Warning: Permanently added '10.128.0.92' (ECDSA) to the list of known hosts. 2018/10/28 00:24:12 fuzzer started 2018/10/28 00:24:17 dialing manager at 10.128.0.26:45325 2018/10/28 00:24:17 syscalls: 1 2018/10/28 00:24:17 code coverage: enabled 2018/10/28 00:24:17 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/28 00:24:17 setuid sandbox: enabled 2018/10/28 00:24:17 namespace sandbox: enabled 2018/10/28 00:24:17 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/28 00:24:17 fault injection: enabled 2018/10/28 00:24:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/28 00:24:17 net packed injection: enabled 2018/10/28 00:24:17 net device setup: enabled 00:27:02 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000500)={0x0, 0x3}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x47908351}, &(0x7f00000005c0)=0x8) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r4, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(r5, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000200), 0x0, 0x4890}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0xf401000000000000, 0x300000003000000, 0x0, 0x300000000000000, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x0, {0x3, 0x2, 0x0, 0x0, 0x18c, 0x401, {0x1, 0x20, 0x5, 0xffff, 0x0, 0x100000001, 0x0, 0x100000001, 0x2470, 0x5, 0x80000000, 0x0, r2, 0x3, 0x400}}}, 0x90) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000700)=0x3) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r6, 0x114, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) keyctl$update(0x2, r7, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syzkaller login: [ 241.327429] IPVS: ftp: loaded support on port[0] = 21 [ 243.821374] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.827951] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.836894] device bridge_slave_0 entered promiscuous mode [ 243.982439] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.988993] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.997640] device bridge_slave_1 entered promiscuous mode [ 244.142118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 244.289209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:27:06 executing program 1: socket$packet(0x11, 0x40000000000a, 0x300) r0 = socket$inet6(0xa, 0x1080000000002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800a, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x8351, 0x7000028, 0x0, 0x9000000]}, 0x10) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) [ 244.738120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.949226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.139173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.146465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.390699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.397854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.638648] IPVS: ftp: loaded support on port[0] = 21 [ 246.025543] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.033899] team0: Port device team_slave_0 added [ 246.327389] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.335496] team0: Port device team_slave_1 added [ 246.548418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.555625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.564721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.816391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.823682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.832817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.117413] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.125195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.134217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.283137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.290874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.300290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.274381] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.280860] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.289569] device bridge_slave_0 entered promiscuous mode [ 249.575882] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.582564] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.591106] device bridge_slave_1 entered promiscuous mode [ 249.856977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.026327] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.032916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.039895] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.046531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.055571] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.117818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.302139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:27:12 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x1) [ 250.702329] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.028045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.240268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.248640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.544488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.551526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.825641] IPVS: ftp: loaded support on port[0] = 21 [ 252.491434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.499773] team0: Port device team_slave_0 added [ 252.692223] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.700232] team0: Port device team_slave_1 added [ 252.937993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.945222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.954107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.288888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.296091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.305193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.612317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.619868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.628976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.874391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.882284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.891140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.047076] ip (6475) used greatest stack depth: 53264 bytes left [ 256.981596] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.988286] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.996837] device bridge_slave_0 entered promiscuous mode [ 257.188949] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.195559] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.204134] device bridge_slave_1 entered promiscuous mode [ 257.367287] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.373878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.380810] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.387402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.396300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.452361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.499446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 257.707132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 258.567917] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.845810] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 259.058499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 259.065701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:27:21 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000700)=ANY=[@ANYBLOB='s'], 0x1) [ 259.298204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 259.305416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.443416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.451426] team0: Port device team_slave_0 added [ 260.479977] IPVS: ftp: loaded support on port[0] = 21 [ 260.808617] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.816960] team0: Port device team_slave_1 added [ 261.082135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 261.089197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.098150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.395781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 261.403024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.411685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.721441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.729218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.738097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.120692] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.128559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.137457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.082412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.479823] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.790807] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.797475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.805710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.277206] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.284244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.291148] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.297830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.306776] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.908555] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.915482] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.924013] device bridge_slave_0 entered promiscuous mode [ 266.972581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.153998] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.335181] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.341664] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.350256] device bridge_slave_1 entered promiscuous mode [ 267.697361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.107513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.126370] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.485665] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 269.906415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.913703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:27:32 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0xb, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local, @dev}}}}}}, &(0x7f0000000140)={0x0, 0x0, [0x0, 0xfffff000]}) [ 270.264988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.272395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.561675] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.569905] team0: Port device team_slave_0 added [ 271.654563] IPVS: ftp: loaded support on port[0] = 21 [ 271.912479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.920660] team0: Port device team_slave_1 added [ 272.311102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 272.318254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.327453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.716139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 272.723420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.732436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.139999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 273.147755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.156965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.422947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.557004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 273.564862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.573805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.072126] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.682281] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.688676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.696864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.329234] hrtimer: interrupt took 44013 ns 00:27:40 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000500)={0x0, 0x3}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x47908351}, &(0x7f00000005c0)=0x8) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r4, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(r5, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000200), 