[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.557922] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.391690] random: sshd: uninitialized urandom read (32 bytes read) [ 29.670241] random: sshd: uninitialized urandom read (32 bytes read) [ 30.403107] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. [ 36.102561] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/14 15:29:45 fuzzer started [ 37.353095] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/14 15:29:47 dialing manager at 10.128.0.26:44251 2018/09/14 15:29:48 syscalls: 1 2018/09/14 15:29:48 code coverage: enabled 2018/09/14 15:29:48 comparison tracing: enabled 2018/09/14 15:29:48 setuid sandbox: enabled 2018/09/14 15:29:48 namespace sandbox: enabled 2018/09/14 15:29:48 fault injection: enabled 2018/09/14 15:29:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/14 15:29:48 net packed injection: enabled 2018/09/14 15:29:48 net device setup: enabled [ 40.738183] random: crng init done 15:34:29 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000b40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x15, 0x0, 0x0, "17a9a04f67112923e9a4f73ad72febe4"}, 0x15, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b80)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000bc0)={0x7}, 0x7) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getegid() 15:34:29 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) pipe(&(0x7f0000001840)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000600)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000500)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240), &(0x7f0000000300), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f00000003c0), 0x0, 0x22f, 0x0) listxattr(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)=""/157, 0x9d) add_key$user(&(0x7f0000000400)='user\x00', 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0xfffffffffffffffb) pipe2(&(0x7f0000000380), 0x0) splice(0xffffffffffffffff, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) pipe2(&(0x7f0000000100), 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 15:34:29 executing program 5: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='wchan\x00') ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c560044315466141a1a01bf64ac1e5d31a3b786e2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000140)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) 15:34:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x15, 0x0, 0x0, "17a9a04f67112923e9a4f73ad72febe4"}, 0x15, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) 15:34:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000140012000c000100626f6e6400003b00040002000c0001000180c20000000000"], 0x1}}, 0x0) 15:34:29 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) [ 320.993641] IPVS: ftp: loaded support on port[0] = 21 [ 321.104914] IPVS: ftp: loaded support on port[0] = 21 [ 321.179604] IPVS: ftp: loaded support on port[0] = 21 [ 321.193887] IPVS: ftp: loaded support on port[0] = 21 [ 321.193993] IPVS: ftp: loaded support on port[0] = 21 [ 321.213111] IPVS: ftp: loaded support on port[0] = 21 [ 323.358737] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.367359] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.387126] device bridge_slave_0 entered promiscuous mode [ 323.550916] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.557586] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.567719] device bridge_slave_1 entered promiscuous mode [ 323.613975] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.635360] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.642875] device bridge_slave_0 entered promiscuous mode [ 323.664603] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.676547] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.683899] device bridge_slave_0 entered promiscuous mode [ 323.721373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 323.732166] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.740646] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.748259] device bridge_slave_0 entered promiscuous mode [ 323.769525] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.778407] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.786313] device bridge_slave_0 entered promiscuous mode [ 323.798905] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.815512] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.822953] device bridge_slave_1 entered promiscuous mode [ 323.835656] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.842026] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.851719] device bridge_slave_1 entered promiscuous mode [ 323.862181] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.875497] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.884894] device bridge_slave_0 entered promiscuous mode [ 323.893899] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.907512] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.914903] device bridge_slave_1 entered promiscuous mode [ 323.925021] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.932406] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.940358] device bridge_slave_1 entered promiscuous mode [ 323.949463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 323.968436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 323.995679] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.002041] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.024678] device bridge_slave_1 entered promiscuous mode [ 324.033866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.057490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.068327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.099735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.130422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.145583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 324.187983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.224217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.286622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 324.409696] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.496622] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.517148] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.589435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.612582] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.666980] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.695786] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.721770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.739341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.777545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 324.784405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.810729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 324.832827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.848849] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.869783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 324.889692] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.912055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.930180] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.947775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 324.964499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.978516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 324.999029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 325.015767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.027474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.059704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 325.074501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.106623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 325.116639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.149354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 325.167853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.194388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 325.201435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.305500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 325.312377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.330067] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.341969] team0: Port device team_slave_0 added [ 325.350453] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.361793] team0: Port device team_slave_0 added [ 325.442991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.463068] team0: Port device team_slave_1 added [ 325.505744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.516196] team0: Port device team_slave_1 added [ 325.548741] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.566295] team0: Port device team_slave_0 added [ 325.574430] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.585862] team0: Port device team_slave_0 added [ 325.620443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.665768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.677250] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.696363] team0: Port device team_slave_0 added [ 325.702448] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.712568] team0: Port device team_slave_1 added [ 325.738302] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.747986] team0: Port device team_slave_1 added [ 325.760241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 325.773762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.806054] team0: Port device team_slave_0 added [ 325.813782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 325.835026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.844579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.862657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.871277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.883382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.893613] team0: