[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.132301] kauditd_printk_skb: 8 callbacks suppressed [ 28.132314] audit: type=1800 audit(1544390922.955:29): pid=5864 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.158421] audit: type=1800 audit(1544390922.965:30): pid=5864 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.141' (ECDSA) to the list of known hosts. 2018/12/09 21:28:53 fuzzer started 2018/12/09 21:28:55 dialing manager at 10.128.0.26:38851 2018/12/09 21:28:55 syscalls: 1 2018/12/09 21:28:55 code coverage: enabled 2018/12/09 21:28:55 comparison tracing: enabled 2018/12/09 21:28:55 setuid sandbox: enabled 2018/12/09 21:28:55 namespace sandbox: enabled 2018/12/09 21:28:55 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/09 21:28:55 fault injection: enabled 2018/12/09 21:28:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/09 21:28:55 net packet injection: enabled 2018/12/09 21:28:55 net device setup: enabled 21:30:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'lo\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000001400040043420000310000000000000000000000f17897ea666dd0e8bb176e948bbedff3297dfddd99e6c32015367438f046a6f4b842f8c252d5f5c3442b0ff9adfaefa5c9912aeec49c05555e0acbc8254f29bac176804df77906cdbc56eb4cd0cea4bfd09f137adcea140d6a235bb021a7621ad73d2e5038e54014ac"], 0x1}}, 0x0) syzkaller login: [ 122.356939] IPVS: ftp: loaded support on port[0] = 21 21:30:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) [ 122.652081] IPVS: ftp: loaded support on port[0] = 21 21:30:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f00000002c0)="aa", 0x1}], 0x1, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 122.971522] IPVS: ftp: loaded support on port[0] = 21 21:30:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) sendmmsg(r4, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000680)='2', 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") [ 123.547227] IPVS: ftp: loaded support on port[0] = 21 21:30:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x40030000000000, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x7f6ffff00000000}}]}]}, 0x2c}}, 0x0) [ 123.922131] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.944167] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.951656] device bridge_slave_0 entered promiscuous mode [ 124.066803] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.073298] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.096219] device bridge_slave_1 entered promiscuous mode [ 124.143496] IPVS: ftp: loaded support on port[0] = 21 [ 124.253581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 124.421748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:30:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x35, 0x0, 0x0, 0x10}}, &(0x7f0000000240)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) [ 124.505041] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.524152] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.532523] device bridge_slave_0 entered promiscuous mode [ 124.652771] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.684138] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.699561] device bridge_slave_1 entered promiscuous mode [ 124.811497] IPVS: ftp: loaded support on port[0] = 21 [ 124.827384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 124.862628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.970651] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.994605] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.002934] device bridge_slave_0 entered promiscuous mode [ 125.013533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.034840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.171066] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.205094] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.212500] device bridge_slave_1 entered promiscuous mode [ 125.332697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.412596] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.448159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.551225] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.655336] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.679938] team0: Port device team_slave_0 added [ 125.734144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 125.741420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.776055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.783474] team0: Port device team_slave_1 added [ 125.915976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.926179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.968151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.993902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.026559] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.032936] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.055163] device bridge_slave_0 entered promiscuous mode [ 126.070594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.091603] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.160039] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.196295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.215465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.249508] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.269203] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.286353] device bridge_slave_1 entered promiscuous mode [ 126.313784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.343493] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.374721] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.382172] device bridge_slave_0 entered promiscuous mode [ 126.393309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.404178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.433579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.447412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.469034] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.485284] team0: Port device team_slave_0 added [ 126.494178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.505726] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.512087] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.532001] device bridge_slave_1 entered promiscuous mode [ 126.556866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.631273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.655709] team0: Port device team_slave_1 added [ 126.695237] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.768979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 126.784342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 126.793903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.864544] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.886196] team0: Port device team_slave_0 added [ 126.892203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.927476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 126.948891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 126.956935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.003441] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.046625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 127.054797] team0: Port device team_slave_1 added [ 127.064104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 127.082416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.102397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.140860] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.162770] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.180573] device bridge_slave_0 entered promiscuous mode [ 127.199990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 127.212220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.231496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.265795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.276244] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.293683] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 127.344321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.364912] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.371277] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.400549] device bridge_slave_1 entered promiscuous mode [ 127.429069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 127.445661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.462610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.489788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.511356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 127.532476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.549945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.577599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 127.592451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.603818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.641501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.684718] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.714561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.787361] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.793843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.800957] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.807374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.830765] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.853813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.878653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.034991] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 128.055829] team0: Port device team_slave_0 added [ 128.104854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 128.200313] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 128.216410] team0: Port device team_slave_1 added [ 128.242319] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 128.286368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.340010] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 128.364768] team0: Port device team_slave_0 added [ 128.377090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.464484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 128.471922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.481135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.507221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.523140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 128.534178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.550028] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 128.559134] team0: Port device team_slave_1 added [ 128.624723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 128.631826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.645919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.716062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 128.744447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.752825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.842778] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.849248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.855999] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.862362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.875212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 128.915488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 128.922408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.933092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.976918] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 128.999486] team0: Port device team_slave_0 added [ 129.034941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.042741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.064738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.122977] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 129.130689] team0: Port device team_slave_1 