[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.877700] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 55.426284] random: sshd: uninitialized urandom read (32 bytes read) [ 55.900898] random: sshd: uninitialized urandom read (32 bytes read) [ 57.711657] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.30' (ECDSA) to the list of known hosts. [ 63.488218] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/24 03:18:04 fuzzer started [ 65.103129] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/24 03:18:08 dialing manager at 10.128.0.26:37093 2018/09/24 03:18:08 syscalls: 1 2018/09/24 03:18:08 code coverage: enabled 2018/09/24 03:18:08 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/24 03:18:08 setuid sandbox: enabled 2018/09/24 03:18:08 namespace sandbox: enabled 2018/09/24 03:18:08 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/24 03:18:08 fault injection: enabled 2018/09/24 03:18:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/24 03:18:08 net packed injection: enabled 2018/09/24 03:18:08 net device setup: enabled [ 70.029915] random: crng init done 03:19:24 executing program 0: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x4000000, 0x0, 0x700000000000000, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x6af40b0000000000]}, @empty, @loopback, 0x3}) socket$inet6_udplite(0xa, 0x2, 0x88) 03:19:24 executing program 2: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000000840)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000780), &(0x7f0000000800)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffede) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffab6) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000940)=""/159) prctl$intptr(0x1e, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000002c0)) 03:19:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@mpls_delroute={0x1c, 0x19, 0x301, 0x0, 0x0, {0x1c, 0x14}}, 0x1c}}, 0x0) 03:19:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 03:19:24 executing program 3: eventfd2(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) unshare(0x40000000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0xde95295}, 0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)={{0xffffffffffffffff}, 0x4}) sync() socket(0x0, 0x0, 0x0) exit(0x0) chroot(&(0x7f0000000280)='./file0\x00') ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)) keyctl$dh_compute(0xe, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:19:24 executing program 4: clone(0x200, &(0x7f0000000040), &(0x7f0000000500), &(0x7f0000000380), &(0x7f0000000540)) mknod(&(0x7f0000000100)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000340), &(0x7f0000000300)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffbce) open$dir(&(0x7f0000000080)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000200)=""/159) prctl$intptr(0x1e, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) [ 145.262478] IPVS: ftp: loaded support on port[0] = 21 [ 145.283246] IPVS: ftp: loaded support on port[0] = 21 [ 145.293388] IPVS: ftp: loaded support on port[0] = 21 [ 145.369494] IPVS: ftp: loaded support on port[0] = 21 [ 145.393318] IPVS: ftp: loaded support on port[0] = 21 [ 145.426398] IPVS: ftp: loaded support on port[0] = 21 [ 149.003125] ip (4781) used greatest stack depth: 53720 bytes left [ 151.542463] ip (4855) used greatest stack depth: 53448 bytes left [ 151.921753] ip (4866) used greatest stack depth: 53192 bytes left [ 152.647497] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.654054] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.698069] device bridge_slave_0 entered promiscuous mode [ 152.789488] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.796063] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.841879] device bridge_slave_0 entered promiscuous mode [ 152.893998] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.900568] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.919133] device bridge_slave_0 entered promiscuous mode [ 152.928766] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.935310] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.951136] device bridge_slave_0 entered promiscuous mode [ 152.985967] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.992544] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.022694] device bridge_slave_0 entered promiscuous mode [ 153.162484] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.169109] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.209324] device bridge_slave_1 entered promiscuous mode [ 153.256964] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.263543] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.309542] device bridge_slave_0 entered promiscuous mode [ 153.336934] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.343521] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.381777] device bridge_slave_1 entered promiscuous mode [ 153.401465] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.408028] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.430096] device bridge_slave_1 entered promiscuous mode [ 153.462083] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.468869] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.494502] device bridge_slave_1 entered promiscuous mode [ 153.515339] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.521933] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.557096] device bridge_slave_1 entered promiscuous mode [ 153.589428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.658378] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.664984] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.713841] device bridge_slave_1 entered promiscuous mode [ 153.773087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.861191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.950967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.008952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.043114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.110028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.237216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.261223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.386878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.473855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.589752] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 155.483451] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.498577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.555121] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.631246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.906122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.934563] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.003374] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.037243] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.052284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.072059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.359838] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.373841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.381002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.472169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.479296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.500222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.507293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.531388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.541116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.586392] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.703388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 156.710522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.785455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 156.792782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.962374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 156.969803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.001328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.008734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.066751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.073877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.093286] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 157.100497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.256941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.264065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.562377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.570155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.156515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.199088] team0: Port device team_slave_0 added [ 158.296386] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.322186] team0: Port device team_slave_0 added [ 158.408262] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.424424] team0: Port device team_slave_0 added [ 158.444075] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.492431] team0: Port device team_slave_0 added [ 158.589986] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.613784] team0: Port device team_slave_0 added [ 158.662093] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.686458] team0: Port device team_slave_1 added [ 158.717793] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.763232] team0: Port device team_slave_1 added [ 158.844231] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.865495] team0: Port device team_slave_1 added [ 158.922393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.946773] team0: Port device team_slave_1 added [ 158.971539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.998276] team0: Port device team_slave_0 added [ 159.056175] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.074887] team0: Port device team_slave_1 added [ 159.097312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.104458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.119499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.245036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.252182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.272151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.363890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.371090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.386568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.412166] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.446290] team0: Port device team_slave_1 added [ 159.475198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.482366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.494403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.543848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.553087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.572402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.621864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.631100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.663792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.734779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.741880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.760364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.833932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.841035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.857758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.932931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.940128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.955350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.013231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.020365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.040082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.071227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.078985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.100003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.137282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.146533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.154494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.176363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.218357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.239703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.331391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.339835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.356303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.461116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.468296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.484793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.514430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.522995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.541824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.620345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.628172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.646100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.700928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.710186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.725862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.766844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.774515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.803174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.876537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.884532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.903557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.943264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.951092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.970510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.020372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 161.028069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.044180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.165790] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 161.173742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.191147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.462382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 161.470459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.487810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.873477] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.880088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.887240] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.893863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.956535] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.968081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.007091] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.014211] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.021277] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.027858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.039768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.046784] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.053333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.060418] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.067002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.122480] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.139471] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.146075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.153233] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.159919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.209844] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.668157] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.674762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.681891] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.688446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.714740] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.986931] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.993507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.000569] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.007224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.058351] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 167.066340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.093979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.113207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.135399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.158415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.379275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.552382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.633568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.233954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.776904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.078072] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 186.101380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.255479] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 