Port device team_slave_1 added [ 325.901940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 325.910150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 325.929096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 325.951059] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 325.967233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.984297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.012401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.027309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.034804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.042981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.050873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.058633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.071142] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 326.078372] team0: Port device team_slave_1 added [ 326.085982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 326.095543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 326.104837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.123148] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 326.137020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.156563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.175951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.203684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.215823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.225032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.232999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.240703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.248703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.258747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 326.284538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 326.292546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.316053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.323983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.356032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.363967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.372004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.380397] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 326.387820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 326.405772] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.426997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 326.437009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.450587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.485850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.501103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.531739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.540137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.548139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.556070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.567044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 326.575113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.583230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.593964] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.611110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.640978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.658486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.694007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.708434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.721547] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 326.745994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.753975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.874201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 326.891912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.902422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.749816] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.756407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.763428] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.769876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.798474] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 327.830596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.956155] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.962574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.969340] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.975802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.014857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.030331] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.036827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.043504] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.049968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.061206] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.085157] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.091609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.098358] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.104733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.114085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.190681] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.197116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.203789] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.210246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.237263] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.410512] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.416964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.423634] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.430061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.471955] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.900132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.909368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.930214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.945484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.960196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.246316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.325592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.417912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.537645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.667272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.706973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.723703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 333.862702] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 333.882816] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 334.017820] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 334.152563] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 334.216631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.222838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.236672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.273590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 334.440032] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.454798] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.475415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.486716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.506047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.519442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.541560] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.574969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.598277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.680397] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.686846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.693981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.765853] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.934031] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 334.945437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 334.952547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.976790] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.989797] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.045974] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.211834] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.452820] 8021q: adding VLAN 0 to HW filter on device team0 15:34:47 executing program 4: clone(0x0, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0)) request_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0), &(0x7f0000000300)='md5sumwlan0\x00', 0xfffffffffffffffc) 15:34:47 executing program 4: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f00000003c0), &(0x7f0000000440)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xffffffac) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200000841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000a00)=""/159) restart_syscall() ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 15:34:47 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@loopback, @remote}, &(0x7f0000000140)=0x8) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 15:34:47 executing program 1: clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000000c0)) write$9p(r2, &(0x7f0000000040), 0x0) 15:34:48 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xfffffe4c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000140)) 15:34:48 executing program 2: umount2(&(0x7f0000001180)='./file0/file0\x00', 0xfffffffffffffffa) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() munmap(&(0x7f00009c6000/0x2000)=nil, 0x2000) eventfd2(0x0, 0x0) epoll_create(0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/4096) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00'}, 