[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 93.725010] audit: type=1800 audit(1546034531.774:25): pid=10939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 93.744155] audit: type=1800 audit(1546034531.784:26): pid=10939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 93.763531] audit: type=1800 audit(1546034531.794:27): pid=10939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.32' (ECDSA) to the list of known hosts. 2018/12/28 22:02:27 fuzzer started 2018/12/28 22:02:32 dialing manager at 10.128.0.26:35715 2018/12/28 22:02:32 syscalls: 1 2018/12/28 22:02:32 code coverage: enabled 2018/12/28 22:02:32 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/28 22:02:32 setuid sandbox: enabled 2018/12/28 22:02:32 namespace sandbox: enabled 2018/12/28 22:02:32 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/28 22:02:32 fault injection: enabled 2018/12/28 22:02:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/28 22:02:32 net packet injection: enabled 2018/12/28 22:02:32 net device setup: enabled 22:05:39 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getscheduler(0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000008c0b0000000000af0000000000000000a3cec5fa1b31ef96f159c6aac327b6fb2058a93a9c3ed08e7727e8d75f2906a4e7ec1c4729566145bf2ada7a04dd49b05be2b26d8bf489b7bf0fdd320f65d5ef9e253d369bf4ab1cf526ef2f8957dd1af368cb4a596f5baf23bc57fdc56106c53020372640be979b"]) clock_gettime(0x0, &(0x7f0000000180)) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) process_vm_readv(r1, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) tkill(r1, 0x1000000000014) syzkaller login: [ 302.739442] IPVS: ftp: loaded support on port[0] = 21 [ 304.153878] chnl_net:caif_netlink_parms(): no params data found [ 304.836980] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.843652] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.852091] device bridge_slave_0 entered promiscuous mode [ 304.941008] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.947709] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.956360] device bridge_slave_1 entered promiscuous mode [ 305.224174] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 305.320192] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 305.593021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 305.602019] team0: Port device team_slave_0 added 22:05:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") socket$vsock_dgram(0x28, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x803, 0x3) socket$inet6(0xa, 0x3, 0x38) pselect6(0x40, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) [ 305.706581] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 305.715386] team0: Port device team_slave_1 added [ 305.911241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 306.112396] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 306.591752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 306.750775] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 306.987992] IPVS: ftp: loaded support on port[0] = 21 [ 308.237089] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 309.091088] chnl_net:caif_netlink_parms(): no params data found [ 309.965338] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.972002] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.980300] device bridge_slave_0 entered promiscuous mode [ 310.120853] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.127640] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.136289] device bridge_slave_1 entered promiscuous mode [ 310.435550] bond0: Enslaving bond_slave_0 as an active interface with an up link 22:05:48 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 310.569440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 311.145883] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 311.155023] team0: Port device team_slave_0 added [ 311.333066] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 311.341881] team0: Port device team_slave_1 added [ 311.543185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 311.742376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 312.330976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 312.396487] IPVS: ftp: loaded support on port[0] = 21 [ 312.551493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 314.732708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 315.126989] chnl_net:caif_netlink_parms(): no params data found [ 315.348340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.037049] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 316.314957] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.321531] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.330271] device bridge_slave_0 entered promiscuous mode [ 316.565818] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.572546] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.581025] device bridge_slave_1 entered promiscuous mode [ 316.706116] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 316.712619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.720743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.067764] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 317.242398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 317.324661] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 317.330811] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.791568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 317.800469] team0: Port device team_slave_0 added [ 317.997091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 318.004406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.013389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.022063] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.028572] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.044534] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 318.053393] team0: Port device team_slave_1 added [ 318.060638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.250851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 318.368986] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 318.684421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 