Warning: Permanently added '10.128.0.91' (ECDSA) to the list of known hosts. 2018/11/09 11:01:01 fuzzer started 2018/11/09 11:01:07 dialing manager at 10.128.0.26:38493 2018/11/09 11:01:07 syscalls: 1 2018/11/09 11:01:07 code coverage: enabled 2018/11/09 11:01:07 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/09 11:01:07 setuid sandbox: enabled 2018/11/09 11:01:07 namespace sandbox: enabled 2018/11/09 11:01:07 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/09 11:01:07 fault injection: enabled 2018/11/09 11:01:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/09 11:01:07 net packed injection: enabled 2018/11/09 11:01:07 net device setup: enabled 11:03:27 executing program 0: add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0x0, 0x28d5, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0x10004}, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) syzkaller login: [ 212.982122] IPVS: ftp: loaded support on port[0] = 21 [ 215.296720] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.303400] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.312020] device bridge_slave_0 entered promiscuous mode [ 215.436729] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.443332] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.451904] device bridge_slave_1 entered promiscuous mode [ 215.576789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.704009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.089731] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:03:31 executing program 1: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x42) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 216.218638] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.965294] IPVS: ftp: loaded support on port[0] = 21 [ 217.173279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.181413] team0: Port device team_slave_0 added [ 217.367337] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.375468] team0: Port device team_slave_1 added [ 217.593843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.769573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.776940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.785706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.003702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.011445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.020574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.195290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.202932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.212189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.185327] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.191846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.198775] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.205398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.214112] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.372366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.386515] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.393113] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.401408] device bridge_slave_0 entered promiscuous mode [ 220.594490] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.600959] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.609640] device bridge_slave_1 entered promiscuous mode [ 220.736682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.954146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.456630] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.656154] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:03:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x7a, 0x0, [0x40000084]}) [ 221.902227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.909411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.165265] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.172525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.634567] IPVS: ftp: loaded support on port[0] = 21 [ 222.896024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.904219] team0: Port device team_slave_0 added [ 223.168504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.176579] team0: Port device team_slave_1 added [ 223.422421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.433447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.442322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.588286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.595582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.604564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.914037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.921728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.930371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.223424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.230988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.239962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.093737] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.100323] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.108833] device bridge_slave_0 entered promiscuous mode [ 227.323512] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.330004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.337035] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.343641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.352553] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.457900] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.464583] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.473179] device bridge_slave_1 entered promiscuous mode [ 227.769697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.862968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.000111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.633504] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.903509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.087271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.094561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.300645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.307806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.966001] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.974015] team0: Port device team_slave_0 added 11:03:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) [ 230.248477] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.256586] team0: Port device team_slave_1 added [ 230.599448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.606622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.615434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.808955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.926755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.933983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.942677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.206271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.214009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.222992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.246880] IPVS: ftp: loaded support on port[0] = 21 [ 231.543058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.550644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.559745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.986057] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.290949] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.297460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.305422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.568446] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.437608] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.444144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.451065] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.457644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.466469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.875380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.489472] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.496241] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.504977] device bridge_slave_0 entered promiscuous mode [ 236.835045] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.841504] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.850270] device bridge_slave_1 entered promiscuous mode [ 237.167340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.510788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.529149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.855581] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.175926] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.183182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.420993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 239.428228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.470353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.388936] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.397281] team0: Port device team_slave_0 added 11:03:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000190000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="0f460c3e0f300f09ba4000b0d6eef2f0835c87a2660f3a20af0b00002e0f01cfb800008ee0baf80c66b824f9838466efbafc0cec0f35", 0x36}], 0x1, 0x0, &(0x7f0000000100), 0x0) [ 240.717133] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.725370] team0: Port device team_slave_1 added [ 240.937223] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.157978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 241.165241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.173903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.597888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 241.605296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.614631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.017117] IPVS: ftp: loaded support on port[0] = 21 [ 242.025885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 242.033465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.042731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.371403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 242.379377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.388654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.533367] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 242.539858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.548345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:03:58 executing program 0: add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0x0, 0x28d5, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0x10004}, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) 11:03:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000007f40)={0x0, 0x3, &(0x7f0000000440), &(0x7f00000004c0)='syzkaller\x00', 0x0, 0xd7, &(0x7f0000000740)=""/215}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)="47ff4c00", 0x0, 0x99, &(0x7f0000ce7000)=""/153}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x34, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", &(0x7f00007ec000)=""/52}, 0x28) 11:03:59 executing program 0: syz_emit_ethernet(0x6, &(0x7f0000000080)=ANY=[@ANYBLOB="05b285bc93f772a9c0bed3dc328a5e6f16c025a10c32f9af8653e1a198f40551e6ae5a995481eaebc52446077596d4c372beb65a85596fcdb122bdf4cc494e96b915520ecb72882515c5d032d05b4eb5f3720d24765939dec779ce389a55b5bb5cad51f5582902c35060a7ffed04488ac4b3e5", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC], @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB="40f42d6fc1d35cb90fe19fc61317dc99769c68d83afeedeabb3ad232be14996aee3d29b5bdb8ed6db7975d6b8f9057b33a68c450d768cefeaf360a305abebb6b19c6108ff4454623621b4edbfd6aefb61f1da03dab38b2a5321de8cc0d941e236f870b35ad9fcb25a36cda8024d9f6b75816afa731fdd7132dafba64de9b5a5a861cb91ab1d93ab1986b9d35c1dc31f7f65d28dae89d0bf9cb9a53a0b373f0ecdf381850f7b490c491370ae71eab5ab49e04fc11c603181e8ed81022343b0c264c73ec174567a4613d7dff652e455bb390c8dbe9ae00635a7b42ea0e319b16c5eab3436256ce3e67ab6e6a8d746010a5", @ANYRES64=0x0], &(0x7f0000000000)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x40, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000003700)={0x0, 