0x4f) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') fchmod(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") accept(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x35f) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280), 0xfffffffffffffffd) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) lstat(&(0x7f00000012c0)='./file0/file0\x00', &(0x7f0000001200)) getgid() getresuid(&(0x7f0000000680), &(0x7f0000001d00), &(0x7f0000001d40)) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) 15:34:48 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:48 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@loopback, @remote}, &(0x7f0000000140)=0x8) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 339.335319] audit: type=1326 audit(1536939288.362:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6949 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 15:34:48 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000000c0)) 15:34:48 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:48 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xfffffe4c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) 15:34:48 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:48 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:49 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) 15:34:49 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xfffffe4c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) ioctl$VT_WAITACTIVE(r0, 0x5607) 15:34:51 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x3}, [{}]}, 0x78) sendfile(r0, r0, &(0x7f0000000080), 0xfba) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x3c1, 0x2, 0x0, [0x20000340], 0x0, &(0x7f0000000000), &(0x7f0000000640)=ANY=[]}, 0x78) 15:34:51 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xfffffe4c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)) 15:34:51 executing program 5: clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000640)) read(0xffffffffffffffff, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000440)=""/159) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) write$9p(r1, &(0x7f0000000040), 0x0) 15:34:51 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000004c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/159) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$eventfd(r2, &(0x7f0000000000), 0x8) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) 15:34:51 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:51 executing program 0: 15:34:51 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:51 executing program 0: r0 = memfd_create(&(0x7f0000000180)='systename\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46902c000000000000000000bc9837fb027272f7220003023e00000000000000001202000000000000000500000000380003004000000000000000000000000000000000000000000000000000000000c7ef000000000000000000000000000000000004000010f4ffffff000000000000000000000000000000000000000ab43c30c8785e1724fd12830214bcab6176857f103fe0841b9cad05fa57f8ffc4d904dce663d552b907ca0e5e7493b33954f7"], 0xb4) execveat(r0, &(0x7f0000000080)='\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x1000) 15:34:51 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xfffffe4c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000040)='bpq0\x00'}) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000500)=""/4096) 15:34:51 executing program 1: clone(0x200, &(0x7f0000000400), &(0x7f0000000280), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f00000002c0)=0xc) open$dir(&(0x7f00000000c0)='./file0\x00', 0xc0041, 0x0) 15:34:51 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:51 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:51 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:51 executing program 2: 15:34:51 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:51 executing program 3: 15:34:52 executing program 3: 15:34:52 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 2: 15:34:52 executing program 3: 15:34:52 executing program 0: 15:34:52 executing program 1: 15:34:52 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:52 executing program 2: 15:34:52 executing program 3: 15:34:52 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 2: 15:34:52 executing program 1: 15:34:52 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:52 executing program 3: 15:34:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 0: 15:34:52 executing program 2: 15:34:52 executing program 1: 15:34:52 executing program 2: 15:34:52 executing program 0: 15:34:52 executing program 3: 15:34:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 1: 15:34:52 executing program 0: 15:34:52 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:52 executing program 2: 15:34:52 executing program 3: 15:34:52 executing program 1: 15:34:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:52 executing program 0: 15:34:52 executing program 2: 15:34:52 executing program 3: 15:34:52 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:52 executing program 1: 15:34:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:53 executing program 2: 15:34:53 executing program 0: 15:34:53 executing program 3: 15:34:53 executing program 1: 15:34:53 executing program 2: 15:34:53 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:53 executing program 2: 15:34:53 executing program 0: 15:34:53 executing program 3: 15:34:53 executing program 1: 15:34:53 executing program 2: 15:34:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:53 executing program 0: 15:34:53 executing program 3: 15:34:53 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:53 executing program 1: 15:34:53 executing program 2: 15:34:53 executing program 3: 15:34:53 executing program 0: 15:34:53 executing program 5: socket$inet6(0xa, 0x202000000802, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:53 executing program 2: 15:34:53 executing program 1: 15:34:53 executing program 0: 15:34:53 executing program 3: 15:34:53 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:53 executing program 3: 15:34:53 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) 15:34:53 executing program 5: socket$inet6(0xa, 0x202000000802, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:53 executing program 2: 15:34:53 executing program 0: 15:34:53 executing program 3: 15:34:53 executing program 0: 15:34:54 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:54 executing program 2: 15:34:54 executing program 5: socket$inet6(0xa, 0x202000000802, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(0xffffffffffffffff, r0, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:54 executing program 3: 15:34:54 executing program 0: 15:34:54 executing program 2: 15:34:54 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:54 executing program 1: 15:34:54 executing program 3: 15:34:54 executing program 0: 15:34:54 executing program 2: 15:34:54 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:54 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:54 executing program 2: 15:34:54 executing program 0: 15:34:54 executing program 1: 15:34:54 executing program 3: 15:34:54 executing program 0: 15:34:54 executing program 2: 15:34:55 executing program 3: 15:34:55 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:55 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x20000000006800, 0x400000000008000) 15:34:55 executing program 1: 15:34:55 executing program 0: 15:34:55 executing program 2: 15:34:55 executing program 1: 15:34:55 executing program 0: 15:34:55 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340), 0x400000000008000) 15:34:55 executing program 3: 15:34:55 executing program 0: 15:34:55 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:55 executing program 2: 15:34:55 executing program 3: 15:34:55 executing program 0: 15:34:55 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340), 0x400000000008000) 15:34:55 executing program 1: 15:34:55 executing program 2: 15:34:55 executing program 3: 15:34:55 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340), 0x400000000008000) 15:34:55 executing program 1: 15:34:55 executing program 0: 15:34:55 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:55 executing program 2: 15:34:55 executing program 0: 15:34:55 executing program 1: 15:34:55 executing program 3: 15:34:55 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f69705f767300b8474ea8762f0981329ff96f48727b96596dea065dc76228ec70f26c3b9e2a4a32a257c3c7e4b7757aba4efa696b40260972169deb3d42300f58bbb9a0035ac818bc7c8ccc38733c04a1d29ed9e56df245a00a38495304d56d28d2c0983f9c2430dd66ae806ba8aa0a51620d4bed104fc3") sendfile(r0, r1, &(0x7f0000000340)=0x20000000006800, 0x0) 15:34:55 executing program 2: 15:34:55 executing program 0: 15:34:55 executing program 1: 15:34:55 executing program 3: 15:34:55 executing program 2: 15:34:55 executing program 5: 15:34:56 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:56 executing program 3: 15:34:56 executing program 1: 15:34:56 executing program 0: 15:34:56 executing program 2: 15:34:56 executing program 5: 15:34:56 executing program 1: 15:34:56 executing program 2: 15:34:56 executing program 5: 15:34:56 executing program 3: 15:34:56 executing program 0: 15:34:56 executing program 1: 15:34:56 executing program 2: 15:34:56 executing program 5: 15:34:56 executing program 3: 15:34:56 executing program 0: 15:34:56 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:56 executing program 1: 15:34:57 executing program 0: 15:34:57 executing program 3: 15:34:57 executing program 1: 15:34:57 executing program 2: 15:34:57 executing program 5: 15:34:57 executing program 0: 15:34:57 executing program 5: 15:34:57 