318.691722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.700616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.709098] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.715641] bridge0: port 2(bridge_slave_1) entered forwarding state 22:05:56 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000000c0)=0x28) [ 319.117195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 319.326166] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 319.547555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 319.556107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.315541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 320.322735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.019165] IPVS: ftp: loaded support on port[0] = 21 [ 321.151231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 321.158931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.168444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.194536] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.881298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 321.900852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 321.908042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.917454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.779153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 322.786231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.795137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.368672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.595432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 323.602532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.611265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.314278] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 324.798778] chnl_net:caif_netlink_parms(): no params data found [ 325.127808] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 325.134762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.142844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.910242] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 325.916510] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.547891] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.554608] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.562847] device bridge_slave_0 entered promiscuous mode [ 326.745420] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.752134] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.760462] device bridge_slave_1 entered promiscuous mode [ 326.778962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 326.786239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.795125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.803607] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.810098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.902718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.373461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 327.605456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 327.616615] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 327.657870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 327.665154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.674163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.682838] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.689340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.378875] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 328.387888] team0: Port device team_slave_0 added [ 328.449774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 328.456941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 328.579253] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 328.588019] team0: Port device team_slave_1 added [ 328.767384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 328.973397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 329.347795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.357819] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 329.365000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 22:06:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022d, 0x0) [ 329.961982] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 330.224578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 330.241108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 330.249454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 330.258873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 330.286445] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 330.764319] hrtimer: interrupt took 43046 ns 22:06:08 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getscheduler(0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000008c0b0000000000af0000000000000000a3cec5fa1b31ef96f159c6aac327b6fb2058a93a9c3ed08e7727e8d75f2906a4e7ec1c4729566145bf2ada7a04dd49b05be2b26d8bf489b7bf0fdd320f65d5ef9e253d369bf4ab1cf526ef2f8957dd1af368cb4a596f5baf23bc57fdc56106c53020372640be979b"]) clock_gettime(0x0, &(0x7f0000000180)) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x1a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) process_vm_readv(r1, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) tkill(r1, 0x1000000000014) [ 331.216303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.268863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 331.276079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.285318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 22:06:09 executing program 0: open(0x0, 0x141042, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 22:06:09 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r1 = getpgid(0x0) fcntl$lock(r0, 0x26, &(0x7f00000001c0)={0x0, 0x2, 0x100000000, 0x10000, r1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93, 0xfffffffffffffff8}, {0x800}, 0x200000000000, 0x3}) getsockopt$inet6_dccp_buf(r0, 0x21, 0xcf, &(0x7f0000000080)=""/195, &(0x7f0000000180)=0xc3) 22:06:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0x34], [0xc1]}) [ 332.322673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 332.323596] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 332.329658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.352819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.429726] IPVS: ftp: loaded support on port[0] = 21 [ 332.452781] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 22:06:10 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000880)={0x3, 0x70, 0x2, 0x4, 0x40, 0x3, 0x0, 0x3, 0x4, 0x8, 0x6, 0x9, 0xffffffffffffffc0, 0x4, 0x5, 0xfffffffffffff800, 0x101, 0x6, 0x5, 0x80000001, 0x4, 0x5e4, 0x4f, 0x6, 0x8001, 0x6, 0x7, 0x81, 0x21f, 0x452, 0x8, 0x979c, 0x3, 0x16, 0x3f, 0xfffffffffffffff9, 0xffffffff, 0x5, 0x0, 0x2, 0x3, @perf_bp={&(0x7f0000000840), 0x2}, 0x80, 0x6, 0x200, 0x4, 0xfffffffffffffe00, 0x1, 0x5}, 0xffffffffffffff9c, 0x10, 0xffffffffffffffff, 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000900)={0x0, @speck128, 0x0, "1f2614d368f74315"}) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/tcp\x00\xa6I#\xa2\x8di[w975uS;v\xabS\xc1\xd0vmK\x9cp\xff\x0e\xc9\x7f\xd6\xba\x93\xfa\xf0\xaa\xae\xa4u\x93\xcf\xcdA*z\xd0\xbb_\xe1\xdd\f\v\x19\xf2%\xd6&\x8d#\x88\x7fbC\x80\x9e\x90\x97=\xc3\xbeK=K\xbf\x98\xa2\xca\xb7\xca\a\\\xe0F\xca\x8e*\x8e!ot\x9f\xd0\x9fQ\xef\x99)\xd6c\x16\xc8b\xbb\xd1\xe2\x11>\xd2\xb8f\xa1$f=_\xc8\xf6]\xbc=\xeb\xb2\x1bp@\x88O\xa2\x00\xe5g)\xfa\"g\xca\xd0\xb7\x9d\xa2 \xdc\xc4\xa9\xd9\x98Bc\xed\xc1\xd6\x03\xc6\xccc\t\xdb\x11\xd7\x0f\xa6\x94AA\xf9\xd9P\xacl$SQ\v\xaa\x11}&\xb3\xce\xff\x17_\xb3\x05\x14\x9e\xca\xb3\xe4%\xec\x03') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) ioctl$TIOCNXCL(r1, 0x540d) io_destroy(r2) 22:06:11 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000380)={0x0, 0x6, 0x4, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6266479f"}, 0x0, 0x0, @planes=&(0x7f0000000340)={0x0, 0x0, @userptr}, 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_getparam(r2, &(0x7f0000000180)) sched_getparam(r2, &(0x7f0000000280)) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000040)={0x5, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x8, 0x7fff, 0x400, 0x3140, 0x5, 0xb43, 0x10000, 0xc09f, 0x20, 0xffffffffffffffff, 0x1, 0x22}}}) [ 333.340191] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 333.368753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 333.375789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.384379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.539857] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 333.546322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.554321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:06:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r3 = socket$inet6(0xa, 0x803, 0x1) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000100)) 22:06:12 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x82001) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000080)=0x90) [ 334.536955] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 334.543148] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.446146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 335.453477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.462260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.470590] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.477146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.562464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.312973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.320163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.328939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.337230] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.343770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.457124] chnl_net:caif_netlink_parms(): no params data found [ 337.174954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 337.182107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 338.014676] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 338.044740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 338.052249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 338.082658] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.089173] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.097607] device bridge_slave_0 entered promiscuous mode [ 338.360132] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.366787] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.375237] device bridge_slave_1 entered promiscuous mode [ 338.845311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 338.852443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.861702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.883671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.099338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 339.377097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 339.621120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 339.628238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.637473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.757231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.094974] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 340.103891] team0: Port device team_slave_0 added [ 340.282265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 340.290920] team0: Port device team_slave_1 added [ 340.470721] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 340.635238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 340.642324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.651108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.716962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 341.318504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 341.325621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.334327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.498250] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 341.651274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 22:06:19 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x82001) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000080)=0x90) [ 342.284215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.870524] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 343.359406] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 343.410577] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 