added [ 129.142822] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.149234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.155983] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.162352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.181332] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 129.225407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.281105] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 129.303476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.323881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.359621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.459765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.478901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.514750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.521973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.554783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.625262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 129.638593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.649014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.221303] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.227736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.234452] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.240831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.280418] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 130.503545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.749751] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.756223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.762891] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.769340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.789907] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.048426] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.054908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.061568] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.068030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.076468] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 131.504516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.524821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.142953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.651793] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 133.856924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.134995] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.141179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.155069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.304394] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.389220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.650844] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.806856] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.838224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.853234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.868498] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.332728] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 135.349898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.363487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.375634] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.717599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.863387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.902507] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.085375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.183399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.324782] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.588089] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.627812] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.642562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.653033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.785349] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.791511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.804932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.065187] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.071365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.087974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.115732] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.274835] 8021q: adding VLAN 0 to HW filter on device team0 21:30:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x24, 0x18, 0x20b, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8}]}, 0x24}}, 0x0) [ 137.589036] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.654902] netlink: 'syz-executor0': attribute type 21 has an invalid length. 21:30:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x400000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:30:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x400000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:30:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) 21:30:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, 0x0) 21:30:33 executing program 0: syz_emit_ethernet(0x90, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "49d442", 0x5a, 0x0, 0x0, @remote, @dev, {[], @icmpv6=@ni={0x8c, 0x0, 0x0, 0x3ed, 0x0, 0xfffffffffffff801, "9afeb3da867ebecfa7e9b15feab4f5ac7c548949f36a58f2d76d09d1edc9616a219469d101c69bd534451fc37e74101ce62a0b6276235ae50c6845a75d32e2745dd134dafb8419d3a8fd"}}}}}}, 0x0) 21:30:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000640)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 21:30:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") 21:30:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write(r2, &(0x7f0000000000)="e1", 0x1) [ 139.771070] netlink: zone id is out of range [ 139.776888] netlink: get zone limit has 4 unknown bytes 21:30:35 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmsg(r0, &(0x7f00003d6fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000f9fff8)=""/90, 