0xffffffffffffffff, 0x86, 0x100, @scatter={0x6, 0x0, &(0x7f0000003480)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/141, 0x8d}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/197, 0xc5}, {&(0x7f0000003440)=""/35, 0x23}]}, &(0x7f0000003500)="5990c533f3c4be8fe1341f15da32c9752ed05fd6aa44fa1bcbd41180a79b19c965e6d6bf5b6604934d6562e522e9a8a8e922aadae4ab8aa9d794acec8ccefcc3561e3bda4a904ddf32ae64de225b7edbccd2f43453023856b9014c18abd5674314d437572a03997261dd862c8d69900f3928708ef0ee3d0cd825464de49ce5edab4e4535f2e5", &(0x7f00000035c0)=""/205, 0x8, 0x20, 0x0, &(0x7f00000036c0)}) [ 244.285797] 8021q: adding VLAN 0 to HW filter on device team0 11:03:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015002}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000001c0)={0x2, @pix_mp={0x0, 0x0, 0x56595559}}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0b002ab3bcdfa281fc00cedcff030000000000002d996b2d3825b4821b22457ff8b67cb2b9c7f74324658fcf38689f9fe6afad9830159e93acc7340345ed237a7629a75527caedcb27d7f007754385e8fcc08483994643bde58997c14fe7bebf8c105dc10d7803004e05cc9f65fb3c8deb0e327f0d5d01a4d9a124b7b18223db3025ff7fedfd68baf8deb9853fa17b6967fbfff0488d2e2d9975bf7d586336b1a979"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000340)={@void, @val={0x0, 0x0, 0x3f00}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0xff23) 11:04:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) [ 247.187152] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.193690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.200654] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.207312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.215948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.024021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.577402] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.584036] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.592440] device bridge_slave_0 entered promiscuous mode [ 248.877380] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.883951] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.892662] device bridge_slave_1 entered promiscuous mode [ 249.160801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.527148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.421759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.433031] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.699643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.067026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.077875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.415113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.422437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.650668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.169810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.178115] team0: Port device team_slave_0 added [ 252.403243] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.411347] team0: Port device team_slave_1 added [ 252.618417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.625748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.634477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.695973] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.702773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.710536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.884350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.891431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.900290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.105777] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.114260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.123281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:04:08 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) [ 253.430237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.438115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.447053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.876692] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.636864] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.643567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.650476] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.657057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.665701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.672766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.607368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.302648] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.614115] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:04:13 executing program 2: [ 259.162563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.169066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.177264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.752591] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.961272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.433673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.929560] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.936314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.944614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:04:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_RMID(0x0, 0x0) [ 263.458787] 8021q: adding VLAN 0 to HW filter on device team0 11:04:20 executing program 4: 11:04:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:20 executing program 2: 11:04:20 executing program 3: 11:04:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r1 = gettid() perf_event_open(&(0x7f0000000900)={0x0, 0x70, 0x6f, 0x9, 0x0, 0x5, 0x0, 0x0, 0xc01, 0x2, 0x7, 0x7, 0x311, 0x654dd018, 0x800, 0xddfa, 0x100000001, 0x7ff, 0x120000000000, 0x4, 0x7, 0x0, 0x0, 0x7, 0x0, 0x5c, 0x3, 0x7, 0x3f, 0x10000000000000, 0x5, 0x65, 0x4, 0x3f, 0xf, 0x100, 0xffffffffffffffe0, 0xa3, 0x0, 0x90, 0x1, @perf_config_ext={0x9, 0x7}, 0x20000, 0x3, 0xffffffff7fffffff, 0x6, 0x0, 0x8, 0x765}, r1, 0x7, r0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000007c0)) socketpair(0x0, 