343.417071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.425157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.869688] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 343.876032] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.158832] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 344.430274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 344.437666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.446633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.455085] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.461689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.507374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.981779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 344.989040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.998067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.006658] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.013286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.197940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.591531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 345.598712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:06:24 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 346.111942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 346.119020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 346.490769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 346.498527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 346.508032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 346.521555] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 346.845833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 346.853049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 346.862334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 347.196432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 347.203478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.212113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.533319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 347.540233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.548866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.085947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.453870] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 348.811783] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 348.818463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.826675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.158629] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 349.164863] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.219195] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 349.505040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 349.512380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.521118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.529566] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.536136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.551517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.894896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 349.902410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.911170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.919658] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.926196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.032982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 350.261484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 350.268721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:06:28 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f0000000400)='./file0\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f70696473202b70696473204cf88d18d56d6f727920b2fbacccdff301bf9039aa01901b075b1eebdaf7c5e225dc3364e3a05ceec0cdd0d071a02b539ede89179ff84282972230cba5bcfb384036443dd66a1d3f2dd88988515078dc9e197990e7408adfbe66"], 0x66) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001700010100000000000000005142f0"], 0x1}}, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000080)={0x8000000, 0x6, 0x1b}) shmat(0x0, &(0x7f0000fef000/0x11000)=nil, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) symlinkat(&(0x7f0000008ff8)='./file0\x00', 0xffffffffffffffff, 0x0) sendfile(r4, r0, 0x0, 0x10001) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) [ 350.681405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 350.688653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 350.983826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 350.990815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 351.000188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.009166] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.197323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 351.204360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.213380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.399832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 351.406861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.415373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.599210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 351.606274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.614825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.681218] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 353.109350] 8021q: adding VLAN 0 to HW filter on device batadv0 22:06:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000000)=""/174) 22:06:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000180)={0x40000000, 0x0, "8159fc01012cec1e802dbd4e45eb1d3e55ad6f08408dbdaf62de305e4853fcf8", 0x7f, 0x0, 0x7, 0xfffffffffffffffe, 0x2, 0x0, 0xffffffff, 0x3, [0x8, 0x0, 0x3, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000540)={&(0x7f0000000380), 0xc, 0x0}, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/102) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) 22:06:31 executing program 0: gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, 0x0) 22:06:31 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r1, 0x3, 0x3) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x1, 0x1, 0x6, 0xc1, 0xef05, 0x1}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x7) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) r2 = msgget$private(0x0, 0x40) msgctl$IPC_RMID(r2, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x401, r1}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000001c0)={0x6, 0xd, 0x2c800000000, 0x200, "d68ccebc5f7309506796bdaa727665eca9f300996d06efcfeaf4fc02d998ed43"}) r3 = request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='loposix_acl_access\x00', 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000002c0)='/dev/audio\x00') ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xf, 0x1f, 0x8, "c558e56a630984e47d60301fcaad9c3fd71fb7283e3e497a6f3c32f19f120f3863c67c01082bd89a6db329808ecd4a4ecfb7d743639580ece11ae6f71604fd27", "2aa3f7a91e95c862072bbddb97c0ada801760438966a8ba1aaac331aa71ed726438db909a74454fe274fc2cdabe50b37750d03051d4a4450dec79c0f18efcb54", "7eba85b78946f591b0294d1d190dc9d913424c4275f80b512658c78244b1d8db", [0x20, 0xfffffffffffffffa]}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000400)=""/187) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000004c0)={0x1f, 0x2, 0x7fff, 0x5, "5d7d2d7fa93ca6a7cd8070d152f4433558e15e495907d6170ca71f0041613e15"}) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000500)) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000540)=0x80000001, 0x4) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000580)={0x0, 0x11, 0x8afb, 0xffffffff, "f04c727db9556a3b83ce21933fc36b95a2b0d45e47cca941713d08c069c1f8d9"}) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000005c0)=0x10001) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000600)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x54, r4, 0x13, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5b79bac6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5c22}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000900)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000d00)) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000d40)={0x1f, "c63e00b3930f5b4934cfa3d3b303cbccdbcf76f26797bbbca3cf68b0d41ff54e", 0xe36, 0x1, 0x224, 0x4, 0x5}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/snapshot\x00', 0x0, 0x0) shutdown(r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000e40)={&(0x7f0000000e00)='./file0\x00', r5}, 0x10) 22:06:31 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, 0x0, 0xf) clone(0x141, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000041c0)={{{@in=@remote, @in=@loopback}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast1}}, &(0x7f00000042c0)=0xe8) getpid() shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) fstat(r0, &(0x7f0000000000)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) getgroups(0x5, &(0x7f0000000140)=[0x0, 0xee01, 0xee01, 0x0, 0xffffffffffffffff]) 22:06:31 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) open(&(0x7f0000000280)='./file0\x00', 0x802, 0x0) 22:06:31 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180)="4c5b68419247081d58f0c12b7922c25b7df709c6696de0cf3332331432d8ce391eaf6b422b74c11d872413e427d5763b33e90ff760c9653b911889ef366c231e07045cb5359461edf0f2179ad3df2558a371a73396029164dcb9d70a359b474c50dce764820a", 0x66, 0x4008000, 0x0, 0x0) close(r0) 22:06:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 22:06:31 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000180)={0x40000000, 0x0, "8159fc01012cec1e802dbd4e45eb1d3e55ad6f08408dbdaf62de305e4853fcf8", 0x0, 0x0, 0x7, 0xfffffffffffffffe, 0x2, 0x3, 0xffffffff, 0x3, [0x8, 0x45b, 0x3, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, &(0x7f0000000040)) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xc1800004}, 0xc, 0x0}, 0x4004001) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/102) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) [ 353.820190] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:06:31 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:32 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x3, 0x8012, r0, 0x0) 22:06:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x18) 22:06:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000013c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) [ 354.885157] IPVS: ftp: loaded support on port[0] = 21 [ 355.681419] chnl_net:caif_netlink_parms(): no params data found [ 356.025196] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.032143] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.039654] device bridge_slave_0 entered promiscuous mode [ 356.091405] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.098084] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.106040] device bridge_slave_1 entered promiscuous mode [ 356.258504] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 356.311552] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 356.466433] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 356.475250] team0: Port device team_slave_0 added [ 356.524827] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 356.533670] team0: Port device team_slave_1 added [ 356.585855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 356.636194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 356.833097] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 356.885048] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 357.417387] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 359.448505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.671123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 359.853328] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 359.859598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.867544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.054478] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 360.060583] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.252183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 360.259541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.268456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.276812] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.283346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.293070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.466533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 