[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.153821] audit: type=1800 audit(1544734612.208:25): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 43.172883] audit: type=1800 audit(1544734612.208:26): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 43.192220] audit: type=1800 audit(1544734612.208:27): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2018/12/13 20:57:06 fuzzer started 2018/12/13 20:57:11 dialing manager at 10.128.0.26:39653 2018/12/13 20:57:11 syscalls: 1 2018/12/13 20:57:11 code coverage: enabled 2018/12/13 20:57:11 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/13 20:57:11 setuid sandbox: enabled 2018/12/13 20:57:11 namespace sandbox: enabled 2018/12/13 20:57:11 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/13 20:57:11 fault injection: enabled 2018/12/13 20:57:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/13 20:57:11 net packet injection: enabled 2018/12/13 20:57:11 net device setup: enabled 20:59:14 executing program 0: getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x0) syzkaller login: [ 185.592001] IPVS: ftp: loaded support on port[0] = 21 [ 186.839454] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.846014] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.854153] device bridge_slave_0 entered promiscuous mode [ 186.929525] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.936200] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.944346] device bridge_slave_1 entered promiscuous mode [ 187.018711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 187.092077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.320937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.400203] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.480970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.488027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.567706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.574759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.806243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.814750] team0: Port device team_slave_0 added [ 187.890252] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.898716] team0: Port device team_slave_1 added [ 187.975295] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.056395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.134207] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.141834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.150850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.228922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.236746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.245874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 20:59:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x40000) [ 188.764504] IPVS: ftp: loaded support on port[0] = 21 [ 189.571387] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.577967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.585130] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.591662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.600676] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.607281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.898208] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.904817] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.912885] device bridge_slave_0 entered promiscuous mode [ 191.065964] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.072518] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.080529] device bridge_slave_1 entered promiscuous mode [ 191.246856] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.354022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.689724] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.832215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.987711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.994923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.117116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 192.124231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:59:21 executing program 2: r0 = socket(0x11, 0x2, 0x9) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, [0x2800000000000000, 0x8001, 0x0, 0x401]}) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x1}, 0x4010) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x7f, 0x100000000, 0x8, 0x2, r1, 0x100000000}, 0x2c) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r3 = socket$inet_tcp(0x2, 0x1, 0x0) mbind(&(0x7f00008be000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000140)=0xa3, 0x8, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x402002, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={"6c6f0040fdfdffff00", 0x101}) [ 192.548233] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.556552] team0: Port device team_slave_0 added [ 192.710441] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.718719] team0: Port device team_slave_1 added [ 192.895538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 192.903057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.911907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.943096] IPVS: ftp: loaded support on port[0] = 21 [ 193.099169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.106267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.114776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.270942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 193.278596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.287553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.410944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 193.418513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.427463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.114806] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.121326] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.129440] device bridge_slave_0 entered promiscuous mode [ 195.258163] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.264727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.271837] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.278314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.287332] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 195.325226] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.331768] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.339762] device bridge_slave_1 entered promiscuous mode [ 195.374238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.584776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.706475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.724435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.803304] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.053312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.142670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.425209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.454736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.462638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.869207] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.877559] team0: Port device team_slave_0 added [ 197.000554] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.014413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.022830] team0: Port device team_slave_1 added [ 197.159540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.166706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.175611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.296831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.303952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.312592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.487124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.494904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.503723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.682512] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.691088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.699928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.249177] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.255751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.262889] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.269380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.277978] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.284586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:59:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) [ 200.957342] IPVS: ftp: loaded support on port[0] = 21 20:59:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195, 0x0, 0x0, {0x1fc}}, 0xfffffee2) 20:59:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x77, 