[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 90.680648] audit: type=1800 audit(1545689903.733:25): pid=10824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 90.699999] audit: type=1800 audit(1545689903.733:26): pid=10824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 90.719526] audit: type=1800 audit(1545689903.763:27): pid=10824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. 2018/12/24 22:18:37 fuzzer started 2018/12/24 22:18:41 dialing manager at 10.128.0.26:36901 2018/12/24 22:18:41 syscalls: 1 2018/12/24 22:18:41 code coverage: enabled 2018/12/24 22:18:41 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/24 22:18:41 setuid sandbox: enabled 2018/12/24 22:18:41 namespace sandbox: enabled 2018/12/24 22:18:41 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/24 22:18:41 fault injection: enabled 2018/12/24 22:18:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/24 22:18:41 net packet injection: enabled 2018/12/24 22:18:41 net device setup: enabled 22:21:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, 0x0) syzkaller login: [ 279.535419] IPVS: ftp: loaded support on port[0] = 21 [ 280.991947] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.998725] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.007690] device bridge_slave_0 entered promiscuous mode [ 281.097737] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.104389] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.112952] device bridge_slave_1 entered promiscuous mode [ 281.204155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 281.288483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 281.563610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 281.659061] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.747138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 281.754292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.844391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.851463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.123348] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.132214] team0: Port device team_slave_0 added [ 282.220752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.229508] team0: Port device team_slave_1 added [ 282.318816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:21:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x4102}}, 0x1c}}, 0x0) [ 282.422671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.540341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.548144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.557734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.739549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 282.747333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.756674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.790880] IPVS: ftp: loaded support on port[0] = 21 [ 284.180993] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.187862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.195101] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.201878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.211150] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 284.217751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.114226] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.120806] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.129360] device bridge_slave_0 entered promiscuous mode [ 286.263451] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.270004] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.278705] device bridge_slave_1 entered promiscuous mode [ 286.425551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 286.519907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 286.882777] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.023203] bond0: Enslaving bond_slave_1 as an active interface with an up link 22:21:40 executing program 2: sysinfo(0x0) [ 287.843396] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 287.852381] team0: Port device team_slave_0 added [ 287.972817] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 287.981673] team0: Port device team_slave_1 added [ 288.111401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 288.120262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.129441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.301488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.453734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 288.461302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.470646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.651239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 288.659048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.668129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.017732] IPVS: ftp: loaded support on port[0] = 21 [ 290.515010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.736585] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.743218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.750487] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.757258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.766321] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 290.773002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.177149] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 291.918490] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 291.924973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.933192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.030744] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.037403] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.046124] device bridge_slave_0 entered promiscuous mode [ 292.212845] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.219430] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.228124] device bridge_slave_1 entered promiscuous mode [ 292.444517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 292.474734] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.646488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 