360.473869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.482701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.491056] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.497587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.676278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 360.683456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.873202] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 360.880114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.070299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 361.077277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.086399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.095696] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.277028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 361.284068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.293073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.484752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 361.491716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.500310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.678101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 361.685644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.694321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.585260] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 363.024851] 8021q: adding VLAN 0 to HW filter on device batadv0 22:06:41 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000008000/0x1000)=nil) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 22:06:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)={0x2, 0x0, [{0x1, 0x0, 0x100}, {0x80000000}]}) 22:06:41 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:41 executing program 3: syz_open_procfs(0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000004c0)='/\xfe', 0x0, 0x0], 0x0) 22:06:41 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x3, 0x8012, r0, 0x0) 22:06:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) socket$kcm(0xa, 0x0, 0x11) 22:06:41 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 363.450345] mmap: syz-executor5 (13434) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 22:06:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x3, 0x8012, r0, 0x0) 22:06:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 22:06:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getpeername(r0, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f00000002c0)=0x80) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f00000005c0)={0x2, 0x1, [0x0, 0x0, 0x9, 0x0, 0x3, 0x6]}) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040), 0x10000000000443) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$TCSETAW(r4, 0x5407, 0x0) syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0xffffffffffffffff, 0x2) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 22:06:41 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x3, 0x8012, r0, 0x0) 22:06:41 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 22:06:41 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 22:06:42 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x0, 0x8012, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 22:06:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f0000000080), 0x0}, 0x18) 22:06:42 executing program 2: bind(0xffffffffffffffff, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(0xffffffffffffffff, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 364.144371] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:06:42 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000140)='sit0\x00') 22:06:42 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x3, 0x8012, r0, 0x0) 22:06:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:06:42 executing program 2: bind(0xffffffffffffffff, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(0xffffffffffffffff, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:43 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], 0x1) 22:06:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'ip6tnl0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @broadcast}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f56ddd3d5261ad223871146af045fe0012ff00", 0x27) 22:06:43 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x81000000) 22:06:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f00000000c0)) 22:06:43 executing program 2: bind(0xffffffffffffffff, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(0xffffffffffffffff, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 365.064979] device ip6tnl0 entered promiscuous mode [ 365.132873] device ip6tnl0 left promiscuous mode 22:06:43 executing program 2: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x13, 0x0, 0x0) 22:06:43 executing program 4: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$user(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x5, 0x7c, r1}) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)={0x100000001}) ptrace$cont(0x1f, r1, 0x0, 0x0) 22:06:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x541b, &(0x7f0000000100)) 22:06:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000bc0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="20e3d000009ea2c4552c62", 0xb) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x2d1) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000280)=""/112, 0x70}], 0x2}}], 0x1, 0x0, 0x0) 22:06:43 executing program 5: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x29) ptrace$cont(0x18, r0, 0x0, 0x0) pipe(0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x400008, 0x0, 0x14a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 22:06:43 executing program 3: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0x40189206, 0x0) r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f00000004c0)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000000)) [ 365.496477] ptrace attach of "/root/syz-executor5"[13550] was attempted by "/root/syz-executor5"[13551] 22:06:43 executing program 2: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:43 executing program 5: unshare(0x20000) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f0000000400)='./file0\x00', 