0x5a}, 0x0) 21:30:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f31") 21:30:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000007400)={&(0x7f0000000600)=@newlink={0x40, 0x10, 0x313, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x40}}, 0x0) 21:30:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bd000000000000000000000000000000000000000000000000000000000000000000000000b280c77108f9346125a438e195f55408fd32e54211ccaed6629872d377ca2601aef700857cbec3f994157b288a274cc6d9755f9e51a96d256f7931c7d728810dda4edf5aa1aeaa64041522a6858c509cfae9b611682bac5bda4a76aa6e1b38001963ede393e05383c30bba552825638afcbc9e02bbfceafb8f3c26b2d1025a82a791964561a47bf0496006796ef1615efb2a64e4f04b1cd2aab2c88c572c0520fa962477547c8506177f1742f38a98d7d5530c322703e21b6cfc10e17ba1e7d3f46827000000000000000000"], 0x1}}, 0x0) 21:30:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)) 21:30:35 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(seed)\x00'}, 0x58) vmsplice(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="18", 0x1}], 0x1, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0xe) 21:30:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) 21:30:35 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000805000), 0xfe55) clock_gettime(0x0, &(0x7f0000000e00)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000580)=""/230, 0xe6}], 0x1}}], 0x1, 0x10000, &(0x7f0000000e40)={r2, r3+30000000}) [ 140.526568] netlink: 'syz-executor0': attribute type 2 has an invalid length. 21:30:35 executing program 1: epoll_create(0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x3f4) 21:30:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000007400)={&(0x7f0000000600)=@newlink={0x48, 0x10, 0x313, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) 21:30:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x154, 0x0) 21:30:35 executing program 3: [ 140.665851] netlink: 'syz-executor0': attribute type 2 has an invalid length. 21:30:35 executing program 5: [ 140.710589] netlink: 'syz-executor0': attribute type 3 has an invalid length. 21:30:35 executing program 5: 21:30:35 executing program 3: 21:30:35 executing program 0: 21:30:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0x24}}, 0x0) 21:30:36 executing program 4: 21:30:36 executing program 0: 21:30:36 executing program 3: 21:30:36 executing program 2: 21:30:36 executing program 5: 21:30:36 executing program 1: 21:30:36 executing program 4: 21:30:36 executing program 0: 21:30:36 executing program 3: 21:30:36 executing program 5: 21:30:36 executing program 0: 21:30:36 executing program 3: 21:30:36 executing program 4: 21:30:36 executing program 1: 21:30:36 executing program 2: 21:30:36 executing program 5: 21:30:36 executing program 4: 21:30:37 executing program 3: 21:30:37 executing program 0: 21:30:37 executing program 5: 21:30:37 executing program 2: 21:30:37 executing program 1: 21:30:37 executing program 5: 21:30:37 executing program 1: 21:30:37 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) 21:30:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x40030000000000, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x2, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x7f6ffff00000000}}]}]}, 0x2c}}, 0x0) 21:30:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f00000003c0)) 21:30:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) 21:30:37 executing program 5: [ 142.451341] netlink: zone id is out of range 21:30:37 executing program 1: [ 142.486101] netlink: del zone limit has 4 unknown bytes 21:30:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x6, 0x8000, 0x23}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000), 0x0}, 0x20) 21:30:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@empty, 0x0, 0x0, 0x0, 0xc}, 0x20) 21:30:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x3c}}, 0x0) 21:30:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x20) 21:30:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x0, @my}}) 21:30:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x10f1, &(0x7f0000002700)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3, 0x6, "46d5af", 0x10bb, 0x33, 0x0, @mcast1, @dev={0xfe, 0x80, [], 0x20}, {[@hopopts={0xff, 0x203, [], [@generic={0x5, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x20}, @jumbo={0xc2, 0x4, 0x3b5}, @hao={0xc9, 0x10, @mcast2}]}, @routing={0x84, 0x4, 0x0, 0x0, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x15}]}, @routing={0x77, 0x8, 0x0, 0x2, 0x0, [@remote, @ipv4={[], [], @multicast1}, @dev={0xfe, 0x80, [], 0x1c}, @empty]}], @tcp={{0x4e21, 0x4e24, 0x41424344, 0x41424344, 0xffffffffffffffff, 0x0, 0x5, 0x54, 0x5, 0x0, 0x400}, {"92d745bd67f675136ba7e180d071c7"}}}}}}}, 0x0) 21:30:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000000), &(0x7f00000041c0)=0x4) [ 142.658876] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 21:30:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 21:30:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/7, 0x7}], 0x2}}], 0x1, 0x0, 0x0) 21:30:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x77, &(0x7f0000000140)=@assoc_value, 0x8) 21:30:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, 0x0, 0x0) 21:30:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r0) close(r1) 21:30:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x6, 0x8000, 0x23}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0}, 0x20) 21:30:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001700)}}], 0x40000e5, 0x0) 21:30:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 