executing program 1: 15:34:57 executing program 2: 15:34:57 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:57 executing program 3: 15:34:57 executing program 0: 15:34:57 executing program 2: 15:34:57 executing program 1: 15:34:57 executing program 5: 15:34:57 executing program 2: 15:34:57 executing program 3: 15:34:57 executing program 1: 15:34:57 executing program 0: 15:34:57 executing program 5: 15:34:57 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:57 executing program 3: 15:34:57 executing program 1: 15:34:57 executing program 5: 15:34:57 executing program 2: 15:34:57 executing program 0: 15:34:57 executing program 3: 15:34:57 executing program 1: 15:34:57 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:57 executing program 5: 15:34:57 executing program 2: 15:34:57 executing program 0: 15:34:57 executing program 1: 15:34:57 executing program 3: 15:34:57 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffda7, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 15:34:57 executing program 5: 15:34:57 executing program 2: 15:34:58 executing program 3: 15:34:58 executing program 0: 15:34:58 executing program 1: [ 348.991428] audit: type=1326 audit(1536939298.022:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7535 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 15:34:58 executing program 2: 15:34:58 executing program 0: 15:34:58 executing program 5: 15:34:58 executing program 3: 15:34:58 executing program 4: 15:34:58 executing program 1: 15:34:58 executing program 5: 15:34:58 executing program 0: 15:34:58 executing program 2: 15:34:58 executing program 4: 15:34:58 executing program 3: 15:34:58 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) prctl$intptr(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 15:34:58 executing program 0: mkdir(&(0x7f00000012c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) 15:34:58 executing program 4: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) prctl$intptr(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 15:34:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:58 executing program 5: 15:34:58 executing program 3: 15:34:58 executing program 0: syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) getpgrp(0x0) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getpgid(0xffffffffffffffff) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getegid() getpgrp(0x0) getgroups(0x0, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getpgrp(0x0) getgroups(0x0, &(0x7f0000001140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001340)='/dev/vcsa#\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgid(0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000003b80)='nodev%}/!em1-(\x00'}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 349.525813] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:34:58 executing program 5: syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) getpgrp(0x0) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getpgid(0xffffffffffffffff) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getegid() getpgrp(0x0) getgroups(0x0, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getpgrp(0x0) getgroups(0x0, &(0x7f0000001140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001340)='/dev/vcsa#\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgid(0x0) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 15:34:58 executing program 3: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) prctl$intptr(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 15:34:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 349.719449] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:34:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 349.870229] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:34:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 350.047472] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:34:59 executing program 1: mq_open(&(0x7f0000000000)='{trusted^l\x00', 0x40, 0x0, &(0x7f0000000040)={0x0, 0x4, 0xffffffff}) 15:34:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:59 executing program 4: accept(0xffffffffffffffff, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000140), &(0x7f00000001c0)=0x4) syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000012c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) getresgid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 15:34:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000540), 0x0, 0x0, &(0x7f00000006c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 15:34:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7da122b891bfc4e2700c596f8330edfa2", 0x11) 15:34:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 15:34:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7da122b891bfc4e2f00000000000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000021c0)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="38597f5dcdfc9eea9397168d6b921e7b2b40b85d1edc99bcba6a02d9bb313567dd65379c58d19051cb108f4609983007fb67fa553c7017edbebc5d85608bf18d8a64fc7d32ff6f7f68db0ab5c9a88d9092e4019f7a9e9465d96c346756088aaf871ebe25ded529e0272e713603f812991ba512f1066b0e6493d9e5d5d36b109666", 0x81}], 0x1}], 0x1, 0x0) read(r2, &(0x7f0000000bc0)=""/93, 0xfffffe0a) [ 350.551638] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:34:59 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:59 executing program 5: mkdir(&(0x7f00000012c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000012c0)) [ 350.694344] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:34:59 executing program 1: ioprio_set$uid(0x3, 0x0, 0x6248) 15:34:59 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:34:59 executing program 5: accept(0xffffffffffffffff, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000140), &(0x7f00000001c0)=0x4) syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000012c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 350.886917] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:00 executing program 4: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000100)) sendmmsg(r1, &(0x7f0000005440)=[{{&(0x7f0000000800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[], 0xf}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002900)=[{0x10}], 0x10}}, {{&(0x7f0000005080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ea1597ec9523521028fc5173b8c220df1ba86e4014b16e62b6f699c5aaf1f8c3a6f36de94adaf03ec14d8c4af5c3c434cbd3b02e5f8b6e6dcddf33d3b43ec9"}, 0x80, &(0x7f00000053c0)}}], 0x2, 0x10) 15:35:00 executing program 0: 15:35:00 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0x14) 15:35:00 executing program 1: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000680)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xb) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000280)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 15:35:00 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:00 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000240)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000000841, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000240)) 15:35:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000005240)=0xe8) getresgid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getresuid(&(0x7f00000053c0), &(0x7f0000005400), &(0x7f0000005440)) getegid() fstat(r0, &(0x7f00000055c0)) getuid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000500)={0x0, 0xfb, 0xc2, 0x0, 0x3, "e6d83462e79fe00061650070c68a3217", "a4ed59f98adaa6d4da0a18802398118dea2f9236bf87b35951fee2c311f056fbb5ad837e81d64658a9a6e72dcdbef01cc7807a58b31487d5b986d4a194a99567a798e5d2b9065e957bea4d2b3772f7bdd6df35013deb1601662cd7eaaeb36628cb4cbc5c5c7281156da4a096cb7471a8f3a4fbea218038095d0e1e373279226e1e8c759387ed2b320d1234774845408b8c2a8fe05ee44b62d92a6dd4e862a87de4524e238bd8c2615ac9779193"}, 0xc2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'sit0\x00', {0x2, 0x0, @dev}}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) alarm(0x0) [ 351.380140] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:00 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) mkdirat$cgroup(r0, &(0x7f0000000140)="e1ffffff00", 0x1ff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0xfffffffffffffe01, @ipv4={[], [], @multicast2}}, {0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xc}}, 0x6, [0x100, 0x0, 0x0, 0x9, 0x1000, 0x7]}, 0x5c) 15:35:00 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:00 executing program 4: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sched_setscheduler(r0, 0x4000000000005, &(0x7f0000000080)) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x87d, 0x20, 0x8001, 0x2, 0x16, 0xff, 0xdbf}, 0x1c) sendmmsg(r1, &(0x7f0000005440)=[{{&(0x7f0000000800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[], 0xf}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000000000000000000000000003ad8717067"], 0x15}}], 0x1, 0x10) 15:35:00 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() ioctl$TIOCNOTTY(r0, 0x5422) sched_setscheduler(r1, 0x5, &(0x7f0000000080)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)="e1ffffff00", 0x1ff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)={0x0, 0x9, 0x3, 0x7d43, 0x400}) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0xfffffffffffffe01, @ipv4={[], [], @multicast2}}, {0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xc}}, 0x6, [0x100, 0x0, 0x0, 0x0, 0x1000, 0x7]}, 0x5c) [ 351.546196] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:00 executing program 5: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000100)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@remote, @multicast1}, 