0x2000, 0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f70696473202b70696473204cf88d18d56d6f727920b2fbacccdff301bf9039aa01901b075b1eebdaf7c5e225dc3364e3a05ceec0cdd0d071a02b539ede89179ff84282972230cba5bcfb384036443dd66a1d3f2dd88988515078dc9e197990e7408adfbe66"], 0x66) sendmsg$nl_generic(r4, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001700010100000000000000005142f00b"], 0x1}}, 0x0) r5 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffd000/0x3000)=nil) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000080)={0x8000000, 0x6, 0x1b}) shmat(r5, &(0x7f0000fef000/0x11000)=nil, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) symlinkat(&(0x7f0000008ff8)='./file0\x00', 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000002780)=[0x0]) sendfile(r6, r0, 0x0, 0x10001) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) 22:06:43 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$binder(&(0x7f0000008000/0x4000)=nil, 0x4000, 0xfa412b25b955776e, 0x11, r0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000008000/0x1000)=nil) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 22:06:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'v\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'eql\x00', 0x400}) ioctl$TUNGETFILTER(r0, 0x800454d2, &(0x7f0000000340)=""/4096) 22:06:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='./file0\x00', 0x8, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000000c0)) connect$pptp(0xffffffffffffffff, &(0x7f00000008c0)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x10, 0x10001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000080), 0x0}, 0x18) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() syz_open_procfs(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) pkey_alloc(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:06:44 executing program 1: syz_open_procfs(0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000500)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x0) 22:06:44 executing program 2: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:44 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$P9_RLOCK(r0, &(0x7f0000000140)={0x8}, 0x8) 22:06:44 executing program 4: r0 = socket$inet(0x10, 0x200000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000002d0007031dfffd946fa28300cee60a0004000000000000000002800000000000", 0x24}], 0x1}, 0x0) 22:06:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f00000003c0), 0x0, 0x1}, 0x20) 22:06:44 executing program 2: r0 = socket(0x1e, 0x0, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000005e0007031dfffd946fa2830020200a00ff0003660e1d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 22:06:44 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) 22:06:44 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000140)='sit0\x00') 22:06:44 executing program 2: r0 = socket(0x1e, 0x0, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:44 executing program 2: r0 = socket(0x1e, 0x0, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:44 executing program 3: 22:06:44 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd3}) 22:06:44 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f4, &(0x7f0000000140)='sit0\x00') 22:06:44 executing program 4: 22:06:45 executing program 0: 22:06:45 executing program 4: 22:06:45 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, 0x0, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:45 executing program 5: 22:06:45 executing program 3: 22:06:45 executing program 1: 22:06:45 executing program 0: 22:06:45 executing program 4: 22:06:45 executing program 5: 22:06:45 executing program 3: 22:06:45 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x0, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:45 executing program 1: 22:06:45 executing program 0: 22:06:45 executing program 4: 22:06:45 executing program 3: 22:06:45 executing program 0: 22:06:46 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:46 executing program 4: 22:06:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) 22:06:46 executing program 5: 22:06:46 executing program 3: 22:06:46 executing program 0: 22:06:46 executing program 4: 22:06:46 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:46 executing program 0: 22:06:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0xc6}, 0x2c) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) 22:06:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff4cf) prctl$PR_GET_TIMERSLACK(0x1e) syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c3654c69000b3e0f1158101019c4837d1d00c204cd04cd0f2902") 22:06:46 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:46 executing program 4: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x8200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) setxattr$trusted_overlay_origin(0x0, 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)='./file\xff\xff', &(0x7f0000000080)=ANY=[], &(0x7f0000001ffc), 0x1400) 22:06:46 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x13, r0, 0x80000000) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 22:06:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 22:06:47 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, 0x0, 0x0) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:47 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000340)=@known='trusted.overlay.nlink\x00') ioctl$TIOCGSID(r0, 0x5429, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e23, 0x3ff, @mcast1, 0x2}}, 0x0, 0x6, 0x0, "3402358da587c34e33e8d6534cd7829ecfcbff4e78f37e61fc1dc0813d69a62a491aeeb0e186e91632cb3f7dc7935edcd33320790e5f82a516a7c4c6bc9b9c4440ec3d4914f47aa88e74475bf0faea67"}, 0xd8) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240)={0x7, 0x81ca894, 0x2, 0x2, 0x9}, 0x14) 22:06:47 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:06:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'vlan0\x00', 0xd803}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) dup3(r1, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:06:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x40046104, &(0x7f0000000080)) 22:06:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='fdinfo\x00\xc8\xa4\xc8\xbbvZ\xf3%\x02\x1b\xd6\xf5\xac6\x0f\x13.