0x4) pipe(&(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000001680), 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000ac0), 0x0, &(0x7f0000001300)=[@fadd={0x58, 0x114, 0x6, {{0x7ff, 0x3}, &(0x7f0000001280), &(0x7f00000012c0), 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x58, 0x80}, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x80040) bind$alg(0xffffffffffffffff, 0x0, 0xfffffffffffffce7) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x80000) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19) [ 201.729870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.856917] atomic_op 00000000008fd161 conn xmit_atomic (null) [ 201.983442] hrtimer: interrupt took 46103 ns [ 202.032734] atomic_op 0000000088af5822 conn xmit_atomic (null) 20:59:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000840)="0ab7d9a0525d839c5bf45c46260c000000000000") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x8d000000, 0x2000000000000000) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)="6d656b6f72798b3c871e6e747300", 0x7a05, 0x1700) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000780)={0x0, 0x8001, 0x1ff, 0x5210, 0xfbc9, 0x0, 0x5, 0x5, {0x0, @in={{0x2, 0x4e20, @rand_addr=0xfffffffffffffffb}}, 0x9, 0x3, 0x7fff, 0x101, 0x80056}}, &(0x7f0000000500)=0x19) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000540)={r5, 0x20}, &(0x7f00000005c0)=0x8) setsockopt$inet_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_int(r1, 0x0, 0x208) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(r4, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000008803, 0x10000080000003}, 0x14) shutdown(r4, 0x1) 20:59:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x5) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x5) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9, 0x129100) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', 'aead\x00'}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280), 0x0, 0x10101, &(0x7f0000001380)={0x77359400}) [ 202.512211] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 20:59:31 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@empty, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x84, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/163) 20:59:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x3, [0x7, 0x7fffffff, 0x3f]}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') lseek(r1, 0x4b, 0x0) signalfd4(r1, &(0x7f00000000c0)={0xf74}, 0x8, 0x80800) 20:59:32 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xd5a, 0x4040) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=@hopopts={0x73, 0x1a, [], [@calipso={0x7, 0x18, {0x4, 0x4, 0x0, 0x2, [0x3, 0x7ff]}}, @ra, @hao={0xc9, 0x10, @loopback}, @jumbo={0xc2, 0x4, 0xfffffffffffffffb}, @calipso={0x7, 0x28, {0x1000, 0x8, 0x67b, 0x80000001, [0x1, 0x9, 0x9, 0x40000]}}, @generic={0xfd5, 0x31, "b5df38602455f99e4a911059ca130b7665b7e1906211be9b3d24531c72e8d10dd7fa4bc73e36a83efb84540c8dedb92992"}, @calipso={0x7, 0x40, {0x6, 0xe, 0x9, 0x4, [0x9, 0xfffffffffffffff9, 0xffffffffffff6d36, 0xba4, 0x0, 0x4, 0x47]}}]}, 0xe0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f00000000c0)) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000100)={0x7, 0x79, 0x2}, 0x7) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000040)=0xffffffff) 20:59:32 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1}, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000011c0)=""/254, &(0x7f0000000080)=0xfe) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x14400) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001300)='TRUE', 0x4, 0x1) recvmsg(r1, &(0x7f0000000100)={0x0, 0x3a9, 0x0}, 0x10000) [ 203.248079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 203.254474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.262295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:59:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140001000000000000000000227bae5738f5844c"], 0x14}}, 0x8000) write$binfmt_misc(r1, 0x0, 0x1cf) [ 203.916957] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.963982] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.970460] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.978598] device bridge_slave_0 entered promiscuous mode [ 204.139379] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.146097] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.154074] device bridge_slave_1 entered promiscuous mode [ 204.331380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.509066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.952655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.159697] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.313513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.320539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.416928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.424001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.850461] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.858937] team0: Port device team_slave_0 added [ 206.028712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.037706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.046004] team0: Port device team_slave_1 added [ 206.213634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.220643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.229244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.389051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.396256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.404890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.557230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.564964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.574095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.634884] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.674058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.681968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.690685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.244867] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 207.251172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.259027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:59:36 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000080)={0x0, "5e58724446e21e102e8975a444f15fa9497056ac5a71d5c9caa98e4c90865bff"}) [ 207.884115] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.183502] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.190010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.197138] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.203646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.212257] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.218741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.913266] device lo entered promiscuous mode [ 211.011485] device lo left promiscuous mode [ 211.022845] device lo entered promiscuous mode 20:59:40 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x100000001, 0x9}) socket$unix(0x1, 0x5, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0xfbfa, 0x0, 0x1, 0x3635}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x8, r1, 0x0, 0x401}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0xb, @win={{}, 0x0, 0x0, &(0x7f0000000140)={{}, &(0x7f00000000c0)={{}, &(0x7f0000000040)}}, 0x0, &(0x7f0000000180)}}) [ 212.314320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.557131] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.715975] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.722347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.729885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.894964] 8021q: adding VLAN 0 to HW filter on device team0 20:59:42 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)='@', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) 20:59:42 executing program 2: socket$inet6(0xa, 0x801, 0x0) 20:59:42 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x202101) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f00000000c0)="927480b3ee78cdf4e7a7eb10931bed2c1f228a2d34f09a777951597e3b53b3034fd7fd3ea391a76a4b3564fd15858bdb3caeacb135ad24bbd2cb7893d6ff56a39d1185cdd7c1648a097c611cfc60edd37ce6be03257e8fcc72add8bf46846199") getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000f80)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) r2 = accept4$packet(r0, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14, 0x800) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000001}, 0xc, &(0x7f00000014c0)={&(0x7f0000001200)=@getsadinfo={0x290, 0x23, 0xc00, 0x70bd2d, 0x25dfdbfe, 0x0, [@offload={0xc, 0x1c, {r1, 0x2}}, @replay_esn_val={0x30, 0x17, {0x5, 0x70bd26, 0x70bd26, 0x70bd27, 0x70bd2b, 0x4, [0x7, 0x5, 0x0, 