0x0, 0x4890}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0xf401000000000000, 0x300000003000000, 0x0, 0x300000000000000, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x0, {0x3, 0x2, 0x0, 0x0, 0x18c, 0x401, {0x1, 0x20, 0x5, 0xffff, 0x0, 0x100000001, 0x0, 0x100000001, 0x2470, 0x5, 0x80000000, 0x0, r2, 0x3, 0x400}}}, 0x90) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000700)=0x3) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r6, 0x114, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) keyctl$update(0x2, r7, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 278.552673] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.831427] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.838049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.845158] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.851668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.860187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.899350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:27:41 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000500)={0x0, 0x3}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x47908351}, &(0x7f00000005c0)=0x8) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r4, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(r5, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000200), 0x0, 0x4890}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0xf401000000000000, 0x300000003000000, 0x0, 0x300000000000000, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x0, {0x3, 0x2, 0x0, 0x0, 0x18c, 0x401, {0x1, 0x20, 0x5, 0xffff, 0x0, 0x100000001, 0x0, 0x100000001, 0x2470, 0x5, 0x80000000, 0x0, r2, 0x3, 0x400}}}, 0x90) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000700)=0x3) r7 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r6, 0x114, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) keyctl$update(0x2, r7, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 279.424572] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.431187] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.439862] device bridge_slave_0 entered promiscuous mode 00:27:42 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000500)={0x0, 0x3}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x47908351}, &(0x7f00000005c0)=0x8) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r4, &(0x7f0000000480), &(0x7f00000004c0)=0xc) r5 = mmap$binder(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x3000007, 0x1a7830, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)={r5}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(r6, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000200), 0x0, 0x4890}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0xf401000000000000, 0x300000003000000, 0x0, 0x300000000000000, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x0, {0x3, 0x2, 0x0, 0x0, 0x18c, 0x0, {0x1, 0x20, 0x0, 0xffff, 0x0, 0x100000001, 0x0, 0x100000001, 0x2470, 0x5, 0x80000000, 0x0, r2, 0x3, 0x400}}}, 0x90) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000700)=0x3) r8 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r7, 0x114, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) keyctl$update(0x2, r8, 0x0, 0x0) r9 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r9, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 280.326283] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.332935] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.341570] device bridge_slave_1 entered promiscuous mode [ 281.066193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 285.860237] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 285.871936] clocksource: 'acpi_pm' wd_now: c3d514 wd_last: ba7b3e mask: ffffff [ 285.881283] clocksource: 'tsc' cs_now: 9ea7f3351b cs_last: 9c0df0b253 mask: ffffffffffffffff [ 285.892020] tsc: Marking TSC unstable due to clocksource watchdog [ 285.939763] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 285.949200] sched_clock: Marking unstable (285997897538, -58156308)<-(286057160475, -117418178) [ 285.949741] clocksource: Switched to clocksource acpi_pm [ 286.250369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.385840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.883246] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:27:50 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x4) tee(r1, r1, 0x4, 0xf) getsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{0x103000, 0xd000, 0x0, 0x44, 0xffffffffffffffc1, 0xfffffffffffffeff, 0x2, 0x6, 0xfffffffffffffffa, 0x7, 0x26, 0x9}, {0x1000, 0x17000, 0xb, 0x9, 0xfcd6, 0x1f, 0x1, 0x7fffffff, 0xffff, 0x0, 0x10000, 0x2}, {0xd000, 0xd000, 0x0, 0x4, 0x660, 0x9f8, 0x8, 0x0, 0x7, 0x9, 0x9, 0xff}, {0x1004, 0x10000, 0x0, 0x89, 0xfffffffffffffffb, 0x80, 0x7, 0x4, 0x7, 0x5c1, 0x4, 0x6}, {0x0, 0xf000, 0xf, 0x200, 0x8, 0x5, 0x2, 0xfffffffffffffffc, 0x81, 0x3, 0x1, 0x8}, {0x4000, 0x7000, 0xf, 0x9, 0xfffffffffffffffc, 0x4def80000000, 0x3, 0x6, 0xd000000000000000, 0xa30, 0x6, 0x7}, {0x5000, 0x0, 0xa, 0xffffffffffffb3e4, 0x1, 0x80000001, 0x6, 0xdea7, 0x7, 0xac, 0x8, 0x1b9}, {0xf000, 0x6, 0x13, 0x7ff, 0x7fff, 0x0, 0x7fff000000, 0x100000001, 0x3f, 0x1, 0xe3, 0x2}, {0xf000, 0x7000}, {0x1000, 0x6000}, 0x8001003c, 0x0, 0x1, 0x400410, 0x3, 0x5000, 0x6004, [0x1, 0x4, 0x9, 0xffffffffffff8001]}) fcntl$setlease(r1, 0x400, 0x2) select(0x40, &(0x7f0000000200)={0x6, 0x8, 0x1000, 0x8, 0x1, 0x0, 0x4, 0x3ff}, &(0x7f0000000240)={0x8, 0x800, 0x8, 0x5, 0x0, 0x4e, 0x7, 0x5}, &(0x7f0000000280)={0x4, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x5, 0x81, 0x4}, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000380)=0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000003c0)={0x9, 0xe1, 0x0, 0x401, 0x9}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000400)=0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000004c0)={0x800, 0x3f, 0x8, 0x0, 0x10, 0x800}) timer_create(0x3, &(0x7f0000000500)={0x0, 0x1b, 0x4, @tid=r2}, &(0x7f0000000540)=0x0) timer_settime(r3, 