293.181406] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 293.346308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 293.494859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 293.503480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.284920] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 294.293938] team0: Port device team_slave_0 added [ 294.458151] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 294.466933] team0: Port device team_slave_1 added [ 294.601486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.716932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.863036] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 294.870816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.880081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.021371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 295.029059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.038362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:21:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x22, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x84) 22:21:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, 0x0) [ 297.167910] IPVS: ftp: loaded support on port[0] = 21 [ 297.200413] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.207083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.214300] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.220877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.231231] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 297.237852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 22:21:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000440)="afba03a6263db5d01036d46e134f4b981d7b9bb5955cb0bafb87de28601fcd3e9c61e1ae787808c2cf70f03c552d59ee51f1bf794f1ff60e385dacae0e9a37d5c56856b62a3ac4", 0x47, 0x4000010, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) [ 297.537558] hrtimer: interrupt took 64687 ns [ 297.598536] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:21:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000440)="afba03a6263db5d01036d46e134f4b981d7b9bb5955cb0bafb87de28601fcd3e9c61e1ae787808c2cf70f03c552d59ee51f1bf794f1ff60e385dacae0e9a37d5c56856b62a3ac4", 0x47, 0x4000010, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) 22:21:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000440)="afba03a6263db5d01036d46e134f4b981d7b9bb5955cb0bafb87de28601fcd3e9c61e1ae787808c2cf70f03c552d59ee51f1bf794f1ff60e385dacae0e9a37d5c56856b62a3ac4", 0x47, 0x4000010, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) 22:21:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000440)="afba03a6263db5d01036d46e134f4b981d7b9bb5955cb0bafb87de28601fcd3e9c61e1ae787808c2cf70f03c552d59ee51f1bf794f1ff60e385dacae0e9a37d5c56856b62a3ac4", 0x47, 0x4000010, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) 22:21:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) [ 298.877794] 8021q: adding VLAN 0 to HW filter on device bond0 22:21:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) 22:21:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f00000002c0)="ad", 0x1, 0x3, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) 22:21:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='uid_mqp\x00\xf1U\x06b\x82\xd4&\x99\xe6\xdc\xd45\xe2\x1e\xda\x89\xe8\xcaz\t\xcbm~\t\xb0\xa2\xc0\x14\xb4\xbe)\r\xde\xacldD\xb4+\xe5\xc3') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffffffffffff0001}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x2}, &(0x7f00000005c0)=0x6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000008c0)=""/73, &(0x7f0000000940)=0x49) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x8, 0x6fe, 0x9, 0x2b, 0x10001}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x30) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @multicast2}, {0x306, @remote}, 0x60, {0x2, 0x4e22, @multicast1}, 'veth1_to_team\x00'}) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x13, 0x1, {0x44, 0x3, 0x2}}, 0x14) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x15, 0x110, 0xfa00, {r6, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x7f}, @ib={0x1b, 0x1, 0x8, {"ee5bbcca1df3ecc275d3a5829545dd35"}, 0x7fffffff, 0xfffffffffffff26f, 0x9}}}, 0x118) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d80)={@in, 0x0, 0x8, 0x0, "4dbd3b0988e17b2d1d331c69872a9dda1d6a64edcd1cd30fb0ce73f1249d122559232b4970ee70afb23c5802edeb144bd80029d8a5754107cec75bbd53956c00"}, 0xd8) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000380)='vcan0\x00\x00\x00\x16\x00', 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000540)=@req3={0x80000001, 0x2, 0x3, 0x3, 0x6, 0x9, 0x1ff}, 0x1c) sendto$inet(r4, &(0x7f0000000440)="afba03a6263db5d01036d46e134f4b981d7b9bb5955cb0bafb87de28601fcd3e9c61e1ae787808c2cf70f03c552d59ee51f1bf794f1ff60e385dacae0e9a37d5c56856b62a3ac4", 0x47, 0x4000010, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000240)="df", 0x1, 0x4200010, 0x0, 0x0) [ 299.897832] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 300.683269] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 300.689706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.697756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.781696] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.788430] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.797003] device bridge_slave_0 entered promiscuous mode [ 300.920701] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.927411] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.935884] device bridge_slave_1 entered promiscuous mode [ 301.135209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 301.229974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 301.405994] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.833846] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 302.066874] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 302.263532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 302.270666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.465530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 