}\x15\xc8\xb9\x06K^Ob\x90\x1e\x90\xa8y\x10->?\xb1\xe4\xcc\xac5p\xfe\v\x00\x00\x00\x00\x00\x00\xa6\xd9\x92#H\xcd19T\xfb\xb2\xf2x}\x01\x97\xf1d\xe6\x96\xf1[\x80\x0f\x9e\xcb\xeb`d\xad\xc8~<\x8a\xef4\x12*\xfdx\x96\x14\xb9%bDA\xaawn\xedmM\x99w\xc5s9\x81\xfeU&\x00\x00\x00\x00\x00\x00\x00\xe6\x81\x01\t\b0\xfa\xfd\x87\xd51f\xbc\xfb\xcaJzV\xa0\xa1\xd0\xff\xb3h\xca\x9d\xba\xdaXp\x06\xa3\xd3\xb2meGf\x0fO\xffr\xf1}.\xbe\xf0\xd7\xe72\xe5') getdents(r0, &(0x7f0000000000)=""/123, 0x7b) 22:06:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @local}], 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x6d, &(0x7f0000ad2000), &(0x7f0000000080)=0xfdd2) 22:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.983559] RSP: 002b:00007f1fa1a96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 369.991284] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004579b9 [ 369.998566] RDX: 000000000000006d RSI: 0000000000000084 RDI: 0000000000000004 [ 370.005848] RBP: 000000000073bf00 R08: 0000000020000080 R09: 0000000000000000 [ 370.013128] R10: 0000000020ad2000 R11: 0000000000000246 R12: 00007f1fa1a976d4 [ 370.020870] R13: 00000000004c8d70 R14: 00000000004cf808 R15: 00000000ffffffff [ 370.028208] [ 370.029841] Uninit was stored to memory at: [ 370.034195] kmsan_internal_chain_origin+0x134/0x230 [ 370.039321] kmsan_memcpy_memmove_metadata+0x58f/0xfa0 [ 370.044633] kmsan_memcpy_metadata+0xb/0x10 [ 370.048977] __msan_memcpy+0x5b/0x70 [ 370.052721] sctp_getsockopt+0x16d02/0x17550 [ 370.057163] sock_common_getsockopt+0x13f/0x180 [ 370.061852] __sys_getsockopt+0x489/0x550 [ 370.066020] __se_sys_getsockopt+0xe1/0x100 [ 370.070363] __x64_sys_getsockopt+0x62/0x80 [ 370.074704] do_syscall_64+0xbc/0xf0 [ 370.078448] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.083642] [ 370.085277] Uninit was stored to memory at: [ 370.089618] kmsan_internal_chain_origin+0x134/0x230 [ 370.094744] kmsan_memcpy_memmove_metadata+0x58f/0xfa0 [ 370.100045] kmsan_memcpy_metadata+0xb/0x10 22:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x01\x00\x00\x00\x10[\x00\xfa\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00\x00\x10\xa9[\x00\x00\x00\x00\x00\x00\x10\x00', @ifru_mtu=0x1}) 22:06:48 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 370.104374] __msan_memcpy+0x5b/0x70 [ 370.108117] sctp_getsockopt+0x16bae/0x17550 [ 370.112538] sock_common_getsockopt+0x13f/0x180 [ 370.117243] __sys_getsockopt+0x489/0x550 [ 370.121402] __se_sys_getsockopt+0xe1/0x100 [ 370.125737] __x64_sys_getsockopt+0x62/0x80 [ 370.130075] do_syscall_64+0xbc/0xf0 [ 370.133807] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.139016] [ 370.140652] Uninit was created at: [ 370.144215] kmsan_internal_poison_shadow+0x92/0x150 [ 370.149331] kmsan_kmalloc+0xa6/0x130 [ 370.153149] kmem_cache_alloc_trace+0x55a/0xb90 [ 370.157834] sctp_inet6addr_event+0x5c9/0xc10 [ 370.162374] atomic_notifier_call_chain+0x13d/0x240 [ 370.167443] inet6addr_notifier_call_chain+0x76/0x90 [ 370.172560] ipv6_add_addr+0x2361/0x2620 [ 370.176635] inet6_addr_add+0xc75/0x1bd0 [ 370.180710] inet6_rtm_newaddr+0x15be/0x3ab0 [ 370.185138] rtnetlink_rcv_msg+0x115b/0x1550 [ 370.189564] netlink_rcv_skb+0x444/0x640 [ 370.193635] rtnetlink_rcv+0x50/0x60 [ 370.197366] netlink_unicast+0xf40/0x1020 22:06:48 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) [ 370.201555] netlink_sendmsg+0x127f/0x1300 [ 370.205801] ___sys_sendmsg+0xdb9/0x11b0 [ 370.209878] __se_sys_sendmsg+0x305/0x460 [ 370.214037] __x64_sys_sendmsg+0x4a/0x70 [ 370.218121] do_syscall_64+0xbc/0xf0 [ 370.221850] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.227038] [ 370.228677] Bytes 4-7 of 2336 are uninitialized [ 370.233371] Memory access of size 2336 starts at ffff888207460000 [ 370.239604] Data copied to user address 0000000020ad2008 [ 370.245054] ================================================================== 22:06:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) fcntl$setstatus(r0, 0x4, 0x2800) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 370.252423] Disabling lock debugging due to kernel taint [ 370.257909] Kernel panic - not syncing: panic_on_warn set ... [ 370.263879] CPU: 0 PID: 13770 Comm: syz-executor3 Tainted: G B 4.20.0-rc7+ #15 [ 370.272573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.281965] Call Trace: [ 370.284602] dump_stack+0x173/0x1d0 [ 370.288267] panic+0x3ce/0x961 [ 370.291537] kmsan_report+0x293/0x2a0 [ 370.295376] kmsan_internal_check_memory+0x455/0xb00 [ 370.300536] kmsan_copy_to_user+0xab/0xc0 22:06:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\xd4\x00\x04*\x04\x00\x00\x00\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00T\x0er\xcdW\xf4BwR\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x88\xf1\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;') ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00f0ffffff0f0000000001"]) [ 370.304714] _copy_to_user+0x178/0x220 [ 370.308675] sctp_getsockopt+0x164fe/0x17550 [ 370.313199] ? aa_sk_perm+0x605/0x950 [ 370.317057] ? aa_sock_opt_perm+0x121/0x270 [ 370.321411] ? sctp_setsockopt+0x124c0/0x124c0 [ 370.326021] sock_common_getsockopt+0x13f/0x180 [ 370.330730] ? sock_recv_errqueue+0x8f0/0x8f0 [ 370.335255] __sys_getsockopt+0x489/0x550 [ 370.339445] __se_sys_getsockopt+0xe1/0x100 [ 370.343805] __x64_sys_getsockopt+0x62/0x80 [ 370.348148] do_syscall_64+0xbc/0xf0 [ 370.351890] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.357114] RIP: 0033:0x4579b9 [ 370.360322] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.379244] RSP: 002b:00007f1fa1a96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 370.386984] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004579b9 [ 370.394267] RDX: 000000000000006d RSI: 0000000000000084 RDI: 0000000000000004 [ 370.401548] RBP: 000000000073bf00 R08: 0000000020000080 R09: 0000000000000000 [ 370.408858] R10: 0000000020ad2000 R11: 0000000000000246 R12: 00007f1fa1a976d4 [ 370.416144] R13: 00000000004c8d70 R14: 00000000004cf808 R15: 00000000ffffffff [ 370.424443] Kernel Offset: disabled [ 370.428075] Rebooting in 86400 seconds..