0x8) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x4e23, 0x0, 'none\x00', 0x11, 0x8, 0x5c}, 0x2c) 15:35:00 executing program 4: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) recvfrom$inet6(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 15:35:00 executing program 0: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000100)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000040)={@broadcast, @remote}, 0x8) fsetxattr(r1, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='\x00', 0x1, 0x0) 15:35:00 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 351.813860] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:01 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) shmctl$SHM_LOCK(0x0, 0xb) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000380)=""/215) 15:35:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfe4e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000100)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) connect$inet6(r2, &(0x7f00000001c0), 0x1c) 15:35:01 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000500)=""/159) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)}) 15:35:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execve(&(0x7f0000000680)='./file0\x00', &(0x7f0000000180), &(0x7f00000005c0)) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000080), 0x10) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) 15:35:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'vlan0\x00', @ifru_data=&(0x7f0000000000)="13b7d36746579fec229f91c9930421ba5b0b4964195d0d7f98d5002f0adc9f6a"}}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'bcsf0\x00'}) 15:35:01 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:01 executing program 4: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x7, 0xffffffffffffffff, 0x6, 0x0, 0x3, 0x3f}) clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) sched_setscheduler(r0, 0x5, &(0x7f0000000100)) sendmmsg(r2, &(0x7f0000005440)=[{{&(0x7f0000005080)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ea1597ec9523521028fc5173b8c220df1ba86e4014b16e62b6f699c5aaf1f8c3a6f36de94adaf03ec14d8c4af5c3c434cbd3b02e5f8b6e6dcddf33d3b43ec9"}, 0x80, &(0x7f00000053c0)}}], 0x1, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'sit0\x00', 0x1002}) 15:35:01 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x48, 0x40000000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@remote, 0x2f}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f00000003c0)}, 0x10) [ 352.327299] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) [ 352.461995] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 352.569017] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 352.639976] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:02 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 353.095814] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:02 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7}, 0x7) readv(r0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/50, 0x32}], 0x1) 15:35:02 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000500)=""/159) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)}) 15:35:04 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x5c}, @dev}}}}}}, &(0x7f0000000180)) 15:35:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x10000000000085b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0x0, 0x4) 15:35:04 executing program 5: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffffffffffffffcd) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file1\x00') lseek(r0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 15:35:04 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000500)=""/159) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)}) 15:35:04 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='bridge0\x00'}) [ 355.339347] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f00000000c0)=@nl=@proc, &(0x7f0000000140)=0x80) 15:35:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:35:15 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:15 executing program 0: syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) getpgrp(0x0) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getpgid(0xffffffffffffffff) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getegid() getpgrp(0x0) getgroups(0x0, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getpgrp(0x0) getgroups(0x0, &(0x7f0000001140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001340)='/dev/vcsa#\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgid(0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000003b80)='nodev%}/!em1-(\x00'}, 0x30) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000003c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 15:35:15 executing program 5: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) getpgid(0xffffffffffffffff) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) prctl$intptr(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 15:35:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x11, @local, 0x0, 0x3, 'lc\x00'}, 0x2c) 15:35:15 executing program 3: memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpgid(0xffffffffffffffff) process_vm_writev(0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000740), 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000780), 0x8) clock_gettime(0x0, &(0x7f00000007c0)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000800)) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 15:35:15 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) getpgid(0xffffffffffffffff) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) prctl$intptr(0x0, 0x0) syz_execute_func(&(0x7f00000007c0)="428055a0636969ef69dc00d9908a203637c3f04b0fc7488f0fcd664690300f1fb821e105ee647a0c647f41dfe0400f01efe5e57d0f2ed994163b000000c4e1b9dc81001000021a1a01460fc4e3ad49377c4ddfde9f") sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 366.076098] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 366.244758] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 366.385334] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 366.543530] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:15 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getpgid(0x0) getpid() getpgid(0x0) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") [ 366.715075] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:35 executing program 0: syz_open_dev$vcsa(&(0x7f0000001700)='/dev/vcsa#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001480)=0xe8) getpgrp(0x0) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getpgid(0xffffffffffffffff) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getegid() getpgrp(0x0) getgroups(0x0, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) getpgrp(0x0) getgroups(0x0, &(0x7f0000001140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001340)='/dev/vcsa#\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgid(0x0) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000003b80)='nodev%}/!em1-(\x00'}, 0x30) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 15:35:35 executing program 5: chdir(&(0x7f0000000a00)='./file1\x00') getresuid(&(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480)) syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) mount$fuseblk(&(0x7f0000000800)='/dev/loop0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='fuseblk\x00', 0x0, &(0x7f0000000980)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/197, 0xc5, 0x0, &(0x7f0000000c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) delete_module(&(0x7f00000006c0)='GPL\x00', 0x0) getitimer(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") writev(0xffffffffffffffff, &(0x7f0000000780), 0xe49) utimes(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x77359400}, {0x77359400}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) request_key(&(0x7f0000000e40)='rxrpc_s\x00', &(0x7f0000000e80), &(0x7f0000000ec0)='\'em0((\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000f00)='keyring\x00', &(0x7f0000000f40), 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e00)={0xffffffffffffffff, &(0x7f0000000d00), &(0x7f0000000d40)=""/134}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv4_getnetconf={0x14}, 0x14}}, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 15:35:35 executing program 3: memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000002c0)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000240)) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000340)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) fstatfs(0xffffffffffffffff, &(0x7f00000004c0)=""/137) 15:35:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x4, 0x11f}, 0xc) 15:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 386.759231] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:35 executing program 1: [ 386.815842] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:35 executing program 1: 15:35:36 executing program 1: 15:35:36 executing program 1: [ 386.969492] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:35:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:56 executing program 1: 15:35:56 executing program 5: 15:35:56 executing program 3: setpriority(0x0, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000580), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@getqdisc={0x24}, 0x24}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000840)={'security\x00', 0xd8}, &(0x7f00000008c0)=0x24) 15:35:56 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x40}, [{}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 407.323936] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:56 executing program 0: clock_settime(0x0, &(0x7f0000000040)={0x77359400}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 15:35:56 executing program 1: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000280), &(0x7f0000000480)=0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getpid() openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000300)='memory.max\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000180)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f0000000340)=[{&(0x7f00000006c0)={0x1c, 0x18, 0x100, 0x0, 0x0, "", [@nested={0x8, 0x68, [@typed={0x4, 0x0, @binary}]}, @nested={0x4, 0x6a}]}, 0x1c}, {&(0x7f0000001c80)={0x10, 0x22, 0x710, 0x0, 0x25dfdbfc}, 0x10}, {&(0x7f0000002040)={0x10, 0x41, 0x0, 0x70bd25, 0x25dfdbfb}, 0x10}, {&(0x7f0000005b00)={0x10, 0x0, 0x310, 0x0, 0x25dfdbfb}, 0x10}], 0x4}, 0x4000) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpid() r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000580)=""/153) sync_file_range(r2, 0x3847, 0x0, 0x1) clock_gettime(0x3, &(0x7f00000003c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000640)={'security\x00'}, &(0x7f0000000400)=0x54) 15:35:56 executing program 5: futex(&(0x7f0000000400), 0xf, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000040), 0x0) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getpgrp(0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f00000004c0)) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580)='/dev/null\x00'}, 0x1b) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000000480)=0xffffffffffffff74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002680)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002780)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getrlimit(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 15:35:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:35:56 executing program 1: clone(0x200, &(0x7f00000003c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000400)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/159) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f00000000c0)) [ 407.462885] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:35:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 407.623382] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:17 executing program 3: 15:36:17 executing program 5: 15:36:17 executing program 0: 15:36:17 executing program 1: 15:36:17 executing program 1: [ 428.039285] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:36:17 executing program 5: 15:36:17 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)) 15:36:17 executing program 0: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001280)=ANY=[], 0x0) r1 = getpid() pipe2(&(0x7f0000000140), 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) sched_setscheduler(r1, 0x5, &(0x7f0000000100)) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @loopback}, 0xc) 15:36:17 executing program 3: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001280)=ANY=[], 0x0) r1 = getpid() pipe2(&(0x7f00000012c0), 0xfffffffffffffffd) sched_setscheduler(r1, 0x5, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x200, 0x0, 0xbb, 0x375, 0x0, 0x40}) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) 15:36:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:17 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x0, 0x2, 0x1, 0x6, 0x0, 0x400, 0x20}, 0x20) alarm(0x0) 15:36:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000280)="d5", 0x1, 0x84, 0x0, 0x0) 15:36:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000003c0), 0x0) 15:36:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfe4e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000100)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 15:36:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x0, 0x2}, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x7) alarm(0x0) [ 428.281547] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:36:17 executing program 5: clone(0x200, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000500)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000006c0)=""/4096) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x803102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000580)='./file0\x00', 0x841, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)) semtimedop(0x0, &(0x7f0000000100), 0x9a, &(0x7f0000000180)={0x77359400}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000005c0)=""/201) 15:36:17 executing program 0: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000680)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xb) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000002c0)={'filter\x00', 0x0, 0x0, 0x70, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/112}, &(0x7f0000000480)=0x78) 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8080, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x560) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440), &(0x7f00000002c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000240)='\x00', &(0x7f0000000280)='./file0\x00') ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000002c0)) [ 428.439038] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 428.569837] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:36:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) [ 428.650498] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 429.275568] cgroup: fork rejected by pids controller in /syz3 15:36:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfe4e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000100)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 15:36:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:20 executing program 5: clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = getpid() pipe2(&(0x7f0000000140), 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000100)) setsockopt(r0, 0x0, 0x0, &(0x7f0000001280), 0x0) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) 15:36:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x1, {{0x2, 0x0, @multicast1}}}, 0x84) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) 15:36:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfe4e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000100)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 15:36:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:20 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', &(0x7f0000000540), &(0x7f0000000240), 0x1000) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0x43) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x1000000000013) 15:36:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) sched_setscheduler(r0, 0x5, &(0x7f0000000c80)) readlink(&(0x7f0000000080)='\x00', &(0x7f0000000200)=""/108, 0x6c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002f40)={&(0x7f0000000140), 0xc, &(0x7f0000002f00)={&(0x7f0000001ac0)=@ipv6_delroute={0x1c, 0x19, 0x801}, 0x1c}}, 0x0) 15:36:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) 15:36:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfe4e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000100)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 15:36:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) sched_setscheduler(r0, 0x5, &(0x7f0000000c80)) readlink(&(0x7f0000000080)='\x00', &(0x7f0000000200)=""/108, 0x6c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002f40)={&(0x7f0000000140), 0xc, &(0x7f0000002f00)={&(0x7f0000001ac0)=@ipv6_delroute={0x1c, 0x19, 0x801}, 0x1c}}, 0x0) 15:36:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) 15:36:21 executing program 4: socket$inet6(0xa, 0x3, 0x800000000000004) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:21 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', &(0x7f0000000540), &(0x7f0000000240), 0x1000) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0x43) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x1000000000013) 15:36:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0), 0x0) r1 = getpid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000100)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x8000000000004a, &(0x7f0000000080), 0x0) 15:36:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) 15:36:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000340), 0x0) 15:36:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000340), 0x0) 15:36:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000340), 0x0) 15:36:22 executing program 5: 15:36:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 434.096525] device bridge_slave_1 left promiscuous mode [ 434.102385] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.171311] device bridge_slave_0 left promiscuous mode [ 434.191042] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.323480] team0 (unregistering): Port device team_slave_1 removed [ 434.348719] team0 (unregistering): Port device team_slave_0 removed [ 434.377598] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 434.431428] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 434.546827] bond0 (unregistering): Released all slaves 15:36:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:42 executing program 4: socket$inet6(0xa, 0x3, 0x800000000000004) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:36:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', &(0x7f0000000540), &(0x7f0000000240), 0x1000) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0x43) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r4, 0x1000000000013) 15:36:42 executing program 5: 15:36:42 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000340), 0x0) 15:36:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = getpid() sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:42 