0x1, &(0x7f0000000580)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r4 = request_key(&(0x7f0000000640)='rxrpc_s\x00', &(0x7f0000000680)={'syz', 0x3}, &(0x7f00000006c0)='GPL\x00', 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x2c, r5, 0x0, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) r6 = openat(r0, &(0x7f0000000840)='./file0\x00', 0x202680, 0x100) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000880)={0xfffffffffffffffb, 0x9, 0x8, 0x0, 0x0, [{r1, 0x0, 0xb7000000000}, {r0, 0x0, 0x7fffffff}, {r1, 0x0, 0x8}, {r1, 0x0, 0x3}, {r1, 0x0, 0xe79}, {r1, 0x0, 0x1f}, {r1, 0x0, 0x253c}, {r6, 0x0, 0xfffffffffffffffc}]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000009c0)=0xe2) ptrace$getregs(0xffffffffffffffff, r2, 0x7f, &(0x7f0000000a00)=""/24) write$P9_RXATTRWALK(r0, &(0x7f0000000a40)={0xf, 0x1f, 0x2, 0x5772}, 0xf) ioctl$sock_bt_bnep_BNEPCONNDEL(r6, 0x400442c9, &(0x7f0000000a80)={0x3, @random="4a4fcc31ae90"}) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000ac0)='logon\x00', &(0x7f0000000b00)='keyring\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000bc0)=""/217) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) [ 288.247181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 288.254393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.561225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 288.570540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.946098] 8021q: adding VLAN 0 to HW filter on device bond0 00:27:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 289.656403] IPVS: ftp: loaded support on port[0] = 21 [ 289.916190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 289.924652] team0: Port device team_slave_0 added [ 290.374037] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 290.382400] team0: Port device team_slave_1 added [ 290.451396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:27:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 290.777876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 290.785155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.794040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.210796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 291.218154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.226976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.663646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 291.671350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.680430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 00:27:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000000000000040000000000000000000000000000000000000000000380002"], 0x39) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000240), &(0x7f0000000500), 0x1000) [ 292.128230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 292.136003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.145271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.169424] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 292.176467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.184457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:27:54 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = socket(0xa, 0x3, 0x1000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r0, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) [ 293.681650] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.950985] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:27:57 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000540)) [ 296.137721] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.144332] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.152940] device bridge_slave_0 entered promiscuous mode [ 296.464413] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.470871] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.479745] device bridge_slave_1 entered promiscuous mode [ 296.549760] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.556345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.563412] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.569872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.578831] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 296.879860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 297.205135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 297.532206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.994384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 298.268439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 298.506797] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 298.518013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.777680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 298.784966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 299.710940] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.722526] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.730606] team0: Port device team_slave_0 added [ 300.055485] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.063855] team0: Port device team_slave_1 added [ 300.304003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.311040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.319918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.588384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 300.595529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.604250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.853807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.861361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.870245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.968678] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:28:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) [ 301.059439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 301.067345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.076220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.883184] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 