0x3, 0xfffffffffffffffe, &(0x7f0000000880)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r2, 0x4) sendmsg$kcm(r3, &(0x7f0000000d00)={&(0x7f0000000980)=@l2={0x1f, 0x7, {0xe7, 0x3, 0x63, 0x8, 0x396c, 0x256}, 0x3, 0x3}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000a00)="5392ef21ebff9f93af4eeab6101ca826fa358bbae0df46ac83d56ae2e6291b294a2661227abcd9a4458ab30889748ae30c1dc9fccca1f18a0a333bca1a9bed68ceeaa35d9c83de3aa110617b4fbff0dcb125af309527838adee253affe748667b8e127a3de5ff3b1a8f5abec0cfa8306f2520d35f9a21161fa353797213dec4b9dbe0b1b7a8d72d0e14fa23bfa77d76783bc4889c74a0a97bc3b59ec30dc668eb574a5eeb012087c97e5984cbeccfbb6a93681d94600b23895e758463bc842cf9174acdbbc425968d6811b937884a37dbf", 0xd1}], 0x1, &(0x7f0000000c00)=ANY=[], 0x0, 0x10}, 0x800) socketpair(0x2, 0x8, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000700)) r7 = socket$kcm(0xa, 0x6, 0x0) getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, r8}, 0x175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socketpair(0x7, 0xa, 0x4b, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8936, &(0x7f0000000000)={r9}) 11:04:20 executing program 2: 11:04:20 executing program 3: 11:04:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r2, 0x12) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:20 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:21 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0xf1, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}], 0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000500)}) 11:04:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf23618dfdd331fcacfeccdb938974f48d420c49e5b37f94bdb651b9c102659034f4192f") sendfile(r0, r0, &(0x7f0000000040), 0x1) 11:04:21 executing program 1: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/239) [ 266.252956] binder: 7825 RLIMIT_NICE not set [ 266.257602] binder: 7825 RLIMIT_NICE not set [ 266.300138] hrtimer: interrupt took 42113 ns [ 266.380133] binder: 7825 RLIMIT_NICE not set [ 266.517831] binder_alloc: binder_alloc_mmap_handler: 7824 20001000-20004000 already mapped failed -16 [ 266.553670] binder: BINDER_SET_CONTEXT_MGR already set [ 266.560555] binder: 7824:7825 ioctl 40046207 0 returned -16 [ 266.583175] binder_alloc: 7824: binder_alloc_buf, no vma [ 266.588938] binder: 7824:7831 transaction failed 29189/-3, size 0-0 line 2970 [ 266.644241] binder: 7834 RLIMIT_NICE not set [ 266.670192] binder: 7824:7837 got reply transaction with no transaction stack [ 266.678380] binder: 7824:7837 transaction failed 29201/-71, size 0-0 line 2762 [ 266.689332] binder: undelivered transaction 3, process died. [ 266.698400] binder: undelivered TRANSACTION_ERROR: 29201 [ 266.704161] binder: undelivered TRANSACTION_COMPLETE [ 266.852066] IPVS: ftp: loaded support on port[0] = 21 [ 268.124185] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.130682] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.138646] device bridge_slave_0 entered promiscuous mode [ 268.210696] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.217208] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.225244] device bridge_slave_1 entered promiscuous mode [ 268.298659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.372595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.596432] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.673558] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.820452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 268.827496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.051846] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 269.059357] team0: Port device team_slave_0 added [ 269.135626] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 269.143318] team0: Port device team_slave_1 added [ 269.218330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.301351] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.384330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 269.392070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.401270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.471092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 269.478409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.487303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.277446] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.283891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.290578] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.297251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.304876] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 270.761990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.287599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.556447] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.825379] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.831907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.839939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.111100] 8021q: adding VLAN 0 to HW filter on device team0 11:04:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:31 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) getpgid(0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:31 executing program 3: ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000040)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000140)={0x8}) 11:04:31 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0xf1, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}], 0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000500)}) [ 276.199878] binder: 8105 RLIMIT_NICE not set [ 276.204708] binder: 8105 RLIMIT_NICE not set 11:04:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:31 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) [ 276.634288] binder: 8101:8112 got reply transaction with no transaction stack [ 276.642103] binder: 8101:8112 transaction failed 29201/-71, size 0-0 line 2762 11:04:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:32 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0xf1, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}], 