302.473005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.964544] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 302.973582] team0: Port device team_slave_0 added [ 303.174082] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 303.183020] team0: Port device team_slave_1 added [ 303.424264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 303.431403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.441139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.558786] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 303.566326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 303.575420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 303.744007] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 303.751732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.761524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.942593] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 303.950243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.959417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.199498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.353353] ================================================================== [ 305.360862] BUG: KMSAN: uninit-value in tipc_nl_compat_doit+0x5bf/0xb00 [ 305.367685] CPU: 0 PID: 11862 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #14 [ 305.374973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.384374] Call Trace: [ 305.387123] dump_stack+0x173/0x1d0 [ 305.390809] kmsan_report+0x12e/0x2a0 [ 305.394653] __msan_warning+0x82/0xf0 [ 305.398488] tipc_nl_compat_doit+0x5bf/0xb00 [ 305.402943] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 305.408465] tipc_nl_compat_recv+0x14d7/0x2760 [ 305.413141] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 305.418627] ? tipc_nl_bearer_get+0xa10/0xa10 [ 305.423192] ? tipc_nl_compat_doit+0xb00/0xb00 [ 305.427809] ? tipc_netlink_compat_stop+0x40/0x40 [ 305.432767] genl_rcv_msg+0x185f/0x1a60 [ 305.436857] ? __should_failslab+0x278/0x2a0 [ 305.441528] ? __msan_poison_alloca+0x1f0/0x2a0 [ 305.446245] netlink_rcv_skb+0x444/0x640 [ 305.450356] ? genl_unbind+0x390/0x390 [ 305.454306] genl_rcv+0x63/0x80 [ 305.458358] netlink_unicast+0xf40/0x1020 [ 305.462567] netlink_sendmsg+0x127f/0x1300 [ 305.466949] ___sys_sendmsg+0xdb9/0x11b0 [ 305.471060] ? netlink_getsockopt+0x1460/0x1460 [ 305.475776] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 305.481178] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 305.486564] ? __fget_light+0x6e1/0x750 [ 305.490603] __se_sys_sendmsg+0x305/0x460 [ 305.494824] __x64_sys_sendmsg+0x4a/0x70 [ 305.498919] do_syscall_64+0xbc/0xf0 [ 305.502731] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.507942] RIP: 0033:0x457759 [ 305.511173] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.530101] RSP: 002b:00007f52867e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.537855] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457759 [ 305.545154] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 305.552451] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.559745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52867e66d4 [ 305.567042] R13: 00000000004c46c2 R14: 00000000004d7c98 R15: 00000000ffffffff [ 305.574379] [ 305.576039] Uninit was created at: [ 305.579611] kmsan_internal_poison_shadow+0x92/0x150 [ 305.584810] kmsan_kmalloc+0xa6/0x130 [ 305.588650] kmsan_slab_alloc+0xe/0x10 [ 305.592562] __kmalloc_node_track_caller+0xe38/0x1060 [ 305.597767] __alloc_skb+0x309/0xa20 [ 305.601515] netlink_sendmsg+0xb82/0x1300 [ 305.605680] ___sys_sendmsg+0xdb9/0x11b0 [ 305.609762] __se_sys_sendmsg+0x305/0x460 [ 305.613959] __x64_sys_sendmsg+0x4a/0x70 [ 305.618043] do_syscall_64+0xbc/0xf0 [ 305.621783] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.626981] ================================================================== [ 305.634360] Disabling lock debugging due to kernel taint [ 305.639824] Kernel panic - not syncing: panic_on_warn set ... [ 305.645748] CPU: 0 PID: 11862 Comm: syz-executor1 Tainted: G B 4.20.0-rc7+ #14 [ 305.654439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.663823] Call Trace: [ 305.666457] dump_stack+0x173/0x1d0 [ 305.670170] panic+0x3ce/0x961 [ 305.673446] kmsan_report+0x293/0x2a0 [ 305.677288] __msan_warning+0x82/0xf0 [ 305.681166] tipc_nl_compat_doit+0x5bf/0xb00 [ 305.685670] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 305.691179] tipc_nl_compat_recv+0x14d7/0x2760 [ 305.695802] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 305.701209] ? tipc_nl_bearer_get+0xa10/0xa10 [ 305.705738] ? tipc_nl_compat_doit+0xb00/0xb00 [ 305.710359] ? tipc_netlink_compat_stop+0x40/0x40 [ 305.715261] genl_rcv_msg+0x185f/0x1a60 [ 305.719291] ? __should_failslab+0x278/0x2a0 [ 305.723805] ? __msan_poison_alloca+0x1f0/0x2a0 [ 305.728520] netlink_rcv_skb+0x444/0x640 [ 305.732617] ? genl_unbind+0x390/0x390 [ 305.736547] genl_rcv+0x63/0x80 [ 305.739857] netlink_unicast+0xf40/0x1020 [ 305.744065] netlink_sendmsg+0x127f/0x1300 [ 305.748381] ___sys_sendmsg+0xdb9/0x11b0 [ 305.752529] ? netlink_getsockopt+0x1460/0x1460 [ 305.757254] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 305.762676] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 305.768057] ? __fget_light+0x6e1/0x750 [ 305.772096] __se_sys_sendmsg+0x305/0x460 [ 305.776333] __x64_sys_sendmsg+0x4a/0x70 [ 305.780434] do_syscall_64+0xbc/0xf0 [ 305.784178] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.789409] RIP: 0033:0x457759 [ 305.792624] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.811555] RSP: 002b:00007f52867e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.819322] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457759 [ 305.826625] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 305.833928] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.841211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52867e66d4 [ 305.848499] R13: 00000000004c46c2 R14: 00000000004d7c98 R15: 00000000ffffffff [ 305.856968] Kernel Offset: disabled [ 305.860610] Rebooting in 86400 seconds..