21:30:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendto(r0, &(0x7f0000000340)="758934da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea44870dd6b4e7e87ec42d4a8cfe2940ddd6a1b68a8b114bf5fc57a24b948eed855edf063898f64a0ce82678a3be37f9d56de9535406c2810de8f314a51ae300d351825ded003652d5ab0b30f7ced329324632f710076a9f79c3221e90ec03803b6ecd5595646214e391a3cfd74ca98d098d3fac9fccd6b0905b03f3c6a50eeef0e61cd07ad75b39267a304fb12bdde7b4d06e64a42aee0504ae42f36f13d5e3002975f648e632ec25aa10429d84a078914a28c47ae0b143f43b100790646f1f7bb25191ab9d0b210e18f5610749521e385a7dc15b6b946baa49a0b35b4c56947b57279e5b5e3d04baab408442f3ba124cc70dadeb8a564eb796fb7975859f50a8a41ebc9baf1ab48855b54d47884126e66d890d714fd57c5dec487bfb5d94c839d9bbe57e70dead6a26d44af14b53a620424cb3404a7e3961c7ff568f6345f6cc3a5c49be7e76a33e652acf88b3bbbe6f83bc49621654627eedc41393250fdc3f997f6aa3f4f8ba8184c8fc5fe9bd37ca8081077b72e93af80af9bf4a47f943df12bc25ca1f25fb5bc39fbe685aed03e20269fa1ceda0d1c31754b974081a14ec6801ab751acc29aff079fcde12237555463bf13eb77e16eeb6ae8aa7fe36806826fb5e4f86fa757ba66c7dc0ac4ffdfe411db3a40b1d0d6a79b1585122cc1d0c3a18f0aab8ac72942451f67ec6cc6fed353239f10a99c2a836b90320b803c04f931e6ffdad5d3dda56e62d379cd76eb87b8c9470cee2348913f2260e3ae0213183c4898c3d64bb826a5d227cc05e005538b1ac4e70f6fdda5e16b67a471c0d655e21c7dd5aa647058146104cad84a32002de9857704c66c162f866795076a503f69192fd49ffd327ac385012bc66edb2e14f0af6b53feeb6d8271391edd74396a986baa072bdf5221e829c7d8241cfb1c866112c8ca033e34fd845d84c5bc054646057fa523f757dcf484c8747314c5a1f5f11b3e0ba45edd10e09e9e2925fe4229bd155a1cc62a8928686d6518b3f0da7d39a2b26368bd07f9a3222ce9b3fe41b12988b004543879ac863842e0a81ee7b9ebc1a98bdb020d617c00953a9cd98632b7b2024f6be6cb8795688c131950a77579850aef05278eb5e7692a6bb52200a0d37327ceff14d7f75fa6f6058197caf451ff520a80e05231db86fd254da587cd70d0b8c74b1a81be258aa355968d5730c0c5234a85dde00fabc96ecfe2d483ebe79487124d5bc77b03fefba765c138d0302e2d3c65dbf6f2833aea785a0c66ec6cd7ad463aa158a23185ee494f886e35cc7051fab1ebd22751200c3790e090d122490a330df980e1e60f9930bca4410adc36e4fb5be6241e3db72972371e6da890306ac9a3bc9b5ce6ef3a71a5ce0652a17433edbc46da151d1cecf946a52c9cd9dba5021924e6f3d038d10d27d424e152e852bd1095bdc533c6b9f43f6e9ef2714d7e6c26da09ad3f6d22dc8ff14d3546a339e3be4751b422054be4199bc05d6a71f4a236bf9e5681e23e1a4b9943ebeb1424f89596afed8c61d3c7e6554959fefd8a192", 0x50f, 0x0, 0x0, 0x0) 21:30:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x752821c408c56f18) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000007c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[{0x10}], 0x10}, 0x8001}], 0x1, 0x0) 21:30:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020f00001000000000000000000000000800120000000100000000000000000006000002000000000000000000000200e0004001000000000000000000b2d4000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000200c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x40000000000011d, 0x0) 21:30:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) 21:30:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000180), 0x0}, 0x20) 21:30:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x6, 0x8000, 0x23}, 0x2c) 21:30:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendto(r0, &(0x7f0000000340)="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", 0x50f, 0x0, 0x0, 0x0) 21:30:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000b80)=@setneightbl={0x20, 0x43, 0x501, 0x0, 0x0, {0x2}, [@NDTA_NAME={0xc, 0x1, "f37573657200"}]}, 0x20}}, 0x0) 21:30:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x4924924924922c9, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 21:30:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") 21:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @remote}}) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000140), 0x4) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:30:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4}, 0x8) 21:30:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r1, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={&(0x7f0000000080), 0xc, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000008060501ff0080fffd050012000000000c000100060000007d0a06010c000200070022ff02f10020"], 0x2c}}, 0x0) [ 143.755298] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 21:30:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) gettid() sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 143.836512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 143.854465] sctp: [Deprecated]: syz-executor3 (pid 7864) Use of struct sctp_assoc_value in delayed_ack socket option. [ 143.854465] Use struct sctp_sack_info instead [ 143.878608] netlink: 'syz-executor4': attribute type 1 has an invalid length. 21:30:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x40000200000010) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) 21:30:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x40030000000000, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x7f6ffff00000000}}]}]}, 0x2c}}, 0x0) [ 143.898388] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 143.911604] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 143.934760] netlink: 'syz-executor4': attribute type 1 has an invalid length. [ 143.938827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 143.955534] sctp: [Deprecated]: syz-executor3 (pid 7864) Use of struct sctp_assoc_value in delayed_ack socket option. [ 143.955534] Use struct sctp_sack_info instead [ 143.987025] netlink: zone id is out of range [ 143.988028] netlink: 'syz-executor4': attribute type 1 has an invalid length. 