186.319727] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.054235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.411078] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.670764] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.677168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.698273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.803420] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.983885] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.990368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.002235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.117005] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.123454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.137177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.619700] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.626143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.639830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.249435] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.255905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.268348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.414498] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.514404] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.520872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.548302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.836539] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.910269] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.310457] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.992008] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.315210] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.554286] IPVS: ftp: loaded support on port[0] = 21 03:20:22 executing program 0: [ 201.259134] IPVS: ftp: loaded support on port[0] = 21 03:20:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:22 executing program 0: dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff2c9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) 03:20:23 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000003f40), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc05) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000200)=""/159) prctl$intptr(0x1e, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x0) [ 202.141767] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:23 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d5c6070") r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000220007031dfffd946f610504020000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa02e208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:20:23 executing program 5: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000180)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000680)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/11, 0xb) clone(0x3002001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x200000841, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) semtimedop(0x0, &(0x7f0000000280)=[{}], 0x14f, &(0x7f00000002c0)={0x77359400}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000540)=0x2c5) 03:20:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 202.752661] hrtimer: interrupt took 185634 ns [ 202.786423] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 202.869149] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:24 executing program 1: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc01) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) 03:20:24 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000002c0)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 03:20:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 203.412733] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:25 executing program 3: clone(0x8000000000000200, &(0x7f00000000c0), &(0x7f0000000900), &(0x7f0000000340), &(0x7f0000000640)) mknod(&(0x7f0000000140)='./file0\x00', 0x4000103e, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0), &(0x7f00000005c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffeb6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffff74c) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000640)=""/159) prctl$intptr(0x1e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') 03:20:25 executing program 0: clone(0x200, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000000840)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000780), &(0x7f0000000800)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffede) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffab6) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000940)=""/159) prctl$intptr(0x1e, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='team0\x00'}) 03:20:25 executing program 4: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000003f40), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc05) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000200)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)) 03:20:25 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000003f40), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc05) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x1e, 0x0) poll(&(0x7f0000000000), 0x0, 0xff) 03:20:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:25 executing program 1: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc01) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) [ 204.778094] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:26 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:20:26 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000240)=')', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) close(r1) 03:20:26 executing program 3: clone(0x200, &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000100), &(0x7f00000001c0)) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000780)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1000000001d, 0xfffffffffffff1cf) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000000)=""/159) prctl$intptr(0x1e, 0x0) sched_yield() 03:20:26 executing program 0: clone(0x200, &(0x7f0000000040), &(0x7f0000000500), &(0x7f0000000380), &(0x7f0000000540)) mknod(&(0x7f0000000100)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000340), &(0x7f0000000300)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffbce) open$dir(&(0x7f0000000080)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000200)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) 03:20:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000080, 0x0, 0x0, 0x20000188, 0x200001b8], 0x0, &(0x7f0000000040), &(0x7f0000000080)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) [ 205.930825] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:27 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 206.282897] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:27 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 206.368826] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:27 executing program 5: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), &(0x7f0000000280)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3e0) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000005c0)="3d3af023e93d41beb6bd3b42820827c8f532abc8ac2b22603c935bc47538ed92b4a5bc660515560e1eb22a9e370c01b8ebc5306d780354ea0e2267bda0345aa67ab095a96257733818d1bad51df76c95d235aa1c3e91b599466661e17b0748a983c6db25f905e933e012b58475e213c6aa2c97287b06be6c0f318695ce9b7d2f6c2e774c2fa2aff59eb9baeb9636a545f00e34792e3add6f88d304c1fe8fcf5b3630050ef56e450f47d1e19ba720b3362850fcc150fbf0b8e11b3055bb8a8ccb44c9060efc322a4b842979f23fd7cabafd641d7b73be4b01b702652841bb69a2b43438f421ab59e61bd5b463839c6654842efe72fef8a4536540d6c4e9a09c1b") [ 206.423677] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:27 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:27 executing program 1: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000002c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3e3) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000300)={'ip_vti0\x00', &(0x7f0000004700)=ANY=[]}) 03:20:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000240)=')', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) close(r1) [ 206.823825] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:28 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:28 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) clone(0x800100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000005c0)}, &(0x7f0000000600), &(0x7f0000000740)=""/133, 0x0, 0x0, 0x0, &(0x7f0000000680)}) [ 207.330506] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000240)=')', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) close(r1) [ 207.441989] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:20:28 executing program 5: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) rt_sigsuspend(&(0x7f0000000280), 