301.889519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.897451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.638526] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.650729] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.657339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.664441] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.670914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.679367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 303.686194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.250069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.105503] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:28:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271c, &(0x7f0000000000)=""/13, &(0x7f000033bffc)=0x32) [ 308.867217] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 308.873685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.881531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.440497] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.753638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.342233] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 312.904999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 312.911379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.919545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:28:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0xa1}) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000180)=""/145) 00:28:15 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) getpid() r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x630}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xf0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x2, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) 00:28:15 executing program 2: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000100)) 00:28:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="eca34fff2d847238de6a96cedb1af0ab", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a2b824c79fb93c1a", 0x8}], 0x1, &(0x7f0000000100)}, 0x8000) writev(r1, &(0x7f0000000ac0)=[{&(0x7f0000000a80)="9159902ba24b6d8adf17972fcb379d01338e2cdf69760cb612", 0x19}], 0x1) read(r1, &(0x7f0000000bc0)=""/93, 0xfffffe0a) [ 313.737838] 8021q: adding VLAN 0 to HW filter on device team0 00:28:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006880)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000600)=""/154, 0x9a}}], 0x1, 0x0, 0x0) 00:28:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x2000000000000028, 0xb01, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 00:28:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r0, 0x0, 0x1, 0x0, &(0x7f0000000200)}, 0x20) 00:28:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r3) accept4(r4, &(0x7f0000000240)=@hci, &(0x7f0000000200)=0x80, 0x0) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) 00:28:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r4 = dup(r3) ioctl$NBD_SET_SOCK(r1, 0xab00, r4) dup3(r0, r1, 0x0) 00:28:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='B'], 0x1) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000002b00), 0x185, &(0x7f0000002b80)=""/62, 0xa4}}], 0x5e2, 0x0, 0x0) [ 315.845984] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:18 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000100)) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/60, 0x3c}], 0x1) 00:28:18 executing program 3: 00:28:18 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='stack\x00') read$eventfd(r0, &(0x7f00000000c0), 0xfffffe60) 00:28:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={"62726f64256500056400", 0x20, 0x1, 0x160, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000040), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'team_slave_1\x00', 'veth0_to_team\x00', 'team_slave_0\x00', 'veth0_to_bridge\x00', @local, [0xff, 0xff, 0xff], @broadcast, [], 0x70, 0xa0, 0xd0}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x7fff}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1d8) 00:28:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0xd0, 0x0) 00:28:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) 00:28:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000c95ffd), 0x0, 0x0, &(0x7f000057bff0)={0x2, 0x4e22, @multicast1}, 0x10) 00:28:18 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000440)="153f6234488dd25d766070") r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={"62726f64256500056400", 0x20, 0x1, 0x160, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000040), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'team_slave_1\x00', 'veth0_to_team\x00', 'team_slave_0\x00', 'veth0_to_bridge\x00', @local, [], @broadcast, [], 0x70, 0xa0, 0xd0}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x7fff}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1d8) 00:28:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x7, 0x0, @remote}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r3, 0x1000000000015) 00:28:18 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000000000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000240), &(0x7f0000000500), 0x1000) 00:28:18 executing program 0: syz_emit_ethernet(0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd606805d300443b00fe8000000000000000000000000000bb00000000000000000000ffffac1414bb0420880b0400000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000e9ffffffffffff0700655800000000"], &(0x7f0000000040)) 00:28:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000240)={0x81}) 00:28:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = getpid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x30000, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000003c0)={{0x2, 0x4e24, @rand_addr=0x81}, {0x306}, 0x0, {0x2, 0x4e20, @rand_addr=0xff}, 'syz_tun\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r0, 0xa}, 0x10) wait4(r1, &(0x7f0000000200), 0x9, &(0x7f0000000240)) 00:28:19 executing program 5: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6ff7f00000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 