0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_WRITE_READ(r0, 0x40046208, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000500)}) [ 277.043984] binder: release 8101:8105 transaction 7 out, still active [ 277.072103] binder: release 8101:8105 transaction 7 in, still active [ 277.078912] binder: send failed reply for transaction 7, target dead [ 277.085689] binder: undelivered TRANSACTION_ERROR: 29201 11:04:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0x40, {0x55, 0x3, 0x6904, {0x7, 0x5}, {0x8, 0x4}, @cond=[{0x8, 0xffffffffffff1644, 0x10001, 0x8000, 0x3f, 0x5}, {0x80000001, 0x8, 0x4, 0x6, 0x100}]}, {0x57, 0x8, 0x101, {0x3ff, 0x9}, {0x4, 0x5}, @ramp={0x2, 0x8a1, {0x5f, 0x400, 0x101, 0x8}}}}) 11:04:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000000)={0xffffffffffffff44}, 0x18) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)={0x0, 0x8000005}) 11:04:32 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) [ 277.336460] binder: 8136 RLIMIT_NICE not set [ 277.341068] binder: 8136 RLIMIT_NICE not set 11:04:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) [ 277.509838] binder: 8135:8146 got reply transaction with no transaction stack [ 277.517496] binder: 8135:8146 transaction failed 29201/-71, size 0-0 line 2762 11:04:32 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x7) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x22080, 0x0) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)="0e", 0x1) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000100)=0x6, 0x4) [ 277.586590] binder: release 8135:8136 transaction 10 out, still active 11:04:32 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:32 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)}, 0x10) 11:04:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)={0x0, 0x8000005}) [ 277.913775] binder: release 8135:8136 transaction 10 in, still active [ 277.920618] binder: send failed reply for transaction 10, target dead [ 277.927471] binder: undelivered TRANSACTION_ERROR: 29201 11:04:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:33 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:33 executing program 2: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 11:04:33 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) 11:04:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) 11:04:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 11:04:33 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) pipe2(&(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef67a1d8b6f259c95b6626dedd091e6596d15936baa2ad2a12f0835b68bb75bc"}}) 11:04:33 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000040)) [ 279.102028] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 11:04:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)}, 0x10) [ 279.152770] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 11:04:34 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:34 executing program 3: 11:04:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:34 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e0000001000000000000040000000000"], 0x40}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) r2 = getpgid(0x0) write$cgroup_pid(r0, &(0x7f0000000100)=r2, 0x12) 11:04:34 executing program 1: 11:04:34 executing program 3: 11:04:36 executing program 2: 11:04:36 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:36 executing program 1: 11:04:36 executing program 3: 11:04:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) getpgid(0x0) 11:04:36 executing program 1: 11:04:36 executing program 3: 11:04:36 executing program 2: 11:04:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpgid(0x0) 11:04:36 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced00000000000000000300050000000000"], 0x70}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:36 executing program 1: 11:04:36 executing program 2: 11:04:36 executing program 3: 11:04:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) getpgid(0x0) 11:04:37 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b01"], 0x78}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:37 executing program 1: 11:04:37 executing program 2: 11:04:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:37 executing program 3: 11:04:37 executing program 1: 11:04:37 executing program 2: 11:04:37 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b0100200000"], 0x7c}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:37 executing program 2: 11:04:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) getpgid(0x0) 11:04:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004540), 0x0, 0x0, &(0x7f0000004640)={0x0, 0x989680}) exit(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x5d9d, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x1f) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000100)={0x8000}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) fgetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000580)=""/151, 0x97) openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x100, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 11:04:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004540), 0x0, 0x0, &(0x7f0000004640)={0x0, 0x989680}) exit(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket(0x200000000000011, 0x3, 0x1f) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c2000000083ee3dd391239000500001c000000000000c878ac1314bbac"], &(0x7f00000002c0)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) fgetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], &(0x7f0000000580)=""/151, 0x97) openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x100, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 11:04:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:38 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b01002000000000"], 0x7e}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:38 executing program 2: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000140)=0xfd, 