='ns/user\x00', &(0x7f0000003800)='ns/user\x00'], 0x1000) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000003880)=r6) fsetxattr$trusted_overlay_redirect(r7, &(0x7f00000038c0)='trusted.overlay.redirect\x00', &(0x7f0000003900)='./file0\x00', 0x8, 0x0) bind$bt_rfcomm(r1, &(0x7f0000003940)={0x1f, {0x9, 0x8, 0xfffffffffffffbff, 0xffffffffffffffe0, 0xffff, 0x7}, 0x68d}, 0xa) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000003980)={0x7, 0x0, [{0x80000019, 0x0, 0x4, 0x70000000, 0x957}, {0x7, 0x9, 0x5, 0x8, 0x1}, {0x4, 0x4, 0x4, 0x7fffffff, 0x4}, {0xc000000a, 0x70a7, 0x4, 0x8000, 0x1}, {0x80000008, 0x2, 0x4, 0x44e0, 0xfff}, {0xc0000019, 0x0, 0x6, 0x8, 0x4}, {0x4, 0x101, 0x1, 0x0, 0x8000}]}) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000003a40)=""/119) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000003ac0)) syz_open_dev$usb(&(0x7f0000003b00)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000003b40)) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000003b80)=@req={0x669, 0x7fffffff, 0x4, 0x20}, 0x10) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000003bc0)) syz_open_dev$audion(&(0x7f0000003d40)='/dev/audio#\x00', 0x7, 0x400000) getgroups(0x1, &(0x7f0000003d80)=[r8]) 15:18:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488df25d5d6070") clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) 15:18:51 executing program 1: 15:18:51 executing program 3: 15:18:51 executing program 3: 15:18:51 executing program 1: 15:18:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'team0\x00'}, 0x18) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000027c0)={{0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x10000, 0x0, &(0x7f0000ff0000/0x10000)=nil) fchmod(r0, 0x2) 15:18:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)="e91f7189591e9233614b00", 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000003c0), 0x4) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 15:18:51 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fchmod(r0, 0x0) 15:18:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) pipe(&(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0), &(0x7f0000000140)={0x8}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 15:18:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) fchmod(r0, 0x0) 15:18:52 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0), 0xc, &(0x7f0000002980), 0x0, &(0x7f00000029c0)}, 0x20000080) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="527972715f8bfb1a4753f7c82a7b07bf496d8f906b2ee1c6918518d107d6"], 0x1e) io_setup(0x101, &(0x7f0000000040)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000640)=""/222) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280), &(0x7f00000002c0)=0xfffffffffffffdd9) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000100)={0x5}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$alg(0x26, 0x5, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x2000, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000003b80)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="e054c4ad1f4f0249c5229a656302a0bcd343edc79a91c7fbf60ff87bdff39efc1515628e108ca8a51572ee9309e811a3d3553f8579a1d294efd49416c5cf607b809813375377395de149050ae1ce1b8aec5459e391a5872e8294a735130f042aa967b6866012532c3f3eecae0e2cfda430434da4fa7d8ea98b7602f66503fb6fc33ab5e36f3f13b6f7a0f353", 0x8c}], 0x1, &(0x7f0000000140)}, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0x9, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, 0x1, 0x6, 0x6, 0x5, 0x2, 0x8, 0x7, 0x1, 0x0, 0x9, 0x0, 0x9, 0xcf0, 0x401, 0x3f, 0x7, 0x8, 0x1ff, 0x7, 0x0, 0x9, 0x0, 0xef0, 0x0, 0x0, 0x47f, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x4258, 0x4, @perf_config_ext={0x0, 0xe37}, 0x0, 0x81, 0x0, 0x0, 0x3, 0x10001}, 0x0, 0x8, r0, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000002480), 0x871, 0x0, &(0x7f00000001c0)={0x77359400}) perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x9d1, 0x6, 0x5, 0x0, 0x0, 0x8, 0x0, 0x4, 0x4, 0x2, 0x9, 0xff, 0x9, 0x1000, 0x0, 0xffffffff, 0x1, 0x7, 0xf8, 0xa, 0x0, 0x6, 0x0, 0x8, 0xfffffffffffffff7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x709, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000880), 0x2}, 0x0, 0x7, 0x0, 0x0, 0x9, 0xfffffffffffffffb, 0x139c}, 0x0, 0x8, 0xffffffffffffffff, 0x0) [ 249.417220] IPVS: ftp: loaded support on port[0] = 21 [ 250.732998] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.739397] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.747482] device bridge_slave_0 entered promiscuous mode [ 250.821924] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.828573] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.836607] device bridge_slave_1 entered promiscuous mode [ 250.911411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.987382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.214833] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.296509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.483101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.490145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.589480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.596564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.824294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.832248] team0: Port device team_slave_0 added [ 251.908225] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.915840] team0: Port device team_slave_1 added [ 