21:30:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000200), 0x0}, 0x20) 21:30:38 executing program 3: [ 144.000672] netlink: set zone limit has 4 unknown bytes 21:30:38 executing program 5: 21:30:38 executing program 0: 21:30:39 executing program 3: 21:30:39 executing program 4: 21:30:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @remote}}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c, 0x800) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:30:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="000000000800060000000000"], 0x1}}, 0x0) 21:30:39 executing program 2: 21:30:39 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 21:30:39 executing program 3: 21:30:39 executing program 4: [ 144.611739] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 21:30:39 executing program 0: 21:30:39 executing program 5: 21:30:39 executing program 2: 21:30:39 executing program 3: 21:30:39 executing program 1: 21:30:39 executing program 4: 21:30:39 executing program 0: 21:30:39 executing program 5: 21:30:39 executing program 2: 21:30:39 executing program 4: 21:30:39 executing program 3: 21:30:39 executing program 1: 21:30:39 executing program 0: 21:30:39 executing program 5: 21:30:39 executing program 4: 21:30:39 executing program 2: 21:30:39 executing program 3: 21:30:39 executing program 1: 21:30:39 executing program 0: 21:30:39 executing program 5: 21:30:40 executing program 3: 21:30:40 executing program 0: 21:30:40 executing program 4: 21:30:40 executing program 2: 21:30:40 executing program 5: 21:30:40 executing program 2: r0 = socket$inet(0x2, 0x80003, 0x2) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) ioctl$sock_proto_private(r0, 0x200000089e0, &(0x7f0000000080)) 21:30:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0xcf}], 0x1}}], 0x1, 0x0, 0x0) 21:30:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 21:30:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x28, 0x15, 0x5, 0x0, 0x0, {0x1}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 21:30:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 21:30:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f0234123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000001940)=@setlink={0x20, 0x13, 0x1}, 0x20}}, 0x0) 21:30:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket(0x80000000010, 0x80802, 0x0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a1ff51108000100020100020800028001000000", 0x24) 21:30:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x3f4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040), 0x10) 21:30:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040), &(0x7f00000041c0)=0xcd) 21:30:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2f, '-,mory'}]}, 0x1) 21:30:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffa5, 0x0, 0x0, 0x10}}, &(0x7f0000000240)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 21:30:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x0) 21:30:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_newroute={0x38, 0x18, 0x20b, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x8}, @RTA_IIF={0x8}, @RTA_MULTIPATH={0xc, 0x9, {0x8}}]}, 0x38}}, 0x0) 21:30:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000d00)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:30:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000000080)=0x1, 0x4) sendmmsg(r4, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000680)='2', 0x1}], 0x1}}], 0x1, 0x4000001) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") [ 145.681680] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:30:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000001940)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x10, 0x1, [@typed={0xc, 0x7, @str='syz_tun\x00'}]}]}, @IFLA_IFNAME={0x14, 0x3, 'bond_slave_1\x00'}]}, 0x48}}, 0x0) [ 145.760494] netlink: 'syz-executor5': attribute type 21 has an invalid length. [ 145.788753] netlink: 'syz-executor2': attribute type 1 has an invalid length. 21:30:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000007440)={0x0, 0x0, &(0x7f0000007400)={&(0x7f0000000600)=@newlink={0x48, 0x10, 0x313, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}], @gre_common_policy=[@IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) 21:30:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) 21:30:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000000)='[', 0x1, 0x0, 0x0, 0x0) [ 145.906113] netlink: 'syz-executor5': attribute type 2 has an invalid length. [ 145.939222] netlink: 'syz-executor5': attribute type 3 has an invalid length. 21:30:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, 0x0, 0x0, 0x8050, 0x0, 0x0) accept$unix(r2, &(0x7f0000000380), 0x0) 21:30:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000002840)={&(0x7f0000000240)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000002800)=[@cred={0x18, 0x1, 0x2, r1}], 0x18, 0x20040004}, 0x4000080) 21:30:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000640)=0x5, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) 21:30:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=@ipv4_delroute={0x1c, 0x19, 0x311}, 0x1c}}, 0x0) 21:30:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r1, 0x0) shutdown(r1, 0x0) 21:30:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@mcast1, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x803, @dev, 0x6}, 0x1c) 21:30:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00'}) 21:30:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) accept$unix(r2, &(0x7f0000000380), 0x0) accept4(r2, 0x0, 0x0, 0x0) 21:30:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r1, r2}) write$binfmt_elf32(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 21:30:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0xc2}}, 0x0, 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 21:30:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x27e) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) 21:30:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmsg(r1, &(0x7f00003d6fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000f9fff8)=""/90, 0x5a}, 0x0) 21:30:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) close(r1) [ 147.432852] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:30:42 executing program 3: r0 = socket$inet6(0xa, 0x80100000002, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@dev, @loopback, @dev, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1000000}) 