0x0, 0x7]}}, @encap={0x1c, 0x4, {0x1, 0x4e20, 0x4e21, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}}, @sa={0xe4, 0x6, {{@in6=@remote, @in6=@local, 0x4e23, 0x800, 0x4e20, 0x0, 0xa, 0x20, 0x20, 0x6, r3, r4}, {@in=@multicast2, 0x4d3}, @in6=@remote, {0x5, 0x6, 0x0, 0x80000000, 0x3, 0x7fff, 0x8, 0x3}, {0xffff, 0x8, 0x8, 0x9}, {0xacc0, 0x24, 0x90c}, 0x70bd29, 0x3504, 0x2, 0x7, 0xac43, 0x20}}, @lastused={0xc, 0xf, 0x3ff}, @algo_auth_trunc={0x134, 0x14, {{'crc32c\x00'}, 0x740, 0x80, "c9f1cf1484142834a8330d5767997bc06be0745019415d3ec013eb762bf2fe2e2a32e77d28e476ee8ce1216b62ca2c05f4ed8cc8e0f16103b54899649bbfa764cda2c43139775766c9779668c1c05adf2e0f3999ee134e4b78fb3de7ebe5aea6ec30a2fc0928382f57ce272105d51914052c498382b58e4af9056f713f277ac39619d8c8496743fb35b1e0c49780cfd5a2525ce9154a2f6c36be75b6b9ae319f024b6374e0900711a91d63125c1251ed95554e42c3a0ce64a6af5e2c042234a61291adee80689e090bcb27e8ba84f4802af3c4056f41f4ab9dd49ff2bc1cce8c4e36c1139a95691e"}}]}, 0x290}, 0x1, 0x0, 0x0, 0x1}, 0x10) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000001540)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000001580)={0xffffffffffffffff, 0x48d1, 0x0, 0x9, 0x5, 0x0, 0x3, 0x401, 0x800, 0x3, 0x8, 0x7fffffff}) write$FUSE_DIRENT(r0, &(0x7f00000015c0)={0xb0, 0xfffffffffffffff5, 0x1, [{0x5, 0x1, 0x0, 0x2}, {0x3, 0x8, 0x7, 0x0, 'crc32c\x00'}, {0x4, 0x477, 0x7, 0x9, 'crc32c\x00'}, {0x4, 0x8, 0xe, 0x4, ',\\vmnet0proc(\\'}, {0x4, 0x3, 0x5, 0xffffffff, 'ipvs\x00'}]}, 0xb0) getsockopt$inet6_dccp_int(r0, 0x21, 0x6, &(0x7f0000001680), &(0x7f00000016c0)=0x4) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000001700)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001740)={'bond_slave_1\x00', @dev={[], 0xb}}) r5 = syz_open_dev$radio(&(0x7f0000001780)='/dev/radio#\x00', 0x2, 0x2) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000017c0)={'vcan0\x00', r1}) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001800)={0x800, {{0x2, 0x4e24, @multicast1}}, 0x1, 0x8, [{{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e24, @remote}}, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e21, @multicast1}}]}, 0x490) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x4e21, 0x3ff, 0x4e21, 0x400, 0xa, 0x80, 0x0, 0x5e, r6, r4}, {0xda8b, 0x0, 0x4, 0x5, 0x7fff, 0x118, 0xffffffffffffffff, 0x1}, {0x7, 0xfff, 0x800, 0x6}, 0x2, 0x6e6bb5, 0x3, 0x1, 0x3, 0x3}, {{@in=@empty, 0x4d2, 0x3b}, 0xa, @in6, 0x3501, 0x3, 0x3, 0x400, 0x3f, 0x4, 0x20}}, 0xe8) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000001dc0)=""/46, &(0x7f0000001e00)=0x2e) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_netfilter(r5, &(0x7f0000002280)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x400a8}, 0xc, &(0x7f0000002240)={&(0x7f0000001e80)={0x3a0, 0x14, 0x6, 0x400, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x5}, [@nested={0x164, 0x1b, [@generic="39c6c5d0c28a3fd7b432066da6267583934252bfb8cb07afdbe4690fc08c77ec549c72911ca34267e2e91c25aec721f77c59c6f060d8657f1d023d573349d55049d006549c75a549346c9ae5acf86b7d861b22fcf377c840770c3d18adf3edd511d851d81fdb0e9d854a84644ad869221c9657d371a518f0db14bb32bac8e1150104c089c8a55157d238cc176d21e5249b24cc04c1636dfae3d6be35d8ae430eedcfb518e68c1353beaceca4ddd4e20db4ee09c863e1a199c6288312884dd345656065dacbf5ae38f1f6d4b82f5164b3aa0f460884e6978b9170793030ea", @generic="65070bb8ddc65258cf321a4b3939e651c16ddaddcb5d72949df6a2b3c8406ded992817bd6c0ed06ad8dd2a7b408daa31885594ad602acd522f749436003469d7f0968bb704948ad0aff9e9371d471b42ee4afb46ff5916ae4027f55f2cada395c83357ba5216c3ddaaa4c8d0338427889b33b119e426c2b3d7e5de99c4ab817cc3"]}, @nested={0xd8, 0x47, [@generic="b15016f48fd8c4549f17df33a5683922cd9a6cba51299d3b631326f9c50c5a3e83e0a4fd0de31d2f94b273fd9c8e66afe06998286976e71646557432801c0561729c80a2e6f0f1074f5c9bfa6e2b3bec684da2ec70c3493b9735655cea8a5a4d139b79ca0c5c9d6581b6e1b220f993f5b4522dcee9966b2be7cbf265ad2a6a36a199a5d6db6d2b87536804b384aa44f4760fcff2ad9f0c02a1c2a361f0eefdf6b08b7f13e24d8dd6e389ca3c34ef5819fdc319e9d9ba71d3875202", @typed={0x18, 0x24, @binary="2bf8d4a0d31da0ed69f6442acc1c4c003b55b6"}]}, @nested={0x150, 0x17, [@typed={0x8, 0x4f, @uid=r4}, @typed={0xc, 0x22, @u64=0x14}, @generic="c5df5c9c359150bccb5724e23397d140a63ebc3c8efac760b57c938acc92b6a8bb3da06b59439b5da30f89344073b32c529b2f971ff6080cedcb03668ba031b65f23836d22256ef1173ac475a07ef58d7752", @generic="d3d84d5782bf20139289b3254f53671f24cca05c51d42541705db4709e4dcd4fd3051e2e1a8156ef3156914f01a500cb13f038570656b28b62efc0ea33400de18867b8f8e27fd733d44f39d32a24d42bafc434635615664b0990857fcdb741f98e99a3032943cc9dd071450243008333dac9680a23b3ba84b5e1395e524645440ddaba6e625b43d310873fb0eaf6dd087f5ea867fc60fc76a962bde44f0c006d76ad9c434643e3195565260f0a694f7b8c39781f2f5a5a3b3310f62374d945d353d86bffb9a21f2933f1e8eee765b19cbba86bf57eafeb441fa97a8666e2693c8cc7c2e63f"]}]}, 0x3a0}, 0x1, 0x0, 0x0, 0x90}, 0x24004800) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f00000022c0)=0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000002300)={0x0, 0x5}, &(0x7f0000002340)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002380)=@assoc_id=r7, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000023c0), &(0x7f0000002400)=0xc) socket$inet_smc(0x2b, 0x1, 0x0) getpeername$netlink(r0, &(0x7f0000002440), &(0x7f0000002480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000024c0)={'vcan0\x00', r3}) lgetxattr(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)=@known='trusted.syz\x00', &(0x7f0000002580)=""/4096, 0x1000) r8 = msgget(0x1, 0x100) msgctl$MSG_STAT(r8, 0xb, &(0x7f0000003580)=""/4096) 20:59:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0xa0e89a30bd5e8191, 0x734d996c) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x4, [0x40, 0x2, 0x8, 0x5, 0x7, 0x3ff, 0x40, 0x9, 0x0, 0xffffffff80000001, 0x3, 0x40, 0x949f, 0x1, 0x1, 0x7, 0x2, 0x3, 0x1, 0x7, 0x4, 0x0, 0x10001, 0x80000000, 0x6, 0x4, 0x9, 0x57, 0x460, 0x1, 0x1ff, 0x7, 0x81, 0x9, 0x3, 0x101, 0x1, 0x7fffffff, 0x8, 0x0, 0x7ff, 0x8, 0x1, 0x3, 0x7, 0x40, 0x0, 0x2], 0xf}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x800, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)=0x2, 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x97b6) ioctl$int_in(r0, 0x0, &(0x7f00000001c0)=0x7) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000200)="4fd2cc7468e417009d0635a97153cc94e9dd8184b349385f0453ce62c0e10710173c5f9d546d3245ce61d8859fda70ec6aa5cc6004d8e2ce8487260278524160741dcfc914d2c0eff199df5976d7c3edb74b9a1094de97315f90f506103a269a81186febcf7e3902920851fcd336801cae12d525f456a810c6c480a32f3fb4e63d98a4c2e1cbaf8fd16c848ec0af1cf42109a45a65f9183809f03eb4b4eed2651a52964043577d8f6b9dce0202cc9b49c18a4fd08efeeefc7b3f331a364982693ff6d87314d0c75fcbc03003200834d50d9a07c63edcc8b63440b9fa26cff8d3", 0xe0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast2, @empty}, &(0x7f0000000340)=0xc) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000380)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000003c0)={{0x5, 0xfd24, 0x8, 0x8, 0x7, 0x8}, 0x2, 0x2, 0x10001, 0x3ff, 0x7, "02d167d0a9dba04b2b72c7624bce2ad20f68e2b17a6af48651f3c7b2d25679c18a1f1271c0759a17346b5ec7ec5ceddbf0c4e9d0d80e598fecebc1b7366348a1cfda37e7741fa1b4fe943636b61c848ae7570e7bd511ea961922811598202cd29d50375530b97297bb09b9f80321b30ea0d9f04a88eed869e125da2bea04c4f8"}) getpeername$inet(r1, &(0x7f0000000480)={0x2, 0x0, @dev}, &(0x7f00000004c0)=0x10) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000500)) write$FUSE_GETXATTR(r0, &(0x7f0000000540)={0x18, 0x0, 0x7, {0x80000001}}, 0x18) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x2) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$VT_DISALLOCATE(r0, 0x5608) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000600)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000640)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000840)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)={0xcc, r3, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffff801}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x69}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1b}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0xcc}}, 0x1) r4 = syz_open_dev$binder(&(0x7f0000000880)='/dev/binder#\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000008c0)={'filter\x00', 0xae, "fe145bdaa822f26035586c126b742e2b27be3a4415ebe85bcab687c6e2e962b495798e432697eff39cf3812c198ed7f6e668b49fa5b07df6dbe3421dae94e1e42c5013fe8d3ebe2651602cd069fe71102588e722126fe76adbb54595fae239cf5fad45e2e7303b4a176b7848d527d7d451805f56c630b3e6ebc3bbf56a8cedd195cdfc08753093d70e203609c7dff0c98c04bb522a568e2a491cbdf1116ca7407b22640793f6068da5f855f189f0"}, &(0x7f00000009c0)=0xd2) r5 