executing program 5: 15:36:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:36:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:42 executing program 5: 15:36:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:36:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 453.317561] IPVS: ftp: loaded support on port[0] = 21 [ 453.970958] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.978330] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.985548] device bridge_slave_0 entered promiscuous mode [ 454.020698] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.028142] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.035520] device bridge_slave_1 entered promiscuous mode [ 454.067784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 454.100710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 454.191242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 454.224048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 454.364163] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 454.371657] team0: Port device team_slave_0 added [ 454.402639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 454.410016] team0: Port device team_slave_1 added [ 454.439663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.470709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.502295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.544248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.827789] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.834145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.840842] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.847323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.854970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 455.849394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 455.866025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.955806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 456.048690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 456.054828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.062232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.153823] 8021q: adding VLAN 0 to HW filter on device team0 15:37:02 executing program 4: socket$inet6(0xa, 0x3, 0x800000000000004) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:37:02 executing program 5: 15:37:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:37:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:37:02 executing program 0: 15:37:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) 15:37:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r0 = getpid() eventfd(0x6) sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) getcwd(&(0x7f0000000240)=""/79, 0x4f) 15:37:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000440)=""/238) 15:37:02 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() removexattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000240)=ANY=[]) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000180), 0x10) add_key(&(0x7f00000002c0)="656e6372797074656400b77657f5e0caadf06f57d8181190d81d21b7db50af37082fcbe888ceb0e98e47fb68a895dcc60dcfb17e0f94b11cbccc5011f88511795e7a6d8d89c255ef31643f987872d3aa512f13e57cfbe0ff7e87b4", &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000140)="7248ffff0511", &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffb) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") [ 473.786188] cgroup: fork rejected by pids controller in /syz1 15:37:02 executing program 5: getrlimit(0x0, &(0x7f0000000280)) capget(&(0x7f00000000c0), &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000440)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000002880), 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000001680), 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@local, @in=@local}}, {{@in=@broadcast}}}, &(0x7f0000000c00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c40)={0x0, @rand_addr, @dev}, &(0x7f0000000c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @dev}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000f00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@rand_addr, @in=@multicast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000012c0)={'lo\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001300)={@remote}, &(0x7f0000001340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000013c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'bridge_slave_1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000019c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000020c0)={&(0x7f0000000340), 0xc, &(0x7f0000002080)={&(0x7f0000001a00)={0x14}, 0x14}}, 0x0) 15:37:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:37:02 executing program 1: r0 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') [ 474.019349] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 474.876439] device bridge_slave_1 left promiscuous mode [ 474.882430] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.916431] device bridge_slave_0 left promiscuous mode [ 474.921939] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.997267] team0 (unregistering): Port device team_slave_1 removed [ 475.008183] team0 (unregistering): Port device team_slave_0 removed [ 475.019198] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 475.109255] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 475.171459] bond0 (unregistering): Released all slaves 15:37:23 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)}], 0x500, 0x0) 15:37:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getpid() eventfd(0x6) getcwd(&(0x7f0000000240)=""/79, 0x4f) 15:37:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x1a8) 15:37:23 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x40}, [{}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 15:37:23 executing program 1: r0 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000040), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@deltclass={0x38, 0x29, 0x10, 0x0, 0x25dfdbfd, {0x0, 0x0, {}, {0x9, 0x4}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44850}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') 15:37:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x40, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800003, 0x11, r0, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000200)={0xffffffc9}, 0xfffffffffffffde7) 15:37:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getpid() getcwd(&(0x7f0000000240)=""/79, 0x4f) 15:37:23 executing program 0: setpriority(0x0, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000580), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@getqdisc={0x24}, 0x24}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000840)={'security\x00', 0xd8}, &(0x7f00000008c0)=0x24) io_submit(0x0, 0x0, &(0x7f0000000800)) setxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)=@random={'security.', 'system)system#\x00'}, &(0x7f0000000980)='selinux\x00', 0x8, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getegid() setfsgid(0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000003c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) [ 494.526975] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 15:37:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getcwd(&(0x7f0000000240)=""/79, 0x4f) 15:37:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 494.580615] cgroup: fork rejected by pids controller in /syz0 15:37:23 executing program 0: io_setup(0x6, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@loopback, @in6=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000f80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000cc0)=0xe8) getegid() getegid() socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0206969ef69dc00d9ce41ff0f1837370f38211ac414c19086d9f28fc9410feefa4e3a1a9bfbc4c15d549c7e000001004175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 15:37:23 executing program 5: memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) clock_adjtime(0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 494.634617] kernel msg: ebtables bug: please report to author: bad policy [ 494.719205] IPVS: ftp: loaded support on port[0] = 21 [ 495.287900] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.294299] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.301927] device bridge_slave_0 entered promiscuous mode [ 495.331623] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.338241] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.345162] device bridge_slave_1 entered promiscuous mode [ 495.375693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 495.404158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 495.486918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 495.517601] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 495.643775] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 495.651398] team0: Port device team_slave_0 added [ 495.679302] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 495.686684] team0: Port device team_slave_1 added [ 495.714990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 495.745535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 495.774785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 495.805897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 496.087509] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.093970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 496.100590] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.106954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.086526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 497.180909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 