251.993907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.075512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.155040] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.162376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.171171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.248147] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.255508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.264681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.115697] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.122144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.128866] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.135386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.144075] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.402255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.217873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.511160] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.799199] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.805572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.813629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.099411] 8021q: adding VLAN 0 to HW filter on device team0 15:19:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents(r0, &(0x7f00000000c0)=""/25, 0x19) getdents(r0, &(0x7f0000000000)=""/47, 0x2f) exit(0x0) getdents(r0, &(0x7f0000000040)=""/57, 0x39) 15:19:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x100}, 0x1c) 15:19:02 executing program 0: clock_adjtime(0x0, &(0x7f0000000200)={0x7}) 15:19:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00', 0x22}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) dup3(r0, r1, 0x0) 15:19:02 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300000f0000000000000000000000010014000000f60005000600000000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000ff0000000000000000405602eb3530da52b501d099a893ead8d1f5e7d0d3"], 0x8d}}, 0x0) 15:19:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x40000000004, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)}]) [ 259.161258] input: syz0 as /devices/virtual/input/input9 15:19:02 executing program 0: 15:19:02 executing program 2: 15:19:02 executing program 4: 15:19:02 executing program 3: 15:19:02 executing program 4: 15:19:02 executing program 0: 15:19:03 executing program 5: 15:19:03 executing program 1: 15:19:03 executing program 4: 15:19:03 executing program 2: 15:19:03 executing program 3: 15:19:03 executing program 0: 15:19:03 executing program 4: 15:19:03 executing program 5: 15:19:03 executing program 0: 15:19:03 executing program 3: 15:19:03 executing program 2: 15:19:03 executing program 1: 15:19:03 executing program 4: 15:19:03 executing program 5: 15:19:03 executing program 0: 15:19:04 executing program 3: 15:19:04 executing program 2: 15:19:04 executing program 1: 15:19:04 executing program 4: 15:19:04 executing program 0: 15:19:04 executing program 2: 15:19:04 executing program 5: 15:19:04 executing program 3: 15:19:04 executing program 4: 15:19:04 executing program 1: 15:19:04 executing program 2: 15:19:04 executing program 0: 15:19:05 executing program 5: 15:19:05 executing program 4: 15:19:05 executing program 3: 15:19:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) 15:19:05 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @broadcast}, 0x0, {}, 'syz_tun\x00'}) 15:19:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'team0\x00'}, 0x18) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000027c0)={{0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0505510, &(0x7f0000001000)) 15:19:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 15:19:05 executing program 5: 15:19:05 executing program 4: 15:19:05 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffd0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x10000e0}, 0x63) 15:19:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x400000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={'ip_vti0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f00000007c0)=0xe8) getsockname$packet(r0, &(0x7f0000000800), &(0x7f0000000840)=0x14) connect$netlink(r1, &(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000880)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000008c0)={'yam0\x00'}) getsockname$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000940)=0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x71, 0x4) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000340)={'ip_vti0\x00', {0x2, 0x4e23, @remote}}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8220}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) write$binfmt_misc(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) shutdown(r2, 0x1) [ 262.627950] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 262.788911] raw_sendmsg: syz-executor2 forgot to set AF_INET. Fix it! 15:19:05 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000680)="7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000400)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\x00'}}, 0x22) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000005c0)) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x9, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000300)={0x4, 0xffffffffffffffff, 0x0, 0x0, 0x7}) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x93}, 0xb) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001180)=ANY=[], &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000700)=""/255, 0xff}], 0x1}}, {{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x2, 0x100, &(0x7f0000001000)={0x77359400}) 15:19:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername(r0, &(0x7f00000009c0)=@xdp, &(0x7f0000000a40)=0x80) 15:19:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x10}) 