00:28:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x40101) write$sndseq(r0, &(0x7f00000001c0), 0x0) r1 = epoll_create(0xaa1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x80, 0x7d}) [ 317.353054] usb usb9: usbfs: process 7946 (syz-executor3) did not claim interface 0 before use 00:28:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x7, 0x4) [ 317.443162] usb usb9: usbfs: process 7949 (syz-executor3) did not claim interface 0 before use 00:28:19 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00006c4f60)=[{&(0x7f00000002c0)="b5", 0x1}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 00:28:19 executing program 4: socket$inet6(0xa, 0x3, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa1}) 00:28:20 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000180)="6e732f70696400959fb20f3acfff630ec6a07133234b87db71573cd2c4d2bf346ee3cc30e8bf34db876687a259d656762cc5b46c051780985ff3bd746a8d2443bf2baeef78eba57ac68abb8bd52d7905379d9c123a432a4468e3b7ad2da49e236d73627bbda6823acadf5a7d28c1ad117ca2e2c3ab9db43b5683fc878b5f875ca48f7b816e3af068429cc3c0a2da598282fcd8448213f7777407f5125c2cb40c5edc7535a6e70f619f8a9493ab0a8df5ade23c0997d6cce93b72e11ffa834bfd7d10aa7ae6a4d76b4350bb1085af692fad88e9e9d12ac709b69f5ad96e04156f1d25f27671e3ca7d621b1935ab3d9f") 00:28:20 executing program 5: futex(&(0x7f0000000340)=0x400, 0x88, 0x0, &(0x7f0000000040), &(0x7f00000000c0), 0x0) [ 318.044309] usb usb8: usbfs: process 7975 (syz-executor4) did not claim interface 0 before use 00:28:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x7, 0x0, @remote}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r3, 0x1000000000015) 00:28:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f00000000c0)) 00:28:20 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x4}, &(0x7f0000000340)=0x18) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000580)={&(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x3, 0x8}) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) dup(0xffffffffffffffff) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0xffff, 0x0, 0x10001, 0x5}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000200)={0x80, r1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)) tee(r2, r3, 0x0, 0x8) 00:28:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x7, 0x4) 00:28:20 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00006c4f60)=[{&(0x7f00000002c0)="b5", 0x1}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3d00c6fc390144fb13296539860415a3a3d2580ccf43f0da4", 0x19}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0x0, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read(r1, &(0x7f0000000000)=""/253, 0xfd) 00:28:20 executing program 0: mmap$binder(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) futex(&(0x7f0000000100), 0x84, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0x0) 00:28:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000030000000000000000000000950000fe00000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r0, r1}) sendmmsg(r3, &(0x7f0000006680)=[{{&(0x7f0000001fc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000002340)=[{&(0x7f0000002140)="f9c066", 0x3}], 0x1, &(0x7f0000003a80)=ANY=[]}}], 0x1, 0x0) r4 = socket$inet6(0xa, 0x2000000000000803, 0x8) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") close(r2) recvmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000500)=""/243, 0xf3}, 0x0) 00:28:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000010004002) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1001, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4f469eeadd8f49f7015aed4a9cc1160f197891c4edf0df07bdbd5677571097d8fbcd4e57a4088097b9b4b1d24deb7cbaa3234c100a45f484d604d65cc5931f8f", "b73b5683d0a5d7d755d8a51cb064d093f45cc07c98ea638ce1c0f04a40a8d858"}) 00:28:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = getpid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x30000, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000003c0)={{0x2, 0x4e24, @rand_addr=0x81}, {0x306}, 0x0, {0x2, 0x0, @rand_addr=0xff}, 'syz_tun\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r0, 0xa}, 0x10) wait4(r1, &(0x7f0000000200), 0x9, &(0x7f0000000240)) [ 319.147828] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:28:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x5, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x19, 0xfcffffff], [], @remote}}]}]}, 0x2c}}, 0x0) 00:28:21 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000280)={0x100000001}) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x6) r2 = fcntl$dupfd(r1, 0x406, r1) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000400)={0x42, 0x6, 0x0, {0x1, 0x4, 0x19, 0x0, "1b58f8bd23ebe0d87390b7b5d3a661d391314785e9df5d92ad"}}, 0x42) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendfile(r2, r0, &(0x7f0000000240)=0x60, 0x5a09) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0x7d0000}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x7}, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@mcast1, @empty, @dev, 0x8, 0xfd, 0xffffffffffffffff, 0x0, 0x8, 0x40, r3}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000200)={'syz_tun\x00', {0x2, 0x4e20, @dev}}) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x5f02, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) [ 319.428310] ================================================================== [ 319.431946] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x4a8/0xba0 [ 319.438046] CPU: 1 PID: 8032 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #70 [ 319.438046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.438046] Call Trace: [ 319.438046] dump_stack+0x306/0x460 [ 319.438046] ? tipc_nl_compat_name_table_dump+0x4a8/0xba0 [ 319.438046] kmsan_report+0x1a2/0x2e0 [ 319.475148] __msan_warning+0x7c/0xe0 [ 319.475148] tipc_nl_compat_name_table_dump+0x4a8/0xba0 [ 319.475148] ? tipc_nlmsg_parse+0x206/0x230 [ 319.488886] ? tipc_nl_compat_name_table_dump_header+0x1f0/0x1f0 [ 319.488886] __tipc_nl_compat_dumpit+0x59e/0xdb0 [ 319.488886] tipc_nl_compat_dumpit+0x63a/0x820 [ 319.488886] tipc_nl_compat_recv+0x1402/0x2760 [ 319.488886] ? INIT_BOOL+0xc/0x30 [ 319.488886] ? tipc_nl_compat_link_reset_stats+0x370/0x370 [ 319.488886] ? tipc_nametbl_stop+0x1040/0x1040 [ 319.488886] ? tipc_nl_compat_name_table_dump_header+0x1f0/0x1f0 [ 319.488886] ? tipc_netlink_compat_stop+0x40/0x40 [ 319.488886] genl_rcv_msg+0x185c/0x1a20 [ 319.488886] ? kmsan_set_origin+0x83/0x140 [ 319.488886] netlink_rcv_skb+0x394/0x640 [ 319.488886] ? genl_unbind+0x380/0x380 [ 319.488886] genl_rcv+0x63/0x80 [ 319.488886] netlink_unicast+0x166d/0x1720 [ 319.488886] ? genl_pernet_exit+0x90/0x90 [ 319.488886] netlink_sendmsg+0x1391/0x1420 [ 319.488886] ___sys_sendmsg+0xe47/0x1200 [ 319.488886] ? netlink_getsockopt+0x1560/0x1560 [ 319.488886] ? __fget+0x8f7/0x940 [ 319.488886] ? __fdget+0x318/0x430 [ 319.488886] __se_sys_sendmsg+0x307/0x460 [ 319.488886] __x64_sys_sendmsg+0x4a/0x70 [ 319.488886] do_syscall_64+0xbe/0x100 [ 319.488886] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.488886] RIP: 0033:0x457569 [ 319.488886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.488886] RSP: 002b:00007fb5edc4dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.488886] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 319.488886] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 319.488886] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.488886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5edc4e6d4 [ 319.488886] R13: 00000000004c387d R14: 00000000004d56d0 R15: 00000000ffffffff [ 319.488886] [ 319.488886] Uninit was created at: [ 319.488886] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 319.488886] kmsan_kmalloc+0xa4/0x120 [ 319.488886] kmsan_slab_alloc+0x10/0x20 [ 319.488886] __kmalloc_node_track_caller+0xb43/0x1400 [ 319.488886] __alloc_skb+0x422/0xe90 [ 319.488886] netlink_sendmsg+0xcaf/0x1420 [ 319.488886] ___sys_sendmsg+0xe47/0x1200 [ 319.488886] __se_sys_sendmsg+0x307/0x460 [ 319.488886] __x64_sys_sendmsg+0x4a/0x70 [ 319.488886] do_syscall_64+0xbe/0x100 [ 319.488886] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.488886] ================================================================== [ 319.488886] Disabling lock debugging due to kernel taint [ 319.488886] Kernel panic - not syncing: panic_on_warn set ... [ 319.488886] [ 319.488886] CPU: 1 PID: 8032 Comm: syz-executor3 Tainted: G B 4.19.0-rc8+ #70 [ 319.488886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.488886] Call Trace: [ 319.488886] dump_stack+0x306/0x460 [ 319.488886] panic+0x54c/0xafa [ 319.488886] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 319.488886] kmsan_report+0x2d3/0x2e0 00:28:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f000000d700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe7, &(0x7f000000d940)}, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000100)='cgroup.events\x00', r3}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000340)) socket$kcm(0x11, 0x0, 0x300) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000006c0)={0x0, 0x70, 0x80, 0x74, 0x0, 0x8, 0x0, 0x31fe, 0x480, 0x7, 0x0, 0x80000000, 0xfffffffffffffff7, 0xffff, 0x4, 0x0, 0xe4cf, 0x4, 0x20, 0x1000, 0x3, 0x7f, 0x0, 0x7ff, 0x0, 0x1f, 0x0, 0xf775, 0x2, 0x3, 0x9a97, 0x5, 0x0, 0x7, 0x0, 0x0, 0x9, 0x8, 0x0, 0x3, 0x2, @perf_config_ext={0x3845, 0x10000}, 0x10028, 0x8, 0x1, 0x7, 0x7f, 0x10001, 0x3d}) openat$cgroup(r4, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xd, 0xf6, &(0x7f00000000c0)="410b8a8046c3a988fbc5f08e8e", &(0x7f00000001c0)=""/246, 0xffffffff00000f20}, 0x28) r6 = openat$cgroup_ro(r4, &(0x7f0000000680)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r6, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) close(r0) 00:28:21 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000100)) 00:28:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000001440)=@in6={0xa, 0x0, 0x0, @dev}, 0x1c, &(0x7f0000001480), 0x0, &(0x7f0000000000)=ANY=[]}, 0x40) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 319.488886] __msan_warning+0x7c/0xe0 [ 319.488886] tipc_nl_compat_name_table_dump+0x4a8/0xba0 [ 319.488886] ? tipc_nlmsg_parse+0x206/0x230 [ 319.788260] ? tipc_nl_compat_name_table_dump_header+0x1f0/0x1f0 [ 319.788260] __tipc_nl_compat_dumpit+0x59e/0xdb0 [ 319.788260] tipc_nl_compat_dumpit+0x63a/0x820 [ 319.788260] tipc_nl_compat_recv+0x1402/0x2760 [ 319.788260] ? INIT_BOOL+0xc/0x30 [ 319.788260] ? tipc_nl_compat_link_reset_stats+0x370/0x370 [ 319.788260] ? tipc_nametbl_stop+0x1040/0x1040 [ 319.821998] ? tipc_nl_compat_name_table_dump_header+0x1f0/0x1f0 [ 319.821998] ? tipc_netlink_compat_stop+0x40/0x40 [ 319.821998] genl_rcv_msg+0x185c/0x1a20 [ 319.821998] ? kmsan_set_origin+0x83/0x140 [ 319.821998] netlink_rcv_skb+0x394/0x640 [ 319.821998] ? genl_unbind+0x380/0x380 [ 319.821998] genl_rcv+0x63/0x80 [ 319.821998] netlink_unicast+0x166d/0x1720 [ 319.821998] ? genl_pernet_exit+0x90/0x90 [ 319.821998] netlink_sendmsg+0x1391/0x1420 [ 319.821998] ___sys_sendmsg+0xe47/0x1200 [ 319.821998] ? netlink_getsockopt+0x1560/0x1560 [ 319.821998] ? __fget+0x8f7/0x940 [ 319.821998] ? __fdget+0x318/0x430 [ 319.821998] __se_sys_sendmsg+0x307/0x460 [ 319.821998] __x64_sys_sendmsg+0x4a/0x70 [ 319.821998] do_syscall_64+0xbe/0x100 [ 319.821998] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.821998] RIP: 0033:0x457569 [ 319.821998] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.821998] RSP: 002b:00007fb5edc4dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.821998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 319.821998] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 319.821998] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.821998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb5edc4e6d4 [ 319.821998] R13: 00000000004c387d R14: 00000000004d56d0 R15: 00000000ffffffff [ 319.821998] Kernel Offset: disabled [ 319.821998] Rebooting in 86400 seconds..