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000a00)={r5}) write$cgroup_subtree(r0, &(0x7f0000000a40)={[{0x2f, 'pids'}, {0x2f, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'rdma'}, {0x2d, 'io'}, {0x2b, 'pids'}]}, 0x21) getpeername$inet(r1, &(0x7f0000000a80)={0x2, 0x0, @remote}, &(0x7f0000000ac0)=0x10) sendfile(r2, r4, &(0x7f0000000b00), 0x7) 20:59:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$l2tp(0x18, 0x1, 0x1) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="678e10bce23934fed221af0bc98eabcc9416402d2ee48f476b7d86ac5ba11eb19d41b01227b981082e1901e3d6ddfe8ed9fd0e15d76ade1f156e150775f79880aa48683906682f71fff16747f3de46b59c29cce363300f7ee9d3087a8719b797ea36f0f6bd6e0eea31b6e23236a13e80eea4345ca41eb66aa1c5560d9f7ed56f220d2a4046263762eede549295723fc0fb086f819c594e0b396c63fbac110c0881128d8b6e804d31e2b0c7fb48fb858289603cd2d62819e87dcecb79b14e3ef6bd639bcad321fa"], 0xc7}}, 0x0) 20:59:43 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x280000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, 0x0, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='security.capability\x00', 0x0, 0x0) 20:59:43 executing program 1: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0xc, 0x0, &(0x7f0000000200)=[@free_buffer], 0x0, 0x0, 0x0}) 20:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x100, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) dup2(r1, r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000140)={r1, r0}) [ 214.240185] binder: 7433:7440 BC_FREE_BUFFER u0000000000000000 no match 20:59:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0x404c534a, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 214.295885] binder: 7433:7444 BC_FREE_BUFFER u0000000000000000 no match 20:59:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000240)={0x8, 0xffffffffffffffe1, 0x8}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000100)) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r1) syz_open_dev$sg(0x0, 0x0, 0x0) 20:59:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x2e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x471650fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x3, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49794de18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3ec4d2e8d443c82fc3435bed4de5d69409a781c863e0fd8a6f868925be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a441a2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0cf816930de3675d34117a44eb0e4f832936da44e63e1160af1acf45db1cdf4bcbbede795db798c61db61e23f") perf_event_open(&(0x7f0000000900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7, 0x13, 0x0, 0x19, "5cf38c4ef9fac40b12e929f60bb44352a069fba311f7a7a36d69f86514030d25d4849307f065cb6a4cfea273ce8a042cf246aa7b0e4196b6f88917c5a3bff22e", "976ed856423d212f0d59075a8cf912954eb8513a832f6b2a8f5fcc5d23fae85c", [0x8, 0x1]}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)={0x29, 0x6, 0x0, {0x3, 0x6}}, 0x29) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"6e72300100", 0x2101}) 20:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") [ 214.764072] IPVS: ftp: loaded support on port[0] = 21 [ 214.767285] ¹á6›Íaï~IyMá‡ì: renamed from nr0 [ 214.802490] IPVS: ftp: loaded support on port[0] = 21 [ 216.234255] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.240739] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.248786] device bridge_slave_0 entered promiscuous mode [ 216.283336] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.289808] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.297841] device bridge_slave_0 entered promiscuous mode [ 216.324351] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.330862] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.339110] device bridge_slave_1 entered promiscuous mode [ 216.372620] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.379101] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.387291] device bridge_slave_1 entered promiscuous mode [ 216.408912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.462318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.478892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.536414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.700680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.763814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.779513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.842017] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.989129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.003989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.139150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.147895] team0: Port device team_slave_0 added [ 217.219024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.227346] team0: Port device team_slave_1 added [ 217.239996] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.248468] team0: Port device team_slave_0 added [ 217.298017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.324653] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.333005] team0: Port device team_slave_1 added [ 217.372707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.408319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.447275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.454900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.463754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.482539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.537253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.544928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.553884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.568291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.576530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.585378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.659005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.666559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.675494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.343660] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.350200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.357292] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.363797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.371451] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.515342] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.521907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.528928] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.535522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.544005] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.982251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.990011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.180545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.401952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.438040] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.667259] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.704848] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.711119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.719135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.937783] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.944164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.951999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.976780] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.213432] 8021q: adding VLAN 0 to HW filter on device team0 20:59:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000000003030000000000000000000000000000000000001000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 20:59:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:53 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000000, 0x40030, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2007fe, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x90800, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1) shmget(0x2, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 20:59:53 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0xa}}}}}, 0x0) 20:59:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000240)={0x8, 0xffffffffffffffe1, 0x8}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000100)) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r1) syz_open_dev$sg(0x0, 0x0, 0x0) 20:59:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000240)={0x8, 0xffffffffffffffe1, 0x8}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000100)) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r1) syz_open_dev$sg(0x0, 0x0, 0x0) 