0x4) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) sendto$inet6(r0, &(0x7f0000000040)="040400000700000000000000fff55b424a938207d9fb3780398d5375000000007929301ee616d543e065902f800094c3b4e431060f118d0000f55dc63cac0000000000faffffff44710d44aeb46245004bae13566424aa00000000000000000000000000e7485d8ddeb7d5fb", 0x6c, 0x4000001, &(0x7f00000000c0)={0xa, 0x200800800, 0x6, @local}, 0x1c) 11:04:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x80, 0x81, 0x3ff}) getpgid(0x0) 11:04:38 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b0100200000000000"], 0x7f}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:38 executing program 2: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'os2.', '-cpuset/vboxnet0(vmnet1\x00'}) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:04:38 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:38 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x3, 0x0) connect$inet6(r0, &(0x7f0000000280), 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000080)="0294fbfc", 0x4) 11:04:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000020000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b01472b010020000000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 11:04:39 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpgid(0x0) 11:04:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={&(0x7f0000000dc0), 0xc, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000008000a000d0200004918d8147156b80efebe275df8dc1774b343f4d1d7c6ecf8066cae7baced21cff711f4882763265a2d68387343a36b6e62ebb59494d245c47e15751bac102263ce6926c3bdf26d7b078eef78d30cf61d20d351df42d33830f993179e31d746025399bf4dbd7aa4da9aa7f0462e5729ddaede302796303ea66b5736f0781db3d5dea211"], 0x1}}, 0x0) 11:04:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:39 executing program 4: unshare(0x8000400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f00000001c0)="0a4c000240316295717070") r1 = socket$inet6_sctp(0xa, 0x803, 0x84) fcntl$F_GET_FILE_RW_HINT(r1, 0x40c, &(0x7f0000000000)) 11:04:39 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpgid(0x0) 11:04:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@setlink={0x28, 0x13, 0x821, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IF_NETNSID={0x8}]}, 0x28}}, 0x0) 11:04:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x3, 0x0) connect$inet6(r0, &(0x7f0000000280), 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000080)="0294fbfc", 0x4) 11:04:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_map}) 11:04:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 11:04:40 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0x0, 0xc}, 0x20) 11:04:40 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpgid(0x0) 11:04:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)="47ff4c00", 0x0, 0x99, &(0x7f0000ce7000)=""/153}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x34, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", &(0x7f00007ec000)=""/52}, 0x28) 11:04:40 executing program 3: [ 285.266692] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 11:04:40 executing program 2: 11:04:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 11:04:40 executing program 1: 11:04:40 executing program 2: 11:04:40 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:40 executing program 3: 11:04:40 executing program 1: 11:04:40 executing program 4: 11:04:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107446, &(0x7f0000000240)=""/174) 11:04:41 executing program 2: 11:04:41 executing program 1: 11:04:41 executing program 3: 11:04:41 executing program 4: 11:04:41 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:41 executing program 2: 11:04:41 executing program 3: 11:04:41 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:41 executing program 1: 11:04:41 executing program 4: 11:04:42 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:42 executing program 2: 11:04:42 executing program 3: 11:04:42 executing program 4: 11:04:42 executing program 1: 11:04:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:42 executing program 2: 11:04:42 executing program 3: 11:04:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:42 executing program 1: 11:04:42 executing program 4: 11:04:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:43 executing program 3: 11:04:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0x2}}}}}, &(0x7f0000000040)) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:43 executing program 1: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000000), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x108) mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) 11:04:43 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{&(0x7f0000005f00)=@ipx, 0x80, &(0x7f0000005f80), 0x0, 0x0, 0xd}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r1, &(0x7f0000000100), 0x2007ff) 11:04:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) 11:04:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0x2}}}}}, &(0x7f0000000040)) 11:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x77, 0x0, [0x0, 0x0, 0x40000100], [0xc2]}) [ 288.326238] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 288.438963] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 11:04:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1100000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 11:04:43 executing program 4 (fault-call:3 fault-nth:0): sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000000000000000800130000000300000000000000000006000000000000000000800000000000e000000100000000000004000000000000000000000000000000001f0000170003000600000000000200000490cf7ced000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x80000000000013c, 0x0) 11:04:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0x2}}}}}, &(0x7f0000000040)) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) [ 288.562498] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 289.024550] FAULT_INJECTION: forcing