0x8) 03:20:28 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = dup(r1) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$tun(r2, &(0x7f00000005c0)={@val, @void, @llc={@snap={0x0, 0x0, "ca", "09924d"}}}, 0xc) [ 207.940879] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:29 executing program 1: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000200), &(0x7f00000000c0)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000003f40), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc01) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x1e, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x0) 03:20:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000240)=')', 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) close(r1) 03:20:29 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) [ 208.578360] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:29 executing program 0: 03:20:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:29 executing program 4: 03:20:30 executing program 5: [ 209.155021] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:30 executing program 0: 03:20:30 executing program 4: 03:20:30 executing program 1: 03:20:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:30 executing program 0: 03:20:30 executing program 4: 03:20:30 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:30 executing program 5: [ 209.988540] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:31 executing program 1: 03:20:31 executing program 0: 03:20:31 executing program 4: 03:20:31 executing program 5: 03:20:31 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:31 executing program 1: 03:20:31 executing program 0: 03:20:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:31 executing program 4: [ 210.748092] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:32 executing program 5: 03:20:32 executing program 1: 03:20:32 executing program 4: 03:20:32 executing program 0: 03:20:32 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:32 executing program 1: 03:20:32 executing program 4: [ 211.561388] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:32 executing program 5: 03:20:32 executing program 0: 03:20:33 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:33 executing program 4: 03:20:33 executing program 1: [ 212.265805] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:33 executing program 0: 03:20:33 executing program 5: 03:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:33 executing program 1: 03:20:33 executing program 4: 03:20:33 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:33 executing program 0: 03:20:33 executing program 5: 03:20:34 executing program 4: 03:20:34 executing program 1: [ 212.987838] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:34 executing program 5: 03:20:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:34 executing program 0: 03:20:34 executing program 4: 03:20:34 executing program 1: [ 213.597030] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:34 executing program 5: 03:20:34 executing program 4: 03:20:34 executing program 0: 03:20:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:35 executing program 1: [ 214.298800] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:35 executing program 0: 03:20:35 executing program 4: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xbe4e5443) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) 03:20:35 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffede) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffab6) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/159) prctl$intptr(0x1e, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000001c0)) 03:20:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:35 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xf8, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 214.832866] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:35 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000000)=""/2, 0xffffffffffffffc5}, 0x0) 03:20:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) clone(0x800100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000005c0)}, &(0x7f0000000600), &(0x7f0000000740)=""/133, 0x0, 0x0, 0x0, &(0x7f0000000680)}) [ 215.328097] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:36 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0x0) 03:20:36 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffede) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffab6) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/159) prctl$intptr(0x1e, 0x0) ioctl$KDDISABIO(r0, 0x4b37) [ 215.795695] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:36 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:37 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000000)=""/2, 0xffffffffffffffc5}, 0x0) [ 216.170716] sg_write: process 315 (syz-executor4) changed security contexts after opening file descriptor, this is not allowed. [ 216.293037] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000800}, 0x8000) 03:20:37 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488d") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 216.823402] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:37 executing program 4: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488d") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:38 executing program 5: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000280)=""/152) [ 217.246967] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:38 executing program 0: socket(0x40000000015, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000000)=""/2, 0xffffffffffffffc5}, 0x0) 03:20:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488d") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:38 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 217.762139] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:39 executing program 4: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d76") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 218.317348] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20}, 0x20) 03:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d76") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:39 executing program 0: socket(0x40000000015, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000000)=""/2, 0xffffffffffffffc5}, 0x0) [ 218.847133] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:40 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:40 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc01) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)) 03:20:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20}, 0x20) 03:20:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d76") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:40 executing program 4: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) [ 219.571016] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20}, 0x20) 03:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d7660") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) [ 220.160944] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:41 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d7660") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20}, 0x20) [ 220.616529] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:41 executing program 4: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) 03:20:41 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d7660") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x3, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 221.111970] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:42 executing program 0: clone(0x80200, &(0x7f0000000580), &(0x7f00000004c0), &(0x7f0000000040), &(0x7f0000000440)) mknod(&(0x7f0000000000)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x40800000000001d, 0xfffffffffffff8d9) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000100)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000006c0)=""/159) prctl$intptr(0x1e, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000280)=""/251) 03:20:42 executing program 1: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:42 executing program 5: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)) 03:20:42 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:42 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) 03:20:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:43 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000380), &(0x7f00007adff0)={0x77359400}, 0x8) acct(&(0x7f0000000000)='./file0\x00') ustat(0xf, &(0x7f0000000040)) 