21:30:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000900)=@newlink={0x30, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 21:30:42 executing program 0: r0 = socket$inet6(0xa, 0x4000000000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x8) close(r0) 21:30:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @multicast1}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'lo\x00'}) 21:30:42 executing program 4: 21:30:42 executing program 3: 21:30:42 executing program 2: 21:30:42 executing program 4: 21:30:42 executing program 0: 21:30:42 executing program 5: 21:30:42 executing program 1: 21:30:42 executing program 3: 21:30:43 executing program 4: 21:30:43 executing program 1: 21:30:43 executing program 3: 21:30:43 executing program 5: 21:30:43 executing program 0: 21:30:43 executing program 2: 21:30:43 executing program 1: 21:30:43 executing program 5: 21:30:43 executing program 3: 21:30:43 executing program 0: 21:30:43 executing program 4: 21:30:43 executing program 2: 21:30:43 executing program 1: 21:30:43 executing program 5: 21:30:43 executing program 4: 21:30:43 executing program 3: 21:30:43 executing program 0: 21:30:43 executing program 2: 21:30:43 executing program 5: 21:30:43 executing program 1: 21:30:43 executing program 4: 21:30:43 executing program 3: 21:30:43 executing program 2: 21:30:43 executing program 0: 21:30:43 executing program 1: 21:30:43 executing program 5: 21:30:43 executing program 4: 21:30:43 executing program 3: 21:30:43 executing program 0: 21:30:43 executing program 2: 21:30:43 executing program 3: 21:30:43 executing program 4: 21:30:43 executing program 5: 21:30:43 executing program 0: 21:30:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=@routing, 0x8) close(r1) 21:30:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x7, 0x7) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x80000) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={"677265300000000000000000000000ff", &(0x7f0000000040)=@ethtool_ts_info={0x41, 0x0, 0x0, 0x0, [0x0, 0x7fffffff]}}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) 21:30:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x32, 0xffffffffffffffff, 0x0) sendmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmsg(r1, &(0x7f00003d6fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000f9fff8)=""/90, 0x5a}, 0x0) 21:30:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@bridge_getlink={0x20, 0x12, 0x88b1dc089af64ad5}, 0x20}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={"6c6f00fffd835a765ed4c714b000", 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@ipv4_newroute={0x24, 0x18, 0x521, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r2}]}, 0x24}, 0x14}, 0x0) 21:30:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000180)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000100)=[@rights={0x18, 0x1, 0x1, [r1, r1]}], 0x18}], 0x1, 0x0) 21:30:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000002440)=ANY=[@ANYRES16], 0x2) sendto$inet(r3, 0x0, 0x0, 0xc000, &(0x7f0000000200)={0x2, 0x4e23}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 21:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000005c0)={0xa, 0x4e22}, 0x19) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x80001, 0x2}, 0x8) r2 = accept4(r1, &(0x7f0000000000)=@nl=@proc, 0x0, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, 0x0, 0x0) close(r0) 21:30:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) close(r1) accept4(r2, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) close(r2) 21:30:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x4, 'C\x00\x00\x001\x00'}]}, 0x34}}, 0x0) 21:30:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 21:30:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 149.236728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:30:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000580)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, 0x32, 0x829, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x4}]}, 0x18}}, 0x0) 21:30:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) close(r1) close(r2) [ 149.343807] netlink: 'syz-executor3': attribute type 4 has an invalid length. 21:30:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/30, 0x1d}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/108, 0x6c}], 0x386}}], 0x1ff, 0x0, &(0x7f0000000ec0)={0x77359400}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080)='M', 0x1, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x0) [ 149.412740] netlink: 'syz-executor3': attribute type 4 has an invalid length. 21:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000005c0)={0xa, 0x4e22}, 0x19) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x80001, 0x2}, 0x8) r2 = accept4(r1, &(0x7f0000000000)=@nl=@proc, 0x0, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, 0x0, 0x0) close(r0) 21:30:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000005c0)={0xa, 0x4e22}, 0x19) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x80001, 0x2}, 0x8) r2 = accept4(r1, &(0x7f0000000000)=@nl=@proc, 0x0, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, 0x0, 0x0) close(r0) 21:30:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x4, 'C\x00\x00\x001\x00'}]}, 0x34}}, 0x0) 21:30:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) [ 149.566101] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 149.579415] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 149.587222] netlink: 'syz-executor3': attribute type 4 has an invalid length. [ 149.609305] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 149.654892] ================================================================== [ 149.662417] BUG: KASAN: use-after-free in __list_add_valid+0x8f/0xac [ 149.668932] Read of size 8 at addr ffff8881b9ed82b0 by task syz-executor2/8264 [ 149.676305] [ 