15:19:06 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000280)="1f0000000506ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 15:19:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='stat\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000170, 0x0) [ 263.323694] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 263.331180] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 263.421859] hrtimer: interrupt took 50545 ns 15:19:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) 15:19:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x190, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x74, 0x87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 15:19:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000440)={@remote}) sendto(r0, &(0x7f0000000040)="b65c", 0x2, 0x1, &(0x7f00000004c0)=@generic={0x0, "94296ac904011c26d3a3b8152e9e6f59de6884faa62e48fbf23ee4dc66d36186ef3c3147ae1fcfd2104c336016224319047e5f9c83912ad807eae03b41b33e5ffa0087cd5a0012cbbfe78e73c8517e82dd82da1efb0da308528acd3bef8c822bdac481558d8a859e36703e28d7c8693374226b55b4eea4c31a3411954afb"}, 0x80) pipe(&(0x7f0000000780)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000940)={0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000840)}, 0x20) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000480)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000240)=@rc, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000540)=""/237, 0xed}], 0x1, &(0x7f0000000700)=""/40, 0x28}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmmsg(r0, &(0x7f0000012540)=[{{&(0x7f0000011c80)=@hci, 0x80, &(0x7f00000123c0)=[{&(0x7f0000012280)=""/158, 0x9e}], 0x1, &(0x7f0000012440)=""/237, 0xed}}], 0x1, 0x0, &(0x7f0000012640)={0x77359400}) 15:19:06 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x800) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000480)={0x3, &(0x7f0000000440)=[0x0, 0x2000000000, 0x0]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)={0x0, 0x44, "32c789648985945a67d12a45883a80ff45e184a824a5074870518ab68ae970e3e899374b5a8a745fad4ce0e937ab5af6059ade7e7238f2f4bbe7f77913e80a7cdee13fbf"}, &(0x7f0000000280)=0x4c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x5}, &(0x7f00000002c0)=0x8) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0xfffffff5) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000780)={[], 0x0, 0x0, 0x5, 0x0, 0x10000}) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000200)={0x40000401, 0xfffffffffffffffc, 0x8, 0x7a60}, 0x10) dup2(r1, r2) [ 263.646082] sctp: [Deprecated]: syz-executor3 (pid 7875) Use of int in maxseg socket option. [ 263.646082] Use struct sctp_assoc_value instead [ 264.008131] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.015026] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:19:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000340)="cba01d3331cd4e93512f15a398432cb933c040774ff4f854ae4422a34d34392d99eeaeff968239ca44fdc85b73e9f558bb0183b33174405bcc7abe80eba2ee42e9ab61887d", 0x45, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) 15:19:07 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff}) readahead(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x200000000000003) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) 15:19:07 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000340)="cba01d3331cd4e93512f15a398432cb933c040774ff4f854ae4422a34d34392d99eeaeff968239ca44fdc85b73e9f558bb0183b33174405bcc7abe80eba2ee42e9ab61887d", 0x45, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) 15:19:07 executing program 0: gettid() add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b230000", 0x54, 0xfffffffffffffffb) 15:19:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg$alg(r1, &(0x7f0000002c00)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="797607ef7547ed01d33f8dfb774d7c2dd77e73c93a374448937c2b7f906c0820d2c29cb3e49468a0c4b95998ad2d0ea028baa2d2ecf6944e843614d4514ce8f00427f917261e3097afb74c349f0dc2c33d0d5fb644d96170943dc0829f7f1beed85236d2ba77a17c341c5d79fa2fb5b6267aa04cc2982da1f86066673d81254c07303f5e10667f6daedea9987c2a6ba2", 0x90}], 0x1, &(0x7f0000000440)}], 0x1, 0x0) recvfrom(r1, &(0x7f0000000040)=""/147, 0x93, 0x0, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x705000) [ 265.085404] Option ' ' to dns_resolver key: bad/missing value [ 265.378169] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.439341] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:19:08 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 15:19:08 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000480)={0x3, &(0x7f0000000440)=[0x7, 0x2000000000, 0x0]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)={0x0, 0x44, "32c789648985945a67d12a45883a80ff45e184a824a5074870518ab68ae970e3e899374b5a8a745fad4ce0e937ab5af6059ade7e7238f2f4bbe7f77913e80a7cdee13fbf"}, &(0x7f0000000280)=0x4c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x5}, &(0x7f00000002c0)=0x8) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x1000000) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000780)={[], 0x0, 0x7, 0x5, 0x0, 0x10000}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000580)={0x207b, 0x0, [0x0, 0x0, 0x0, 0x5]}) dup2(r1, r2) 15:19:08 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) recvmsg(r1, &(0x7f0000002a00)={&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0xffffff1f, &(0x7f0000002900)=""/213, 0xd5}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getegid() r3 = getgid() gettid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getgroups(0x3, &(0x7f0000001100)=[0xee01, 