20:59:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4000, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x2e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49794de18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3ec4d2e8d443c82fc3435bed4de5d69409a781c863e0fd8a6f868925be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a441a2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0cf816930de3675d34117a44eb0e4f832936da44e63e1160af1acf45db1cdf4bcbbede795db798c61db61e23f") perf_event_open(&(0x7f0000000900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)={0x29, 0x6, 0x0, {0x3, 0x6}}, 0x29) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={"6e72300100", 0x2101}) 20:59:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) [ 224.156556] ¹á6›Íaï~IyMá‡ì: renamed from nr0 20:59:53 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000000, 0x40030, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2007fe, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x90800, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$apparmor_exec(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="737461636b200003d0edd45dff21b489e13dbe4ad243188c1e86c40eb7f391ad09d6e87ecbdbf8a1455c434d1d56ee66018f8b462f8ac0d8b349f2c085eac71daa54926ae39ca6338260a39f0f8d60b2b3e2432dbf5ed08eb27d7dce50e7423815d5f5436d44c137eca6e88d409b6c508d79d1f01116bb16ca6f9c4c3a8b46da56810d3bf2ae7a8b916b8f826e9e916b1e2780036bfce6fb1c388f2947e73aa73e8e1349af0e30d64eca4376561ca3f6087baeca9dfddbc840f39b0ba941af1e2dd6bbf9ccbe9f469a34b5b601a44ba6b0a4913c6944fd1b7aa6f59a2a4a1e34ba7be95eacc2e47d365fa02e94c87006597934a9e9196ef060569c8d7037740ab6be14c9e2a32c"], 0x1) shmget(0x2, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 20:59:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x84) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="ba0200000000000000e99f7b01adc2f2", 0x10}], 0x1}, 0x0) 20:59:53 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$inet(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000540)) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket(0x0, 0x803, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) sendfile(r3, r2, 0x0, 0x10001) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000040)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f0000000080)=[@in6]}, &(0x7f0000000180)=0x10) 20:59:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$TIOCCONS(r1, 0x541d) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:53 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4a23, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f00000002c0)=@nl=@proc, 0x80, 0x0}, 0x2000) 20:59:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000240)={0x8, 0xffffffffffffffe1, 0x8}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000100)) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r1) syz_open_dev$sg(0x0, 0x0, 0x0) 20:59:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) 20:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_SET_PIT2(r1, 0x8070ae9f, &(0x7f0000000000)) 20:59:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:54 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x7fff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 224.984925] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 20:59:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:59:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:54 executing program 0: 20:59:54 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x181001) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) writev(r0, &(0x7f0000000180), 0x1d7) 20:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x69) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:59:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:59:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x8}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) 20:59:54 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getegid() recvmsg(0xffffffffffffffff, 0x0, 0x0) 20:59:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', 0xffffffffffffffff}, 0x30) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40030, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200800, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_timeout(0xf, r0, 0x4) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 225.738363] kvm: emulating exchange as write 20:59:54 executing program 0: 20:59:54 executing program 5: 20:59:54 executing program 4: 20:59:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:55 executing program 0: 20:59:55 executing program 5: 20:59:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x69) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:59:55 executing program 4: 20:59:55 executing program 1: 20:59:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:55 executing program 5: 20:59:55 executing program 0: 20:59:55 executing program 4: 20:59:55 executing program 1: 20:59:55 executing program 0: 20:59:55 executing program 5: 20:59:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x69) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:59:56 executing program 1: 20:59:56 executing program 5: 20:59:56 executing program 4: 20:59:56 executing program 0: 20:59:56 executing program 1: 20:59:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:56 executing program 5: 20:59:56 executing program 0: 20:59:56 executing program 4: 20:59:56 executing program 1: 20:59:56 executing program 5: 20:59:56 executing program 3: 20:59:56 executing program 0: 20:59:56 executing program 1: 20:59:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:56 executing program 4: 20:59:56 executing program 5: 20:59:56 executing program 3: 20:59:56 executing program 0: 20:59:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:56 executing program 4: 20:59:56 executing program 1: 20:59:56 executing program 5: 20:59:57 executing program 3: 20:59:57 executing program 4: 20:59:57 executing program 0: 20:59:57 executing program 2: seccomp(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, 0x0) getpeername(r0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000600)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0xfffffffffffffe4a) close(r0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000005c0)={0x7, 0xff, 0x6, 0x203}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r2}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x11}, 0x7f}}}, &(0x7f0000000640)=0x84) 20:59:57 executing program 1: getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0x10005}, 0x2c) close(r0) 20:59:57 executing program 4: 20:59:57 executing program 3: 20:59:57 executing program 2: seccomp(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:57 executing program 0: 20:59:57 executing program 4: 20:59:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:59:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0x28, 0x2) 20:59:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000002c0)='logon\x00', 0x0, 0x0, 0xfffffffffffffff8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x20141042, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0xfffffffffffffffc) keyctl$get_security(0x11, r3, &(0x7f0000000180)=""/17, 0x11) read(r0, &(0x7f0000001900)=""/4096, 0x398) ftruncate(r2, 0x90080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 20:59:57 executing program 2: seccomp(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:57 executing program 3: pipe2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) write$FUSE_ENTRY(r3, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}}}, 0x90) 20:59:57 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, 0x0) getpeername(r0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000600)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0xfffffffffffffe4a) close(r0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000005c0)={0x7, 0xff, 0x6, 0x203}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r2}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x11}, 0x7f}}}, &(0x7f0000000640)=0x84) 20:59:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, 0x0}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:57 executing program 0: ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x330b, 0x0) 20:59:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, 0x0) getpeername(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @local}, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000580), 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000280)=""/238) r1 = socket$inet(0x2, 0x0, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000600)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0xfffffffffffffe4a) close(r0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000005c0)={0x7, 0xff, 0x6, 0x203}) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x80000002, 