497.274815] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 497.281097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 497.289016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.390772] 8021q: adding VLAN 0 to HW filter on device team0 [ 514.015533] INFO: task syz-executor5:7776 blocked for more than 140 seconds. [ 514.022766] Not tainted 4.19.0-rc3+ #236 [ 514.028285] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 514.036414] syz-executor5 D20520 7776 5356 0x00000000 [ 514.042088] Call Trace: [ 514.044696] __schedule+0x86c/0x1ed0 [ 514.048487] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 514.053088] ? __sched_text_start+0x8/0x8 [ 514.057303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.062881] ? futex_wait_queue_me+0x55d/0x840 [ 514.067520] ? refill_pi_state_cache.part.9+0x320/0x320 [ 514.072897] ? print_usage_bug+0xc0/0xc0 [ 514.077004] ? do_raw_spin_lock+0xc1/0x200 [ 514.081267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.086850] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 514.091888] ? futex_wait_setup+0x266/0x3e0 [ 514.096253] ? graph_lock+0x170/0x170 [ 514.100065] schedule+0xfe/0x460 [ 514.103422] ? __schedule+0x1ed0/0x1ed0 [ 514.107449] ? find_held_lock+0x36/0x1c0 [ 514.111530] ? mark_held_locks+0xc7/0x130 [ 514.115847] schedule_timeout+0x1cc/0x260 [ 514.120124] ? usleep_range+0x1a0/0x1a0 [ 514.124097] ? __ldsem_down_read_nested+0x4e3/0xb80 [ 514.129179] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 514.134646] ? kasan_check_write+0x14/0x20 [ 514.138977] ? do_raw_spin_lock+0xc1/0x200 [ 514.143238] __ldsem_down_read_nested+0x538/0xb80 [ 514.148279] ? ldsem_wake+0x40/0x40 [ 514.151975] ? ___might_sleep+0x1ed/0x300 [ 514.156937] ? find_held_lock+0x36/0x1c0 [ 514.161005] ldsem_down_read+0x32/0x40 [ 514.164884] ? ldsem_down_read+0x32/0x40 [ 514.169007] tty_ldisc_ref_wait+0x25/0x80 [ 514.173173] tty_ioctl+0x512/0x1820 [ 514.177003] ? tty_vhangup+0x30/0x30 [ 514.180763] ? rcu_bh_qs+0xc0/0xc0 [ 514.184304] ? __fget+0x4d1/0x740 [ 514.187816] ? ksys_dup3+0x680/0x680 [ 514.191549] ? aa_sk_perm+0x218/0x8b0 [ 514.195394] ? fget_raw+0x20/0x20 [ 514.198863] ? tty_vhangup+0x30/0x30 [ 514.202563] do_vfs_ioctl+0x1de/0x1720 [ 514.206506] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 514.211807] ? ioctl_preallocate+0x300/0x300 [ 514.216273] ? __fget_light+0x2e9/0x430 [ 514.220261] ? fget_raw+0x20/0x20 [ 514.223702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.229297] ? fput+0x130/0x1a0 [ 514.232589] ? __x64_sys_futex+0x47f/0x6a0 [ 514.236980] ? do_syscall_64+0x9a/0x820 [ 514.240971] ? do_syscall_64+0x9a/0x820 [ 514.244940] ? lockdep_hardirqs_on+0x421/0x5c0 [ 514.249576] ? security_file_ioctl+0x94/0xc0 [ 514.254003] ksys_ioctl+0xa9/0xd0 [ 514.257522] __x64_sys_ioctl+0x73/0xb0 [ 514.261427] do_syscall_64+0x1b9/0x820 [ 514.265391] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 514.270822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 514.275833] ? trace_hardirqs_on_caller+0x310/0x310 [ 514.280871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 514.286787] ? recalc_sigpending_tsk+0x180/0x180 [ 514.291544] ? kasan_check_write+0x14/0x20 [ 514.295868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.300729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.305994] RIP: 0033:0x4572d9 [ 514.309201] Code: Bad RIP value. [ 514.312640] RSP: 002b:00007fcb278c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 514.320398] RAX: ffffffffffffffda RBX: 00007fcb278c86d4 RCX: 00000000004572d9 [ 514.327745] RDX: 0000000020000100 RSI: 0000000000005600 RDI: 0000000000000005 [ 514.335016] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 514.342328] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 514.349683] R13: 00000000004d2550 R14: 00000000004c7a92 R15: 0000000000000002 [ 514.357093] [ 514.357093] Showing all locks held in the system: [ 514.363428] 1 lock held by khungtaskd/984: [ 514.367720] #0: 000000005b7728df (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 514.376586] 1 lock held by rsyslogd/5220: [ 514.380798] #0: 00000000a3a7bdf0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 514.388848] 2 locks held by getty/5310: [ 514.392926] #0: 000000008e2207d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.401219] #1: 000000009dcb0bff (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.410294] 2 locks held by getty/5311: [ 514.414263] #0: 00000000270defab (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.423299] #1: 0000000097dae4df (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.432222] 2 locks held by getty/5312: [ 514.436232] #0: 0000000030f6ec08 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.444481] #1: 000000005f629db3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.453443] 2 locks held by getty/5313: [ 514.457451] #0: 00000000606b13e2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.465748] #1: 000000002218fc4b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.474649] 2 locks held by getty/5314: [ 514.478656] #0: 000000001a34fff3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.486966] #1: 00000000ba317663 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.495891] 2 locks held by getty/5315: [ 514.499872] #0: 00000000ae035bea (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.508159] #1: 000000008c2895aa (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.517118] 2 locks held by getty/5316: [ 514.521077] #0: 000000003a514108 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.529369] #1: 000000004b54e2c8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.538317] 2 locks held by syz-executor4/6918: [ 514.542973] #0: 000000007ca4e0a5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.552003] #1: 000000002c7ee2c5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.560961] 1 lock held by syz-executor5/7776: [ 514.565572] #0: 00000000f25c1c8e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.573814] 2 locks held by syz-executor5/7778: [ 514.579016] #0: 00000000f25c1c8e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 514.587376] #1: 00000000b4b85db3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 514.596307] 1 lock held by syz-executor4/8706: [ 514.600881] #0: 00000000df707619 (sk_lock-AF_ALG){+.+.}, at: hash_sendmsg+0xd9/0xae0 [ 514.608963] [ 514.610600] ============================================= [ 514.610600] [ 514.617674] NMI backtrace for cpu 1 [ 514.621366] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #236 [ 514.628309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.637799] Call Trace: [ 514.640403] dump_stack+0x1c4/0x2b4 [ 514.644074] ? dump_stack_print_info.cold.2+0x52/0x52 [ 514.649261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.654797] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 514.659463] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 514.664650] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 514.669918] arch_trigger_cpumask_backtrace+0x14/0x20 [ 514.675148] watchdog+0xb3e/0x1050 [ 514.678689] ? reset_hung_task_detector+0xd0/0xd0 [ 514.683529] ? __kthread_parkme+0xce/0x1a0 [ 514.687763] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 514.692852] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 514.697944] ? lockdep_hardirqs_on+0x421/0x5c0 [ 514.702527] ? trace_hardirqs_on+0xbd/0x310 [ 514.706851] ? kasan_check_read+0x11/0x20 [ 514.710985] ? __kthread_parkme+0xce/0x1a0 [ 514.715214] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 514.720793] ? kasan_check_write+0x14/0x20 [ 514.725051] ? do_raw_spin_lock+0xc1/0x200 [ 514.729281] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 514.734378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.740226] ? __kthread_parkme+0xfb/0x1a0 [ 514.744455] kthread+0x35a/0x420 [ 514.747811] ? reset_hung_task_detector+0xd0/0xd0 [ 514.752637] ? kthread_bind+0x40/0x40 [ 514.756427] ret_from_fork+0x3a/0x50 [ 514.760595] Sending NMI from CPU 1 to CPUs 0: [ 514.765222] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 514.767229] Kernel panic - not syncing: hung_task: blocked tasks [ 514.778948] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #236 [ 514.785859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.795204] Call Trace: [ 514.797794] dump_stack+0x1c4/0x2b4 [ 514.801423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 514.806607] panic+0x238/0x4e7 [ 514.809792] ? add_taint.cold.5+0x16/0x16 [ 514.813937] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 514.819378] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 514.824819] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 514.830358] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 514.835801] watchdog+0xb4f/0x1050 [ 514.839509] ? reset_hung_task_detector+0xd0/0xd0 [ 514.844354] ? __kthread_parkme+0xce/0x1a0 [ 514.848594] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 514.853975] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 514.859078] ? lockdep_hardirqs_on+0x421/0x5c0 [ 514.863656] ? trace_hardirqs_on+0xbd/0x310 [ 514.867968] ? kasan_check_read+0x11/0x20 [ 514.872107] ? __kthread_parkme+0xce/0x1a0 [ 514.876345] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 514.882027] ? kasan_check_write+0x14/0x20 [ 514.886260] ? do_raw_spin_lock+0xc1/0x200 [ 514.890502] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 514.895722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 514.901257] ? __kthread_parkme+0xfb/0x1a0 [ 514.905481] kthread+0x35a/0x420 [ 514.908850] ? reset_hung_task_detector+0xd0/0xd0 [ 514.913712] ? kthread_bind+0x40/0x40 [ 514.917516] ret_from_fork+0x3a/0x50 [ 514.922394] Kernel Offset: disabled [ 514.926078] Rebooting in 86400 seconds..