0xee00, r3]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000001140)='IDLETIMER\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000011c0)={{{@in=@remote, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001500)=0xe8) getpgid(0x0) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001e00)) getegid() stat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) lstat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000027c0)) getresuid(&(0x7f0000002800), &(0x7f0000002e80), &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f00)) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x125) 15:19:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0xda2, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x3d, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140), 0x10) [ 266.005360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.012295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:19:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) close(r2) fstat(r0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) 15:19:09 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000280)="1f0000000a06ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) [ 266.724462] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 266.731981] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 15:19:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) clone(0x8200002102001dfc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) gettid() ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000340)={0x0, 0x5, 0x0, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) [ 266.904210] Option ' ' to dns_resolver key: bad/missing value 15:19:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000780)={[], 0x0, 0x0, 0x5, 0x0, 0x10000}) dup2(r0, r1) getpgid(0x0) [ 267.456472] Option ' ' to dns_resolver key: bad/missing value 15:19:10 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x2, 'team0\x00', 0x4}, 0x18) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0505510, &(0x7f0000001000)) 15:19:10 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) recvmsg(r1, &(0x7f0000002a00)={&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0xffffff1f, &(0x7f0000002900)=""/213, 0xd5}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getegid() r3 = getgid() gettid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getgroups(0x3, &(0x7f0000001100)=[0xee01, 0xee00, r3]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000001140)='IDLETIMER\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000011c0)={{{@in=@remote, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001500)=0xe8) getpgid(0x0) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001e00)) getegid() stat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) lstat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000027c0)) getresuid(&(0x7f0000002800), &(0x7f0000002e80), &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f00)) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="0000a8f4dd5a1f083f897727e1ab1ea175ef3f05d582f18e9fd15c56c4f7d7512b08040ca87e6cf52a686db63f0ad66ab1a658947e6cd31b9a36a6a4c7609ebf193370746a0000000020000000000000b40638297ad3689e5c7b034661a82904c1f2d637d07dbcfb2039e8a2dd2d5313a8e86dd65314d8e7e2926dd4a08d3bb0db4f19642377b024f0773f0e58b4aacb20da4dd4fd608835f13f352ddec7768c44617a5a1d6ccb82082762c07566b197bf388ed47fd07c9cdd2025120d066936b8e7ab52aaeb6a50b061c2333002fc14097b5166a99f23e11e355341bf9d45f30753d1a08aa088a4b6557416c1a6d975de2fcb9f38414496203ce84910d2e0dc9a3868df9294630557b12fcf259ada316e614654814a0e4bca81aee29ebb6549d1540e08b8"], 0x125) 15:19:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c01000000000065750ede825e45a90f1c09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a915932f764b26916a0dc38b518cdf4dba35cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c720e6ff0000000000710e13"], 0x82) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0xffffff81}) 15:19:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001a00)=[@text64={0x40, &(0x7f0000001a40)="6742f4c481fdd7ec0f01f8f30f0fcebb660f3548b800000100000000000f23c00f21f83503000e000f23f80f20e035000002000f22e0b92a0900000f32c461f9291266baf80cb830e39f8def66bafc0cec", 0x51}], 0x1, 0x0, &(0x7f00000019c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:19:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000300)="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") recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000340)="cba01d3331cd4e93512f15a398432cb933c040774ff4f854ae4422a34d34392d99eeaeff968239ca44fdc85b73e9f558bb0183b33174405bcc7abe80eba2ee42e9ab61887d", 0x45, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 268.088384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.137332] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.144181] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.318101] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 268.384574] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.479715] ================================================================== [ 268.487167] BUG: KMSAN: uninit-value in __vmx_flush_tlb+0x755/0x790 [ 268.493618] CPU: 1 PID: 7993 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #63 [ 268.500830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.510200] Call Trace: [ 268.512838] dump_stack+0x306/0x460 [ 268.516499] ? __vmx_flush_tlb+0x755/0x790 [ 268.520780] kmsan_report+0x1a3/0x2d0 [ 268.524631] __msan_warning+0x7c/0xe0 [ 268.528467] __vmx_flush_tlb+0x755/0x790 [ 268.532585] vmx_flush_tlb+0x94/0xb0 [ 268.536329] ? vmx_set_rflags+0x740/0x740 [ 268.540509] kvm_mmu_load+0x1656/0x3460 [ 268.544528] ? vmx_set_cr0+0x3510/0x3510 [ 268.548646] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 268.553844] ? task_kmsan_context_state+0x6b/0x120 [ 268.558815] ? task_kmsan_context_state+0x6b/0x120 [ 268.563778] ? __msan_get_context_state+0x9/0x30 [ 268.568583] ? INIT_INT+0xc/0x30 [ 268.571978] ? task_kmsan_context_state+0x6b/0x120 [ 268.576943] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 268.582434] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.587308] ? __msan_poison_alloca+0x17a/0x210 [ 268.592018] ? put_pid+0x71/0x410 [ 268.595499] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 268.599858] ? put_pid+0x1a9/0x410 [ 268.603422] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 268.608824] ? get_task_pid+0x17b/0x270 [ 268.612843] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 268.617038] ? do_vfs_ioctl+0x18a/0x2810 [ 268.621120] ? __se_sys_ioctl+0x1da/0x270 [ 268.625301] ? kvm_vm_release+0x90/0x90 [ 268.629308] do_vfs_ioctl+0xcf3/0x2810 [ 268.633244] ? security_file_ioctl+0x92/0x200 [ 268.637778] __se_sys_ioctl+0x1da/0x270 [ 268.641812] __x64_sys_ioctl+0x4a/0x70 [ 268.645732] do_syscall_64+0xbe/0x100 [ 268.649578] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.654786] RIP: 0033:0x457579 [ 268.658013] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.676943] RSP: 002b:00007f4aaadedc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.684995] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 268.692292] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 268.699593] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 268.706886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4aaadee6d4 [ 268.714204] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 268.721517] [ 268.723173] Local variable description: ----error.i.i.i@__vmx_flush_tlb 15:19:11 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000480)={0x3, &(0x7f0000000440)=[0x7, 0x2000000000, 0x0]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)={0x0, 0x44, "32c789648985945a67d12a45883a80ff45e184a824a5074870518ab68ae970e3e899374b5a8a745fad4ce0e937ab5af6059ade7e7238f2f4bbe7f77913e80a7cdee13fbf"}, &(0x7f0000000280)=0x4c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x5}, &(0x7f00000002c0)=0x8) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x1000000) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000780)={[], 0x0, 0x7, 0x5, 0x0, 0x10000}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000580)={0x207b, 0x0, [0x0, 0x0, 0x0, 0x5]}) dup2(r1, r2) 15:19:11 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000280)='./file0\x00') mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x201000, &(0x7f00000002c0)) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f00000003c0)='./file0\x00') [ 268.729933] Variable was created at: [ 268.733678] __vmx_flush_tlb+0x103/0x790 [ 268.737767] vmx_flush_tlb+0x94/0xb0 [ 268.741498] ================================================================== [ 268.748868] Disabling lock debugging due to kernel taint [ 268.754336] Kernel panic - not syncing: panic_on_warn set ... [ 268.754336] [ 268.761734] CPU: 1 PID: 7993 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #63 [ 268.770321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:19:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) [ 268.779690] Call Trace: [ 268.782317] dump_stack+0x306/0x460 [ 268.785998] panic+0x54c/0xafa [ 268.789267] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 268.794757] kmsan_report+0x2cd/0x2d0 [ 268.798621] __msan_warning+0x7c/0xe0 [ 268.802469] __vmx_flush_tlb+0x755/0x790 [ 268.806589] vmx_flush_tlb+0x94/0xb0 [ 268.810846] ? vmx_set_rflags+0x740/0x740 [ 268.815038] kvm_mmu_load+0x1656/0x3460 [ 268.819060] ? vmx_set_cr0+0x3510/0x3510 [ 268.823170] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 268.828348] ? task_kmsan_context_state+0x6b/0x120 [ 268.833317] ? task_kmsan_context_state+0x6b/0x120 [ 268.838284] ? __msan_get_context_state+0x9/0x30 [ 268.843073] ? INIT_INT+0xc/0x30 [ 268.846467] ? task_kmsan_context_state+0x6b/0x120 [ 268.851432] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 268.856924] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.861815] ? __msan_poison_alloca+0x17a/0x210 [ 268.866522] ? put_pid+0x71/0x410 [ 268.870014] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 268.874373] ? put_pid+0x1a9/0x410 [ 268.877938] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 268.883825] ? get_task_pid+0x17b/0x270 [ 268.887847] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 268.892046] ? do_vfs_ioctl+0x18a/0x2810 [ 268.896135] ? __se_sys_ioctl+0x1da/0x270 [ 268.900314] ? kvm_vm_release+0x90/0x90 [ 268.904319] do_vfs_ioctl+0xcf3/0x2810 [ 268.908259] ? security_file_ioctl+0x92/0x200 [ 268.912811] __se_sys_ioctl+0x1da/0x270 [ 268.916842] __x64_sys_ioctl+0x4a/0x70 [ 268.920764] do_syscall_64+0xbe/0x100 [ 268.924622] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.929841] RIP: 0033:0x457579 [ 268.933064] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.952022] RSP: 002b:00007f4aaadedc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.959767] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 268.967069] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 268.974361] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 268.981650] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4aaadee6d4 [ 268.988938] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 268.997187] Kernel Offset: disabled [ 269.000828] Rebooting in 86400 seconds..