03:20:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:20:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:43 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0xf155, &(0x7f0000ffc000/0x1000)=nil, 0x2) socket$inet(0x2, 0x0, 0x0) 03:20:44 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 223.009438] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:44 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) 03:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x1d8, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2}]}, 0x250) [ 223.739346] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:44 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0xf155, &(0x7f0000ffc000/0x1000)=nil, 0x2) socket$inet(0x2, 0x0, 0x0) 03:20:44 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket(0x11, 0x600000000080002, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000000)=""/37, &(0x7f0000000080)=0xfffffffffffffefe) 03:20:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x1d8, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x250) 03:20:45 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:20:45 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 224.339755] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:45 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) 03:20:45 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000147, 0x74000000) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000640)) 03:20:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x1d8, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x250) 03:20:45 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 224.924466] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x90, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) 03:20:46 executing program 3: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xfffffede) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffffab6) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) 03:20:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xfffffffffffffffe) [ 225.310532] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:20:46 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x10000, 0x10) recvfrom(r1, &(0x7f0000000280)=""/1, 0x1, 0x0, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x0, 0x1, 0x1, {0xa, 0x4e23, 0x3, @mcast1, 0x40}}}, 0x80) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc01) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x3) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x1, 0x0, 0x1ff, 0x7, 0xfffffffffffffff8, 0x7, 0x1, 0x5, 0x0, 0x100}) 03:20:46 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:46 executing program 2: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc00) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/159) prctl$intptr(0x1e, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) 03:20:46 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}], 0x1) 03:20:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)) 03:20:47 executing program 3: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3dd) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}) 03:20:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') [ 226.591027] cgroup: fork rejected by pids controller in /syz5 03:20:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') 03:20:47 executing program 2: clone(0x80200, &(0x7f0000000580), &(0x7f00000004c0), &(0x7f0000000040), &(0x7f0000000440)) mknod(&(0x7f0000000000)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x40800000000001d, 0xfffffffffffff8d9) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000006c0)=""/159) prctl$intptr(0x1e, 0x0) rt_sigsuspend(&(0x7f0000000100), 0x8) 03:20:47 executing program 1: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:47 executing program 4: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:20:48 executing program 1: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:49 executing program 5: clone(0x200, &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000100), &(0x7f00000001c0)) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000780)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1000000001d, 0xfffffffffffff1cf) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000000)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000001c0)) 03:20:49 executing program 4: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:20:49 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x2072, 0xffffffffffffffff, 0x0) 03:20:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') 03:20:49 executing program 1: semop(0x0, &(0x7f0000000000)=[{}], 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:49 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:49 executing program 1: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:49 executing program 4: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:20:50 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)=""/96, 0x60}], 0x1}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:20:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x3, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:20:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x3, &(0x7f0000044000)={0x0, 0x2, 0x0, @thr={&(0x7f0000000100), &(0x7f0000000200)}}, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) timer_delete(0x0) 03:20:50 executing program 1: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:50 executing program 4: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 03:20:50 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)=""/96, 0x60}], 0x1}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:20:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:50 executing program 0: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000400)) 03:20:51 executing program 1: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:20:51 executing program 4: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) [ 230.170954] audit: type=1326 audit(1537759251.180:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7204 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x457679 code=0x0 03:20:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)) 03:20:51 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:51 executing program 1: clone(0x200, &(0x7f0000000580), &(0x7f0000000240), &(0x7f0000000200), &(0x7f0000000480)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = dup2(r0, r0) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3d9) r2 = fcntl$dupfd(r1, 0x0, r0) open$dir(&(0x7f0000000440)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/159) prctl$intptr(0x1e, 0x0) sched_yield() 03:20:51 executing program 5: clone(0x200, &(0x7f0000000140), &(0x7f0000000480), &(0x7f0000000100), &(0x7f00000003c0)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x800020000001d, 0xfffffffffffffada) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000007c0)=""/159) prctl$intptr(0x1e, 0x0) rt_sigsuspend(&(0x7f0000000040), 0x8) 03:20:51 executing program 4: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 03:20:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)) 03:20:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:52 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:52 executing program 3: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000000c0)=""/26) 03:20:52 executing program 4: clone(0x200, &(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000500)) mknod(&(0x7f0000000140)='./file0\x00', 0x183e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000003f40), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) prctl$intptr(0x804020000001d, 0xfffffffffffffc05) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000380)=""/159) prctl$intptr(0x1e, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)) 03:20:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:52 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) dup2(r0, r1) 03:20:52 executing program 5: clone(0x80200, &(0x7f0000000580), &(0x7f00000004c0), &(0x7f0000000040), &(0x7f0000000440)) mknod(&(0x7f0000000000)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x40800000000001d, 0xfffffffffffff8d9) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000006c0)=""/159) prctl$intptr(0x1e, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 03:20:52 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:53 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:53 executing program 4: clone(0x80200, &(0x7f0000000580), &(0x7f00000004c0), &(0x7f0000000240), &(0x7f0000000180)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480), &(0x7f0000000640)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) prctl$intptr(0x48800000000001d, 0xfffffffffffff8d4) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000006c0)=""/159) prctl$intptr(0x4000000000001e, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) 03:20:53 executing program 3: clone(0x80200, &(0x7f0000000580), &(0x7f00000004c0), &(0x7f0000000040), &(0x7f0000000440)) mknod(&(0x7f0000000000)='./file0\x00', 0x103d, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480), &(0x7f00000002c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xfd30) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$intptr(0x1d, 0xfffffffffffff65b) open$dir(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000780)=""/159) prctl$intptr(0x1e, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) 03:20:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:53 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:54 executing program 5: 03:20:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:54 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:54 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:54 executing program 5: 03:20:54 executing program 4: 03:20:55 executing program 3: 03:20:55 executing program 5: 03:20:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:55 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x2, 0x4) 03:20:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:55 executing program 3: 03:20:55 executing program 5: 03:20:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:56 executing program 4: 03:20:56 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:56 executing program 5: 03:20:56 executing program 3: 03:20:56 executing program 4: 03:20:56 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:56 executing program 3: 03:20:57 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:20:57 executing program 5: 03:20:57 executing program 4: 03:20:57 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:57 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:57 executing program 3: 03:20:57 executing program 4: 03:20:57 executing program 5: 03:20:57 executing program 3: 03:20:57 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:57 executing program 4: 03:20:57 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:58 executing program 0: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:20:58 executing program 5: 03:20:58 executing program 3: 03:20:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:58 executing program 4: 03:20:58 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:58 executing program 3: 03:20:58 executing program 5: 03:20:58 executing program 0: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:20:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:58 executing program 4: 03:20:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:59 executing program 3: 03:20:59 executing program 5: 03:20:59 executing program 4: 03:20:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:20:59 executing program 0: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:20:59 executing program 3: 03:20:59 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:20:59 executing program 4: clone(0x200, &(0x7f0000000580), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000540)) mknod(&(0x7f0000000000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500), &(0x7f00000004c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000580)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) prctl$intptr(0x1d, 0xfffffffffffff3de) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x68802, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000240)=""/9) prctl$intptr(0x1e, 0x0) ioctl$sock_netdev_private(r1, 0x0, &(0x7f00000000c0)) 03:20:59 executing program 5: 03:20:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:00 executing program 3: 03:21:00 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:21:00 executing program 5: 03:21:00 executing program 1: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:00 executing program 3: 03:21:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:00 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:00 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:21:01 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:01 executing program 1: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:01 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x24) 03:21:01 executing program 5: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 03:21:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:01 executing program 3: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:21:01 executing program 1: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:01 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:02 executing program 5: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 03:21:02 executing program 3: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:21:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:21:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 241.503758] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 241.528013] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:21:02 executing program 5: semop(0x0, &(0x7f0000000000)=[{}, {}], 0x2) 03:21:02 executing program 3: semop(0x0, &(0x7f0000000000)=[{}], 0x1) 03:21:02 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:02 executing program 4: r0 = semget$private(0x0, 0x2004, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) 03:21:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x1) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:21:03 executing program 5: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) 03:21:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x3, 0x290, [0x0, 0x200001c0, 0x20000540, 0x20000570], 0x0, &(0x7f0000000100), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x3b, 0x896d, 'syzkaller1\x00', 'team_slave_1\x00', 'lo\x00', 'veth0_to_bond\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe5fe83ac01530132}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x148, [@helper={'helper\x00', 0x28, {{0x1, 'RAS\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'team0\x00', 'bcsh0\x00', 'bridge_slave_1\x00', 'bond0\x00', @empty, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x308) 03:21:03 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 242.622914] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:21:03 executing program 5: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:03 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:03 executing program 2: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:04 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:21:04 executing program 1 (fault-call:0 fault-nth:0): semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) 03:21:04 executing program 3 (fault-call:1 fault-nth:0): semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:04 executing program 5: r0 = semget$private(0x0, 0x2004, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:04 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)={0x0, 0x5, 0x8, [0x101, 0x6, 0x7f, 0xb6, 0xd1, 0x9, 0xffff, 0xfffffffffffffffe]}, &(0x7f0000000480)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000004c0)={0x1, 0x9, 0x8209, 0x7, 0x6, 0x10000, 0xa3c, 0xfff, r1}, 0x20) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) sync() getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x1, 0x9}, &(0x7f00000001c0)=0xc) setrlimit(0xf, &(0x7f0000000000)={0x100000000, 0x192b}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:21:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KIOCSOUND(r0, 0x8915, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 244.106369] FAULT_INJECTION: forcing a failure. [ 244.106369] name failslab, interval 1, probability 0, space 0, times 1 [ 244.117896] CPU: 1 PID: 7657 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #56 [ 244.125154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.134592] Call Trace: [ 244.137265] dump_stack+0x2f6/0x430 [ 244.141005] should_fail+0x1357/0x1360 [ 244.145065] __should_failslab+0x278/0x2a0 [ 244.149510] should_failslab+0x29/0x70 [ 244.153479] kmem_cache_alloc+0x167/0xd20 [ 244.157721] ? taskstats_exit+0x174/0x1760 [ 244.162044] ? __msan_get_context_state+0x9/0x30 [ 244.166886] taskstats_exit+0x174/0x1760 [ 244.171071] do_exit+0x100d/0x3f80 [ 244.174751] ? __msan_get_context_state+0x9/0x30 [ 244.179626] ? INIT_INT+0x17/0x40 [ 244.183174] do_group_exit+0x1a0/0x350 [ 244.187138] ? _raw_spin_lock_irq+0x1cb/0x2a0 [ 244.191720] get_signal+0x152d/0x2130 [ 244.195659] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 244.201189] do_signal+0x11d/0x2060 03:21:05 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000200)={@pptp={0x18, 0x2, {0x0, @broadcast}}, {&(0x7f00000000c0)}, &(0x7f00000001c0), 0x40}, 0xa0) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 244.204989] ? kmsan_set_origin_inline+0x6b/0x120 [ 244.209954] ? __msan_poison_alloca+0x173/0x1f0 [ 244.214744] ? prepare_exit_to_usermode+0x46/0x410 [ 244.219772] ? syscall_return_slowpath+0xf3/0x790 [ 244.224719] prepare_exit_to_usermode+0x273/0x410 [ 244.229666] syscall_return_slowpath+0xf3/0x790 [ 244.234434] ? fput+0x339/0x3c0 [ 244.237819] ? __se_sys_semop+0x98/0xb0 [ 244.241867] do_syscall_64+0xde/0x100 [ 244.245735] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 244.251024] RIP: 0033:0x457679 [ 244.254290] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.273259] RSP: 002b:00007f0c92836c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 244.281048] RAX: fffffffffffffffc RBX: 00007f0c928376d4 RCX: 0000000000457679 [ 244.288391] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000000 [ 244.295732] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:21:05 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x7, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000003c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={r1, 0xad50, 0xa, 0x8, 0x9, 0x23}, 0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x3}, &(0x7f0000000340)=0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x381000, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000140)=""/208) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r3, &(0x7f0000000000)=""/39, 0x24) 03:21:05 executing program 5: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 244.303088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 244.310434] R13: 00000000004d53f8 R14: 00000000004c35d4 R15: 0000000000000000 03:21:05 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfffffffffffffff7, 0x600000) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:21:05 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1ae2cf9e, 0x800) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/251) ioctl$TIOCSCTTY(r0, 0x540e, 0x30) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, r1, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffff7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2540}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x48010) 03:21:05 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:05 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x5c, &(0x7f0000000040)=[@in={0x2, 0x4e20}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x1c}, 0x6}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x80000001, 0xa, 0x9, 0x1, r1}, 0x10) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:05 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xc40, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) kcmp(r3, r4, 0x0, r0, r2) read(r0, &(0x7f0000000000)=""/39, 0x24) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) 03:21:06 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000089cd6e7a0000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x1, "964291f8801a2e18"}) 03:21:06 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="fd8664462ce38adfdd1cbd063e4ae6467ab8ead5bef8989adf9de12754dab23ccfce21caf7b09480f208cc230c41f7e95749f3474a0aaf162c15111aea18cb3791b19bc60aed43667612e79d2499691eba4b79d0c50612d2920c0d0b9e1c20a364f341c227e523099a48c6fdbc43acce87df3adf73925d212a377ab5e3e3021ff94e09be46f4ef5424351c9a3b18851743fa6dfaef", 0x95, 0xfffffffffffffffe) r1 = socket$inet(0x2, 0x803, 0xe6) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000300)=0x3ad) keyctl$invalidate(0x15, r0) semop(0x0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffffd}, {0x0, 0x0, 0x800}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:06 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:06 executing program 4: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000340)="b1c4e9c833a9504922da5e6c8e3ac2d5c521385e94ccbf6333a813118e2a64cf9ac1c3cb00b7d452f5757f20f10db19d0290ed451af50dc5be654def46a8eec5991405ee11ae1e715a7bedef256cc31ebdec3e38082b8775f7969c3af8bbac9f62940056843c6979190010e166852303b2c95094c84b5c3e989e727cd79be11bce065d1e287d96faaac0eb11040f617ca36b028604d3258cc647a3e9799d3098d9d683a5831e759e56421b89260ce7a104ebd946b685496c86b8aae279063af39e7833883314103ca4c361dc5c1aaca648698b68c87405644ef7dffc336697bf77f313b0f6f6b260fab166d66a0fc97e1a60f9361468", 0xf6, 0xfffffffffffffffd) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) getpgrp(r1) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x9e0, 0x9, 0x1000, 0x80000001, 0x80000001, 0xe93, 0xf58f, {0x0, @in6={{0xa, 0x4e21, 0x2, @local, 0xfff}}, 0x7, 0x0, 0xffffffffffffffff, 0x6, 0x7}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e23, 0x7f, @mcast2, 0x4}}, 0x3, 0x7fffffff, 0x60, 0xcb78, 0x5}, &(0x7f00000002c0)=0x98) read(r0, &(0x7f0000000000)=""/39, 0x27) 03:21:06 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:06 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x80800) bind(r1, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x3, 0x0, 0x2, {0xa, 0x4e20, 0x4, @ipv4={[], [], @rand_addr=0x19d}}}}, 0x80) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x34}, [{0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x10000000000, 0x1}]}, 0x78) 03:21:06 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) r0 = semget$private(0x0, 0x2, 0x200) semop(r0, &(0x7f0000000080)=[{0x7, 0x5, 0x1800}], 0x1d0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:07 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {0x0, 0x7, 0x8000000000000000}], 0x2) 03:21:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:07 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000001c0)=0xc) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xfffffffffffffbff, 0x10001, 0x0, 0x92, 0x0, 0x83d, 0x81, 0x1, 0x1000, 0x40, 0x2d60f9a3, 0x6, 0x10001, 0x3, 0x5, 0x6e2b, 0x401, 0x100000000, 0x7ff, 0x9, 0x3, 0x1, 0x9, 0x1ef20000, 0x4, 0x3ff, 0xc2, 0x4, 0x3704, 0x8, 0x3, 0x5, 0x88, 0xfffffffeffffffff, 0x5, 0x8c23, 0x0, 0x1, 0x5, @perf_config_ext={0x2, 0x7fffffff}, 0x4, 0x6, 0x5, 0x7, 0x8, 0x6}, r0, 0xf, r2, 0x2) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r3, &(0x7f0000000000)=""/39, 0x24) 03:21:07 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x101, 0x420000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)) 03:21:07 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 03:21:07 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) r1 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)="481bb9ed63f0e0fb400b4b70c3cf2dc12526721cc7ccbc7ec5e3e8f83bc341dbf698bc574b2e9a735468b770cf1b51282538bec33804eae3db62c3180d35", 0x3e, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180)="f9a381950c3132e39e641851740fa3f1d163e4ea528a0116a861", 0x1a, r1) 03:21:07 executing program 5: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000004000), 0x118d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0x189c02, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4d, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x3e, 0x400, 0xff, 0x40, 0x22c, 0x7, 0xfbb5, 0x38, 0x2, 0x100000001, 0x33, 0x7fffffff}, [{0x6474e551, 0x20, 0x1ff, 0x297, 0x1, 0xc72, 0x0, 0x3e44}], "298427fadd719cb93b8247990471e4bce1b0999b11d57520196c4636b8d3e9b43b1f4c69500436e2211441cc6ffa60e8f5f0e36c7a8761459243ae4aa00342e672fc87df3938bdd65d9dbb286d9dd7113a7433669a6b32b37ae1fcb8", [[], [], [], [], []]}, 0x5d4) 03:21:08 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000140), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f0000000000)=""/39, 0x24) 03:21:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:08 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) r0 = semget$private(0x0, 0x4, 0x400) semop(r0, &(0x7f0000000040)=[{0x0, 0xfbc, 0x1000}], 0x1) 03:21:08 executing program 5 (fault-call:0 fault-nth:0): semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) [ 247.531946] FAULT_INJECTION: forcing a failure. [ 247.531946] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 247.544172] CPU: 0 PID: 7795 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #56 [ 247.551413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.560821] Call Trace: [ 247.563495] dump_stack+0x2f6/0x430 [ 247.567191] should_fail+0x1357/0x1360 [ 247.571188] ? rcu_all_qs+0x2e/0x1b0 [ 247.575021] __alloc_pages_nodemask+0x72a/0x6370 [ 247.579899] ? kmsan_set_origin_inline+0x6b/0x120 [ 247.584846] ? __msan_poison_alloca+0x173/0x1f0 [ 247.589595] ? kmsan_set_origin_inline+0x6b/0x120 [ 247.594548] ? __msan_poison_alloca+0x173/0x1f0 [ 247.599326] ? aa_get_newest_label+0xac/0x9f0 [ 247.603877] ? apparmor_capable+0xc6/0x310 [ 247.608223] ? kmsan_set_origin_inline+0x6b/0x120 [ 247.613156] __kmalloc_node+0xe58/0x1410 [ 247.617316] ? kmsan_set_origin+0x93/0x150 [ 247.621650] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 247.627103] kvmalloc_node+0x19d/0x3e0 [ 247.631087] semctl_main+0x503b/0x57a0 [ 247.635057] ? kmsan_set_origin+0x93/0x150 [ 247.639389] ? kmsan_set_origin+0x93/0x150 [ 247.643743] ? kmsan_set_origin_inline+0x6b/0x120 [ 247.648689] ? kmsan_set_origin+0x93/0x150 [ 247.653039] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 247.658507] ? fsnotify+0x17f1/0x1870 [ 247.662410] ? kmsan_set_origin_inline+0x6b/0x120 [ 247.667365] ? __msan_poison_alloca+0x173/0x1f0 [ 247.672135] ? ksys_semctl+0x7b/0x630 [ 247.676024] ? __se_sys_semctl+0xb8/0xd0 [ 247.680149] ksys_semctl+0x4d1/0x630 [ 247.683954] ? syscall_return_slowpath+0x90/0x790 [ 247.688891] ? syscall_return_slowpath+0xf3/0x790 [ 247.693835] __se_sys_semctl+0xb8/0xd0 [ 247.697792] __x64_sys_semctl+0x56/0x70 [ 247.701828] do_syscall_64+0xb8/0x100 [ 247.705695] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 247.710941] RIP: 0033:0x457679 [ 247.714201] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:21:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:21:08 executing program 0: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140), 0x0, 0xfffffffffffffffb) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x63692e47, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x78) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) 03:21:08 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0xfffffffffffffffe, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000100), &(0x7f0000000300)="3e470c5418292b45258d2b1a1b7dbbdb88bae1d8a9d590956f06005191c492e7e3", 0x21, 0xfffffffffffffffd) fchmod(r0, 0x3) read(r0, &(0x7f0000000000)=""/39, 0x24) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x15, 0x10, "e561f7c5cb224091df4baaff1b53666e2a41fcfac6a79af684d5d605d66201367d46823c1ca29d0718169b489f4c2bb36db3448924c67137bf86eb07cda89f82", "0cd02e16de622de0a8e20dd04725bce7f35f7aa4f25b339f3aadb9884431b26c", [0x1, 0xfffffffffffffffe]}) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:sulogin_exec_t:s0\x00', 0x24, 0x3) [ 247.733165] RSP: 002b:00007f61e5b04c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 247.740999] RAX: ffffffffffffffda RBX: 00007f61e5b056d4 RCX: 0000000000457679 [ 247.748330] RDX: 000000000000000d RSI: 0000000000000000 RDI: 0000000000000000 [ 247.755651] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 247.762971] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000003 [ 247.770292] R13: 00000000004d5290 R14: 00000000004c34fb R15: 0000000000000000 03:21:08 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000200)=0x80000001, 0x4) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x0, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffd}, {}], 0x2) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/250) 03:21:09 executing program 4: socket$inet_sctp(0x2, 0x0, 0x84) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) read(r0, &(0x7f00000000c0)=""/39, 0x27) [ 248.133752] ================================================================== [ 248.141209] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x15d/0x1f0 [ 248.147734] CPU: 1 PID: 7795 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #56 [ 248.154935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.164314] Call Trace: [ 248.166933] dump_stack+0x2f6/0x430 [ 248.170616] kmsan_report+0x183/0x2b0 [ 248.174466] kmsan_internal_check_memory+0x138/0x1f0 [ 248.179619] kmsan_copy_to_user+0x79/0xc0 03:21:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x600, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x9, @random="527d2a72fd73"}) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 248.183802] _copy_to_user+0x15d/0x1f0 [ 248.187732] semctl_main+0x2e07/0x57a0 [ 248.191645] ? kmsan_set_origin+0x93/0x150 [ 248.195941] ? kmsan_set_origin+0x93/0x150 [ 248.200236] ? kmsan_set_origin_inline+0x6b/0x120 [ 248.205121] ? kmsan_set_origin+0x93/0x150 [ 248.209400] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 248.214800] ? fsnotify+0x17f1/0x1870 [ 248.218631] ? kmsan_set_origin_inline+0x6b/0x120 [ 248.223509] ? __msan_poison_alloca+0x173/0x1f0 [ 248.228217] ? ksys_semctl+0x7b/0x630 [ 248.232043] ? __se_sys_semctl+0xb8/0xd0 [ 248.236142] ksys_semctl+0x4d1/0x630 [ 248.239884] ? syscall_return_slowpath+0x90/0x790 [ 248.244764] ? syscall_return_slowpath+0xf3/0x790 [ 248.249648] __se_sys_semctl+0xb8/0xd0 [ 248.253591] __x64_sys_semctl+0x56/0x70 [ 248.257613] do_syscall_64+0xb8/0x100 [ 248.261461] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 248.266675] RIP: 0033:0x457679 [ 248.269888] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.288822] RSP: 002b:00007f61e5b04c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 248.296579] RAX: ffffffffffffffda RBX: 00007f61e5b056d4 RCX: 0000000000457679 [ 248.303877] RDX: 000000000000000d RSI: 0000000000000000 RDI: 0000000000000000 [ 248.311169] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 248.318466] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000003 [ 248.325764] R13: 00000000004d5290 R14: 00000000004c34fb R15: 0000000000000000 [ 248.333080] [ 248.334724] Uninit was created at: [ 248.338299] kmsan_internal_alloc_meta_for_pages+0x146/0x700 [ 248.344128] kmsan_alloc_page+0x75/0xd0 [ 248.348127] __alloc_pages_nodemask+0x11ef/0x6370 [ 248.353003] alloc_pages_current+0x51f/0x760 [ 248.357447] __vmalloc_node_range+0x8c6/0x1140 [ 248.362055] __vmalloc_node_flags_caller+0x12b/0x140 [ 248.367181] kvmalloc_node+0x3a1/0x3e0 [ 248.371089] semctl_main+0x503b/0x57a0 [ 248.375005] ksys_semctl+0x4d1/0x630 [ 248.378743] __se_sys_semctl+0xb8/0xd0 [ 248.382654] __x64_sys_semctl+0x56/0x70 [ 248.386649] do_syscall_64+0xb8/0x100 [ 248.390473] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 248.395669] [ 248.397307] Bytes 4096-12288 of 16392 are uninitialized [ 248.402681] Memory access starts at ffffc9000df5a000 [ 248.407791] ================================================================== [ 248.415159] Disabling lock debugging due to kernel taint [ 248.420623] Kernel panic - not syncing: panic_on_warn set ... [ 248.420623] 03:21:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f7000000000000000000"], 0x78) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)=0x1) [ 248.428032] CPU: 1 PID: 7795 Comm: syz-executor5 Tainted: G B 4.19.0-rc4+ #56 [ 248.436623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.446003] Call Trace: [ 248.448625] dump_stack+0x2f6/0x430 [ 248.452302] panic+0x54c/0xaf7 [ 248.455577] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 248.461075] kmsan_report+0x2a8/0x2b0 [ 248.464920] kmsan_internal_check_memory+0x138/0x1f0 [ 248.470077] kmsan_copy_to_user+0x79/0xc0 [ 248.474259] _copy_to_user+0x15d/0x1f0 [ 248.478192] semctl_main+0x2e07/0x57a0 [ 248.482112] ? kmsan_set_origin+0x93/0x150 [ 248.486406] ? kmsan_set_origin+0x93/0x150 [ 248.490699] ? kmsan_set_origin_inline+0x6b/0x120 [ 248.495586] ? kmsan_set_origin+0x93/0x150 [ 248.499864] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 248.505258] ? fsnotify+0x17f1/0x1870 [ 248.509097] ? kmsan_set_origin_inline+0x6b/0x120 [ 248.513977] ? __msan_poison_alloca+0x173/0x1f0 [ 248.518677] ? ksys_semctl+0x7b/0x630 [ 248.522534] ? __se_sys_semctl+0xb8/0xd0 [ 248.526627] ksys_semctl+0x4d1/0x630 [ 248.530368] ? syscall_return_slowpath+0x90/0x790 [ 248.535257] ? syscall_return_slowpath+0xf3/0x790 [ 248.540140] __se_sys_semctl+0xb8/0xd0 [ 248.544067] __x64_sys_semctl+0x56/0x70 [ 248.548068] do_syscall_64+0xb8/0x100 [ 248.551905] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 248.557125] RIP: 0033:0x457679 [ 248.560344] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.579272] RSP: 002b:00007f61e5b04c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 248.587015] RAX: ffffffffffffffda RBX: 00007f61e5b056d4 RCX: 0000000000457679 [ 248.594307] RDX: 000000000000000d RSI: 0000000000000000 RDI: 0000000000000000 [ 248.601602] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 248.608895] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000003 [ 248.616188] R13: 00000000004d5290 R14: 00000000004c34fb R15: 0000000000000000 [ 248.623817] Kernel Offset: disabled [ 248.627485] Rebooting in 86400 seconds..