0x20080) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r2}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x11}, 0x7f}}}, &(0x7f0000000640)=0x84) 20:59:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, 0x0}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195}, 0xfffffee2) 20:59:58 executing program 3: r0 = socket(0x11, 0x2, 0x9) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, [0x2800000000000000, 0x8001, 0x0, 0x401]}) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x1}, 0x4010) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x7f, 0x100000000, 0x8, 0x2, r1, 0x100000000}, 0x2c) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mbind(&(0x7f00008be000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000140)=0xa3, 0x8, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) 20:59:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0xc01, &(0x7f0000000480)=0x0) io_submit(r2, 0x1, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xd0af0800000000}]) 20:59:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:59:58 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195}, 0xfffffee2) 20:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, 0x0}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, 0x0) getpeername(r0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000600)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0xfffffffffffffe4a) close(r0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000005c0)={0x7, 0xff, 0x6, 0x203}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r2}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x11}, 0x7f}}}, &(0x7f0000000640)=0x84) 20:59:58 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, 0x0) getpeername(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @local}, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000580), 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000280)=""/238) r1 = socket$inet(0x2, 0x0, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000600)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0xfffffffffffffe4a) close(r0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x80000002, 0x20080) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@loopback, r2}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000640)) 20:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:58 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="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", 0xf00}], 0x1, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000001200)="9e", 0x1}], 0x1, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000ac0), 0x0, &(0x7f0000001300)=[@fadd={0x58, 0x114, 0x6, {{0x7ff}, 0x0, &(0x7f00000012c0), 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x58, 0x80}, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x80040) bind$alg(0xffffffffffffffff, 0x0, 0xfffffffffffffce7) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) 20:59:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000100)=@routing, 0x8) r2 = dup2(r1, r0) setsockopt$inet6_opts(r2, 0x29, 0x39, 0x0, 0x0) 20:59:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:59:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0b29abb05e", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfffffe9b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000bc0)=""/93, 0xfffffe0a) 20:59:58 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195, 0x0, 0x0, {0x1fc}}, 0xfffffee2) 20:59:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:59:59 executing program 0: mknod(&(0x7f0000000140)='./bus\x00', 0x8022, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x5}], 0x1, 0x0) 20:59:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000040)) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) r2 = dup3(r1, r0, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000001080)=""/4096) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local, {[@lsrr={0x83, 0x7, 0x0, [@remote={0xac, 0x223}]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0x19, 0x6, 0x10000}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f00000002c0)={0x0, 0x0, 0x3, &(0x7f0000000280)=0x20}) exit(0x4000000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x4, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) write$P9_RREADDIR(r2, &(0x7f0000000300)={0x122, 0x29, 0x2, {0x3f, [{{0x43, 0x2}, 0x9, 0x2, 0x7, './file0'}, {{0x64, 0x4}, 0xd9e, 0x5, 0x7, './file0'}, {{0x88, 0x0, 0x4}, 0x1, 0x1, 0x7, './file0'}, {{0x22, 0x1, 0x4}, 0x10001, 0x1ff, 0x7, './file0'}, {{0x1, 0x3, 0x3}, 0x7, 0x3, 0x7, './file0'}, {{0x80, 0x0, 0x3}, 0x5e, 0x96, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0x80, 0x9, 0x7, './file0'}, {{0x8, 0x0, 0x8}, 0x8, 0x4, 0x7, './file0'}, {{0x0, 0x4}, 0x1, 0x40, 0x7, './file0'}]}}, 0x122) 20:59:59 executing program 4: r0 = socket(0x11, 0x2, 0x9) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) shutdown(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x7f, 0x0, 0x8}, 0x2c) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={"6c6f0040fdfdffff00", 0x101}) 20:59:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:59 executing program 5: 20:59:59 executing program 3: [ 230.334985] device lo entered promiscuous mode 20:59:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 230.424532] device lo left promiscuous mode 20:59:59 executing program 0: [ 230.475469] device lo entered promiscuous mode 20:59:59 executing program 5: 20:59:59 executing program 3: 20:59:59 executing program 4: 20:59:59 executing program 0: 20:59:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 20:59:59 executing program 5: 20:59:59 executing program 3: 20:59:59 executing program 4: 20:59:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:00 executing program 0: 21:00:00 executing program 5: 21:00:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 21:00:00 executing program 3: 21:00:00 executing program 0: 21:00:00 executing program 4: 21:00:00 executing program 3: 21:00:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 21:00:00 executing program 5: 21:00:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:00 executing program 0: 21:00:00 executing program 4: 21:00:00 executing program 3: 21:00:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 21:00:00 executing program 3: 21:00:00 executing program 5: 21:00:00 executing program 0: [ 231.598289] kauditd_printk_skb: 3 callbacks suppressed [ 231.598314] audit: type=1326 audit(1544734800.648:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8482 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 21:00:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:00 executing program 4: 21:00:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_execute_func(&(0x7f0000000100)="0faef24029450ff3440f1157f1916a3e6509094d85d04e92d9f4c4610dc2900400000089d06323660ff7c6") 21:00:00 executing program 3: 21:00:00 executing program 0: 21:00:01 executing program 4: 21:00:01 executing program 3: [ 231.936579] audit: type=1326 audit(1544734800.988:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8499 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 21:00:01 executing program 5: 21:00:01 executing program 0: 21:00:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(0x0) 21:00:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:01 executing program 3: 21:00:01 executing program 4: 21:00:01 executing program 5: 21:00:01 executing program 0: 21:00:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:01 executing program 4: 21:00:01 executing program 0: 21:00:01 executing program 3: 21:00:01 executing program 5: 21:00:01 executing program 0: 21:00:02 executing program 0: 21:00:02 executing program 4: 21:00:02 executing program 3: 21:00:02 executing program 5: 21:00:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:02 executing program 2: 21:00:02 executing program 4: 21:00:02 executing program 0: 21:00:02 executing program 5: 21:00:02 executing program 3: 21:00:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:02 executing program 3: 21:00:02 executing program 5: 21:00:02 executing program 2: 21:00:02 executing program 4: 21:00:02 executing program 0: 21:00:02 executing program 4: 21:00:02 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xa, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:00:02 executing program 5: 21:00:02 executing program 2: 21:00:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:02 executing program 0: 21:00:02 executing program 4: 21:00:02 executing program 3: 21:00:03 executing program 0: 21:00:03 executing program 5: 21:00:03 executing program 2: 21:00:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:03 executing