a failure. [ 289.024550] name failslab, interval 1, probability 0, space 0, times 1 [ 289.044497] CPU: 1 PID: 8522 Comm: syz-executor4 Not tainted 4.19.0+ #80 [ 289.051390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.060800] Call Trace: [ 289.063438] ================================================================== [ 289.070844] BUG: KMSAN: uninit-value in get_stack_info+0x720/0x9d0 [ 289.077270] CPU: 1 PID: 8522 Comm: syz-executor4 Not tainted 4.19.0+ #80 [ 289.084118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.093482] Call Trace: [ 289.096096] dump_stack+0x419/0x480 [ 289.099746] ? get_stack_info+0x720/0x9d0 [ 289.103932] kmsan_report+0x19f/0x300 [ 289.107760] __msan_warning+0x76/0xd0 [ 289.111589] get_stack_info+0x720/0x9d0 [ 289.115602] __unwind_start+0x7d/0xe0 [ 289.119421] show_trace_log_lvl+0x20e/0x11e0 [ 289.123900] show_stack+0x12e/0x170 [ 289.127549] dump_stack+0x32d/0x480 [ 289.131211] should_fail+0x11e5/0x13c0 [ 289.135131] __should_failslab+0x278/0x2a0 [ 289.139396] should_failslab+0x29/0x70 [ 289.143308] kmem_cache_alloc_node+0x164/0xec0 [ 289.147920] ? __alloc_skb+0x32e/0xeb0 [ 289.151853] ? __msan_poison_alloca+0x1e0/0x2b0 [ 289.156557] __alloc_skb+0x32e/0xeb0 [ 289.160305] pfkey_sendmsg+0x1e9/0x1a50 [ 289.164301] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 289.169687] ? aa_sk_perm+0x7ab/0x9e0 [ 289.173534] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 289.178924] ? security_socket_sendmsg+0x1bd/0x200 [ 289.183901] ___sys_sendmsg+0xe68/0x1250 [ 289.187981] ? pfkey_release+0x620/0x620 [ 289.192072] ? __fget+0x8f5/0x940 [ 289.195566] ? __fdget+0x329/0x440 [ 289.199226] __sys_sendmmsg+0x56b/0xa90 [ 289.203249] ? syscall_return_slowpath+0x123/0x8c0 [ 289.208205] __se_sys_sendmmsg+0xbd/0xe0 [ 289.212289] __x64_sys_sendmmsg+0x56/0x70 [ 289.216454] do_syscall_64+0xcf/0x110 [ 289.220281] entry_SYSCALL_64_after_hwframe+0x63/0xe7 11:04:44 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000240)=""/174) 11:04:44 executing program 3 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x10}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) [ 289.225488] RIP: 0033:0x457569 [ 289.228699] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.247621] RSP: 002b:00007f8b97ce9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 289.255349] RAX: ffffffffffffffda RBX: 00007f8b97ce9c90 RCX: 0000000000457569 [ 289.262631] RDX: 080000000000013c RSI: 0000000020000180 RDI: 0000000000000003 11:04:44 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x9, &(0x7f00000000c0)='vboxnet0\x00'}, 0x30) prlimit64(r1, 0x3, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r7, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000001c0)="3ef00fc78b95cfb807008ee065650f06f36ebaf80c66b889c52e8f66efbafc0cec66b8186e00000f23d00f21f866350000000e0f23f80f01cbd03d670fc75d622e0f01cb", 0x44}], 0x1, 0x0, &(0x7f0000000040), 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000280)={0x2b, @broadcast, 0x4e24, 0x4, 'lblc\x00', 0x0, 0x0, 0x46}, 0x2c) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) [ 289.269920] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.277206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b97cea6d4 [ 289.284493] R13: 00000000004c374a R14: 00000000004d57b8 R15: 0000000000000004 [ 289.291797] [ 289.293454] Local variable description: ----state@show_trace_log_lvl [ 289.299957] Variable was created at: [ 289.303696] show_trace_log_lvl+0xb3/0x11e0 [ 289.308032] show_stack+0x12e/0x170 [ 289.311663] ================================================================== [ 289.319030] Disabling lock debugging due to kernel taint 11:04:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0x2}}}}}, &(0x7f0000000040)) [ 289.324497] Kernel panic - not syncing: panic_on_warn set ... [ 289.324497] [ 289.331897] CPU: 1 PID: 8522 Comm: syz-executor4 Tainted: G B 4.19.0+ #80 [ 289.340140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.349509] Call Trace: [ 289.352120] dump_stack+0x419/0x480 [ 289.355782] panic+0x57e/0xb28 [ 289.359052] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 289.364534] kmsan_report+0x300/0x300 [ 289.368366] __msan_warning+0x76/0xd0 [ 289.372193] get_stack_info+0x720/0x9d0 [ 289.376201] __unwind_start+0x7d/0xe0 [ 289.380024] show_trace_log_lvl+0x20e/0x11e0 [ 289.384485] show_stack+0x12e/0x170 [ 289.388136] dump_stack+0x32d/0x480 [ 289.391794] should_fail+0x11e5/0x13c0 [ 289.395738] __should_failslab+0x278/0x2a0 [ 289.400002] should_failslab+0x29/0x70 [ 289.403914] kmem_cache_alloc_node+0x164/0xec0 [ 289.408523] ? __alloc_skb+0x32e/0xeb0 [ 289.412436] ? __msan_poison_alloca+0x1e0/0x2b0 [ 289.417139] __alloc_skb+0x32e/0xeb0 [ 289.420907] pfkey_sendmsg+0x1e9/0x1a50 [ 289.424910] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 289.430299] ? aa_sk_perm+0x7ab/0x9e0 [ 289.434147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 289.439532] ? security_socket_sendmsg+0x1bd/0x200 [ 289.444489] ___sys_sendmsg+0xe68/0x1250 [ 289.448574] ? pfkey_release+0x620/0x620 [ 289.452670] ? __fget+0x8f5/0x940 [ 289.456163] ? __fdget+0x329/0x440 [ 289.459725] __sys_sendmmsg+0x56b/0xa90 [ 289.463747] ? syscall_return_slowpath+0x123/0x8c0 [ 289.468710] __se_sys_sendmmsg+0xbd/0xe0 [ 289.472800] __x64_sys_sendmmsg+0x56/0x70 [ 289.476990] do_syscall_64+0xcf/0x110 [ 289.480813] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.486040] RIP: 0033:0x457569 [ 289.489253] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.508165] RSP: 002b:00007f8b97ce9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 289.515879] RAX: ffffffffffffffda RBX: 00007f8b97ce9c90 RCX: 0000000000457569 [ 289.523153] RDX: 080000000000013c RSI: 0000000020000180 RDI: 0000000000000003 [ 289.530425] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.537698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b97cea6d4 [ 289.544970] R13: 00000000004c374a R14: 00000000004d57b8 R15: 0000000000000004 [ 289.553353] Kernel Offset: disabled [ 289.556985] Rebooting in 86400 seconds..