program 4: 21:00:03 executing program 0: 21:00:03 executing program 3: 21:00:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 21:00:03 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195, 0x0, 0x6}, 0xfffffee2) [ 234.397924] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:00:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x28, 0x13, 0x129, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 234.489581] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:00:03 executing program 4: r0 = socket(0x11, 0x2, 0x9) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mbind(&(0x7f00008be000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x8, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x402002, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={"6c6f0040fdfdffff00", 0x101}) 21:00:03 executing program 3: 21:00:03 executing program 2: unshare(0x24020400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) [ 234.673737] device lo left promiscuous mode 21:00:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 234.718789] device lo entered promiscuous mode [ 234.773926] device lo left promiscuous mode 21:00:03 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x195, 0x0, 0x0, {0x1fc}}, 0xfffffee2) 21:00:03 executing program 5: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xffffff7f}, 0x80, 0x0}, 0x0) [ 234.794290] device lo entered promiscuous mode 21:00:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40080) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0xffffffff, 0x4, 0xfff, 'queue0\x00', 0xc9ed}) getpid() socket$inet6(0xa, 0x3, 0x6) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000900)) alarm(0x10000) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x4) mq_timedsend(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d2187000, 0x1000000}], 0xc0b11f2000000000) 21:00:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1b, &(0x7f0000000040), 0x4) 21:00:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0500020000000101000458b4ca0b"], 0x1, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002680)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000000)=0xfffffffffffffff7) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x81cd}, {0x80000001}}) clone(0x7ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000001200)=0x4, 0x4) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) 21:00:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000340)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0x398) ftruncate(r3, 0x90080) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 21:00:04 executing program 4: r0 = socket$kcm(0x2, 0x1000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000000)="01", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000002200)={&(0x7f0000001f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, 0x0}, 0x0) 21:00:04 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000040)) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f00000002c0)={0x0, 0x0, 0x3, &(0x7f0000000280)=0x20}) exit(0x4000000) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x122, 0x29, 0x2, {0x3f, [{{0x43, 0x2}, 0x9, 0x2, 0x7, './file0'}, {{0x64, 0x4}, 0xd9e, 0x5, 0x7, './file0'}, {{0x88, 0x0, 0x4}, 0x1, 0x1, 0x7, './file0'}, {{0x22, 0x1, 0x4}, 0x10001, 0x1ff, 0x7, './file0'}, {{0x1, 0x3, 0x3}, 0x7, 0x3, 0x7, './file0'}, {{0x80, 0x0, 0x3}, 0x5e, 0x96, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0x80, 0x9, 0x7, './file0'}, {{0x8, 0x0, 0x8}, 0x8, 0x4, 0x7, './file0'}, {{0x0, 0x4}, 0x1, 0x40, 0x7, './file0'}]}}, 0x122) 21:00:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000cd0001ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) 21:00:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:04 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000000c0)={0x19, 0x6, 0x10000}) exit(0x4000000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x4, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x122, 0x29, 0x2, {0x3f, [{{0x43, 0x2}, 0x9, 0x2, 0x7, './file0'}, {{0x64, 0x4}, 0xd9e, 0x5, 0x7, './file0'}, {{0x88, 0x0, 0x4}, 0x1, 0x1, 0x7, './file0'}, {{0x22, 0x1, 0x4}, 0x10001, 0x1ff, 0x7, './file0'}, {{0x1, 0x3, 0x3}, 0x7, 0x3, 0x7, './file0'}, {{0x80, 0x0, 0x3}, 0x5e, 0x96, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0x80, 0x9, 0x7, './file0'}, {{0x8, 0x0, 0x8}, 0x8, 0x4, 0x7, './file0'}, {{0x0, 0x4}, 0x1, 0x40, 0x7, './file0'}]}}, 0x122) 21:00:04 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x3, 0x0, 0x0, [], 0x0}) 21:00:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_vif\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x1be, 0x37) 21:00:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 21:00:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x100000000000a, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000002c0)) 21:00:05 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x3, 0x2800) 21:00:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x69, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x8000000009, 0x0, &(0x7f0000000000)) 21:00:05 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc4c85512, &(0x7f0000000400)={0x78, 0x0, 0x0, 0x0, 0x0}) 21:00:05 executing program 5: r0 = memfd_create(&(0x7f0000000340)='vboxnet0@wlan0\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) exit_group(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000280)='y\x00', 0x2, 0x1) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 21:00:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) 21:00:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='smaps_rollup\x00') ioctl$TCXONC(r0, 0x40087101, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000100)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00', 0x8, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x80000001, 0x5, 0x1, 0x7, 0x0, 0x6}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @local, @local}, &(0x7f00000002c0)=0xc) 21:00:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x800000800000004) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0x184, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@typed]}, 0xff9d}}, 0x0) 21:00:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00), 0x93}, 0x0) 21:00:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="720af8ff40000000bfa100000000000007010000f8ffffffb702000000000000bf13000000000000850000002d000000b7000000000000009500000000000000"], 0x0}, 0x48) 21:00:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r0, 0x0, 0xd, &(0x7f0000000300)='rdma.current\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x81, 0x200, 0x3, 0x3, 0x0, 0x4, 0x2, 0x3, 0x3, 0x7fff, 0xf21f, 0x4, 0x8000, 0x85, 0xffff, 0xba4d, 0x0, 0x20, 0x101, 0xfff, 0x5, 0x1, 0x0, 0x9ff1, 0x0, 0x3f, 0x401, 0xd4, 0x249, 0x1, 0x0, 0x4, 0x6, 0x6, 0x0, 0x4b, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x80, 0x80}, 0x0, 0xd, 0x0, 0x2, 0x3, 0x6, 0x4}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x0, 0x5933, 0x0, 0x0, 0x0, 0x5, 0x20000, 0x0, 0xf37, 0x400000000000a15c, 0xbe14, 0x7, 0x3f, 0xb2e5, 0x5, 0x9, 0x9, 0x4, 0x9, 0x0, 0xffffffffffffffc0, 0xb834, 0x0, 0x45, 0x6, 0x2, 0x7, 0x5, 0x6, 0x100000001, 0x0, 0x0, 0x8, 0x0, 0x2, 0xff, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000240)}, 0x0, 0x3, 0x9, 0x5, 0x100000001, 0xb04, 0xe1ec}, r1, 0x0, r0, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x44, 0x5}, @ldst={0x2, 0x0, 0x6, 0xa, 0xb, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r0}, @generic={0x8, 0x401, 0x3f, 0x3f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}]}, &(0x7f0000000480)='GPL\x00', 0x3, 0xbb, &(0x7f0000000780)=""/187, 0x41000, 0x1, [], 0x0, 0xc}, 0x48) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000600)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(r0, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r4, 0x0, 0xc, &(0x7f0000000040)='[cgroup{}lo\x00'}, 0x30) write$cgroup_pid(r0, 0x0, 0x0) r5 = getpid() bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={r3, 0x1, 0x1, 0x7ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) openat$cgroup_type(r3, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xd00, 0x5000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000002c0)=')$\x00') 21:00:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 21:00:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:05 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') fstat(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0xa198) 21:00:06 executing program 2: wait4(0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) tkill(0x0, 0x0) r0 = socket(0x10, 0x80803, 0x0) write(r0, &(0x7f0000000040)="240000001a0025f00485bc04fef7001d0a0b49ffed000000800028000800030001000000", 0x24) 21:00:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 21:00:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0500"], 0x1, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000000)=0xfffffffffffffff7) clone(0x7ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) 21:00:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) 21:00:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)) clone(0x7ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) 21:00:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f00000069c0)=[{&(0x7f00000068c0)="ba6e1a98562eddff068ffd685d88afe79d90c04cc6c4e6b04e5b276cb200ee1594319fdb86613b88d39fbe330f899916b81e2fd27d8cbabf34a7b602ac84b2f29c8f1c0e63a653656570fcd156b55f88d78d930ab6ec7277c68fef8787e5e1103112ca5b9b00fe7fbeb1e3713fc494fd44084ac9c9dec23b1260fdb900d3dc96d72b36d7a0f6307f03646d0b6e1b489d034b68bb6e46276aa6e177116e0310c535a7bf3f702f39183120eddd61eac6732f65f05f2a2eeffd4c84313cdf21b102eb5dbaf8c05f0bbc84", 0xc9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) 21:00:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setxattr$security_ima(0x0, &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0500020000000101000458b4ca0b"], 0x1, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002680)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)={{0x81cd, 0x9}, {0x80000001}}) clone(0x7ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) 21:00:06 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:06 executing program 5: r0 = socket(0x200000000000011, 0x802, 0x4001000dd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="c0", 0x1}], 0x1) 21:00:06 executing program 0: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 21:00:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x101, 0x676) sendto$inet6(r0, &(0x7f0000000240)="040400000700000000000000fff55b4202938207d9fb3780398d537500000000792930d5c01843e06590880053c0e385472da7222a2bb42fc1b494c3b50035060f118d0000f55d992600009b0000085f17be53bb8180046afd77fc7a3db9845ad8acb1bb", 0x64, 0x0, 0x0, 0x0) 21:00:06 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 21:00:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000580)=""/245, 0xf5}, {&(0x7f0000000380)=""/92, 0x14f}, {&(0x7f0000000680)=""/176, 0x20000730}, {&(0x7f0000000740)=""/76, 0x4c}, {&(0x7f00000007c0)=""/112, 0x70}], 0x5, &(0x7f0000000980)=[{&(0x7f0000000400)}, {&(0x7f0000000480)=""/222, 0xfd40}, {&(0x7f0000000940)=""/18, 0x12}], 0x14b, 0x0) [ 237.922275] ================================================================== [ 237.929723] BUG: KMSAN: uninit-value in check_6rd+0x65a/0x710 [ 237.935621] CPU: 0 PID: 8802 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #1 [ 237.942719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.952066] Call Trace: [ 237.954653] dump_stack+0x1c9/0x220 [ 237.958289] kmsan_report+0x12d/0x290 [ 237.962099] __msan_warning+0x76/0xc0 [ 237.965914] check_6rd+0x65a/0x710 [ 237.969561] sit_tunnel_xmit+0xb58/0x34d0 [ 237.973720] ? dev_hard_start_xmit+0xb3/0xc80 [ 237.978203] ? ipip6_tunnel_uninit+0x800/0x800 [ 237.982779] dev_hard_start_xmit+0x627/0xc80 [ 237.987195] __dev_queue_xmit+0x3173/0x3cf0 [ 237.991526] dev_queue_xmit+0x4b/0x60 [ 237.995325] ? __netdev_pick_tx+0x1290/0x1290 [ 237.999820] packet_sendmsg+0x7cbd/0x9200 [ 238.003970] ? kmsan_memcpy_metadata+0xb/0x10 [ 238.008480] ? __msan_memcpy+0x61/0x70 [ 238.012373] ? do_iter_readv_writev+0x822/0xac0 [ 238.017032] ? __se_sys_writev+0x9b/0xb0 [ 238.021085] ? do_syscall_64+0xcd/0x110 [ 238.025065] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.030425] ? balance_callback+0x48/0x260 [ 238.034677] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 238.040125] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.045480] ? aa_sk_perm+0x7ab/0x9e0 [ 238.049302] ? compat_packet_setsockopt+0x360/0x360 [ 238.054308] sock_write_iter+0x3f4/0x4f0 [ 238.058365] ? sock_read_iter+0x4e0/0x4e0 [ 238.062503] do_iter_readv_writev+0x822/0xac0 [ 238.067002] ? sock_read_iter+0x4e0/0x4e0 [ 238.071138] do_iter_write+0x302/0xd80 [ 238.075018] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 238.080485] ? import_iovec+0x41f/0x680 [ 238.084465] do_writev+0x397/0x860 [ 238.088012] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 238.093462] ? prepare_exit_to_usermode+0x137/0x460 [ 238.098478] ? syscall_return_slowpath+0x50/0x680 [ 238.103448] __se_sys_writev+0x9b/0xb0 [ 238.107339] __x64_sys_writev+0x4a/0x70 [ 238.111300] do_syscall_64+0xcd/0x110 [ 238.115108] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.120291] RIP: 0033:0x457679 [ 238.123485] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.142380] RSP: 002b:00007f54824e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 238.150192] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 238.157555] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000004 [ 238.164813] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 238.172089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f54824e26d4 [ 238.179453] R13: 00000000004c3a08 R14: 00000000004dae58 R15: 00000000ffffffff [ 238.186732] [ 238.188358] Uninit was created at: [ 238.191894] kmsan_internal_poison_shadow+0x92/0x150 [ 238.197018] kmsan_kmalloc+0xa1/0x100 [ 238.200806] kmsan_slab_alloc+0xe/0x10 [ 238.204682] __kmalloc_node_track_caller+0xf06/0x1120 [ 238.209860] __alloc_skb+0x318/0xa40 [ 238.213561] alloc_skb_with_frags+0x1c9/0xa80 [ 238.218043] sock_alloc_send_pskb+0xb5d/0x1140 [ 238.222615] packet_sendmsg+0x66a2/0x9200 [ 238.226747] sock_write_iter+0x3f4/0x4f0 [ 238.230829] do_iter_readv_writev+0x822/0xac0 [ 238.235322] do_iter_write+0x302/0xd80 [ 238.239202] do_writev+0x397/0x860 [ 238.242743] __se_sys_writev+0x9b/0xb0 [ 238.246636] __x64_sys_writev+0x4a/0x70 [ 238.250600] do_syscall_64+0xcd/0x110 [ 238.254394] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.259571] ================================================================== [ 238.266913] Disabling lock debugging due to kernel taint [ 238.272348] Kernel panic - not syncing: panic_on_warn set ... [ 238.278221] CPU: 0 PID: 8802 Comm: syz-executor5 Tainted: G B 4.20.0-rc5+ #1 [ 238.286695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.296050] Call Trace: [ 238.298631] dump_stack+0x1c9/0x220 [ 238.302252] panic+0x3f0/0x98f [ 238.305473] kmsan_report+0x290/0x290 [ 238.309268] __msan_warning+0x76/0xc0 [ 238.313086] check_6rd+0x65a/0x710 [ 238.316629] sit_tunnel_xmit+0xb58/0x34d0 [ 238.320794] ? dev_hard_start_xmit+0xb3/0xc80 [ 238.325282] ? ipip6_tunnel_uninit+0x800/0x800 [ 238.329853] dev_hard_start_xmit+0x627/0xc80 [ 238.334270] __dev_queue_xmit+0x3173/0x3cf0 [ 238.338614] dev_queue_xmit+0x4b/0x60 [ 238.342407] ? __netdev_pick_tx+0x1290/0x1290 [ 238.346913] packet_sendmsg+0x7cbd/0x9200 [ 238.351049] ? kmsan_memcpy_metadata+0xb/0x10 [ 238.355544] ? __msan_memcpy+0x61/0x70 [ 238.359448] ? do_iter_readv_writev+0x822/0xac0 [ 238.364106] ? __se_sys_writev+0x9b/0xb0 [ 238.368157] ? do_syscall_64+0xcd/0x110 [ 238.372124] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.377479] ? balance_callback+0x48/0x260 [ 238.381706] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 238.387594] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 238.392951] ? aa_sk_perm+0x7ab/0x9e0 [ 238.396774] ? compat_packet_setsockopt+0x360/0x360 [ 238.401781] sock_write_iter+0x3f4/0x4f0 [ 238.405847] ? sock_read_iter+0x4e0/0x4e0 [ 238.410073] do_iter_readv_writev+0x822/0xac0 [ 238.414585] ? sock_read_iter+0x4e0/0x4e0 [ 238.418721] do_iter_write+0x302/0xd80 [ 238.422594] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 238.428030] ? import_iovec+0x41f/0x680 [ 238.432005] do_writev+0x397/0x860 [ 238.435549] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 238.440988] ? prepare_exit_to_usermode+0x137/0x460 [ 238.445995] ? syscall_return_slowpath+0x50/0x680 [ 238.450830] __se_sys_writev+0x9b/0xb0 [ 238.454721] __x64_sys_writev+0x4a/0x70 [ 238.458687] do_syscall_64+0xcd/0x110 [ 238.462490] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 238.467662] RIP: 0033:0x457679 [ 238.470844] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.489731] RSP: 002b:00007f54824e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 238.497430] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 238.504862] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000004 [ 238.512121] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 238.519374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f54824e26d4 [ 238.526631] R13: 00000000004c3a08 R14: 00000000004dae58 R15: 00000000ffffffff [ 238.535052] Kernel Offset: disabled [ 238.538680] Rebooting in 86400 seconds..