149.678013] CPU: 0 PID: 8264 Comm: syz-executor2 Not tainted 4.20.0-rc4+ #335 [ 149.685285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.694654] Call Trace: [ 149.697256] dump_stack+0x244/0x39d 21:30:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)='4', 0x1}], 0x1}, 0x0) [ 149.700903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 149.706100] ? printk+0xa7/0xcf [ 149.709397] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 149.714177] print_address_description.cold.7+0x9/0x1ff [ 149.714199] kasan_report.cold.8+0x242/0x309 [ 149.714215] ? __list_add_valid+0x8f/0xac [ 149.714234] __asan_report_load8_noabort+0x14/0x20 [ 149.714258] __list_add_valid+0x8f/0xac [ 149.714273] ___neigh_create+0x14b7/0x2600 [ 149.714285] ? zap_class+0x640/0x640 [ 149.714301] ? __lock_acquire+0x62f/0x4c20 [ 149.733258] ? neigh_remove_one+0x5a0/0x5a0 [ 149.733284] ? netlink_has_listeners+0x2a4/0x4a0 [ 149.733301] ? lock_downgrade+0x900/0x900 [ 149.733330] ? check_preemption_disabled+0x48/0x280 [ 149.733373] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 149.758552] ? kasan_check_read+0x11/0x20 [ 149.758569] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 149.758584] ? rcu_softirq_qs+0x20/0x20 [ 149.758613] ? netlink_has_listeners+0x2cb/0x4a0 [ 149.758646] ? netlink_tap_init_net+0x3d0/0x3d0 [ 149.758665] ? zap_class+0x640/0x640 [ 149.776905] ? trace_hardirqs_off_caller+0x310/0x310 [ 149.804366] ? lock_acquire+0x1ed/0x520 [ 149.808357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.813914] ? check_preemption_disabled+0x48/0x280 [ 149.818957] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 149.824515] ? rcu_pm_notify+0xc0/0xc0 [ 149.828424] __neigh_create+0x30/0x40 [ 149.832245] ip_finish_output2+0xb8b/0x1860 [ 149.836574] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 149.841524] ? ip_copy_metadata+0xdb0/0xdb0 [ 149.845868] ? zap_class+0x640/0x640 [ 149.849606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.855193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.860743] ? ipv4_mtu+0x39f/0x590 [ 149.864394] ? __lock_is_held+0xb5/0x140 [ 149.868484] ip_finish_output+0x7fd/0xfa0 [ 149.868501] ? ip_finish_output+0x7fd/0xfa0 [ 149.868521] ? ip_fragment.constprop.51+0x240/0x240 [ 149.868537] ? kasan_check_read+0x11/0x20 [ 149.868558] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 149.877018] ? nf_nat_ipv4_out+0x2e1/0x340 [ 149.877034] ? rcu_softirq_qs+0x20/0x20 [ 149.877054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 149.877074] ? nf_hook_slow+0x11e/0x1c0 [ 149.877096] ip_output+0x21d/0x8d0 [ 149.877118] ? ip_mc_output+0x15b0/0x15b0 [ 149.877137] ? ip_fragment.constprop.51+0x240/0x240 [ 149.877154] ? __lock_is_held+0xb5/0x140 [ 149.877181] ip_local_out+0xc5/0x1b0 [ 149.929286] __ip_queue_xmit+0x9af/0x1f40 [ 149.933454] ? ip_build_and_send_pkt+0xc90/0xc90 [ 149.938215] ? refcount_dec_if_one+0x180/0x180 [ 149.942817] ? rt_acct_proc_show+0x2c1/0x370 [ 149.947241] ? skb_split+0x11e0/0x11e0 [ 149.951150] ? __lock_is_held+0xb5/0x140 [ 149.955243] ip_queue_xmit+0x56/0x70 [ 149.958985] __tcp_transmit_skb+0x1bb7/0x3bb0 [ 149.963517] ? __tcp_select_window+0xa30/0xa30 [ 149.968121] ? pvclock_read_flags+0x160/0x160 [ 149.972658] ? tcp_connect+0x1477/0x4690 [ 149.976737] ? trace_hardirqs_off_caller+0x310/0x310 [ 149.981878] ? zap_class+0x640/0x640 [ 149.985651] ? kvm_clock_read+0x18/0x30 [ 149.989653] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 149.994680] ? ktime_get+0x2c1/0x400 [ 149.998425] ? kasan_check_write+0x14/0x20 [ 150.002683] ? tcp_rbtree_insert+0x141/0x190 [ 150.007121] tcp_connect+0x3349/0x4690 [ 150.011035] ? tcp_push_one+0x110/0x110 [ 150.015038] ? mark_held_locks+0xc7/0x130 [ 150.019223] ? ktime_get_with_offset+0x38b/0x470 [ 150.024001] ? pvclock_read_flags+0x160/0x160 [ 150.028513] ? secure_tcp_seq+0xa4/0x180 [ 150.032590] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.037735] ? kvm_clock_read+0x18/0x30 [ 150.041731] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 150.046762] ? ktime_get_with_offset+0x310/0x470 [ 150.051541] ? ktime_get+0x400/0x400 [ 150.055278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 150.060836] ? tcp_fastopen_defer_connect+0x173/0x4a0 [ 150.066048] ? tcp_fastopen_cookie_check+0x470/0x470 [ 150.071197] ? secure_tcp_ts_off+0xdf/0x1a0 [ 150.075538] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 150.081092] ? sk_setup_caps+0x209/0x690 [ 150.085168] tcp_v4_connect+0x19bb/0x1df0 [ 150.089348] ? tcp_v4_parse_md5_keys+0x340/0x340 [ 150.094118] ? find_held_lock+0x36/0x1c0 [ 150.098213] __inet_stream_connect+0x992/0x1150 [ 150.102910] ? inet_dgram_connect+0x2e0/0x2e0 [ 150.107420] ? trace_hardirqs_on+0xbd/0x310 [ 150.111765] ? lock_release+0xa00/0xa00 [ 150.115760] ? lock_sock_nested+0xe2/0x120 [ 150.120021] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.125136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.130687] ? check_preemption_disabled+0x48/0x280 [ 150.135714] ? lock_sock_nested+0x9a/0x120 [ 150.139960] ? lock_sock_nested+0x9a/0x120 [ 150.144204] ? __local_bh_enable_ip+0x160/0x260 [ 150.148909] inet_stream_connect+0x58/0xa0 [ 150.153163] __sys_connect+0x37d/0x4c0 [ 150.157081] ? __ia32_sys_accept+0xb0/0xb0 [ 150.161329] ? kasan_check_read+0x11/0x20 [ 150.165483] ? _copy_to_user+0xc8/0x110 [ 150.169468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 150.175027] ? put_timespec64+0x10f/0x1b0 [ 150.179206] ? do_syscall_64+0x9a/0x820 [ 150.183203] ? do_syscall_64+0x9a/0x820 [ 150.187205] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 150.191797] ? trace_hardirqs_on+0xbd/0x310 [ 150.196130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.201684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.207065] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.212213] __x64_sys_connect+0x73/0xb0 [ 150.216288] do_syscall_64+0x1b9/0x820 [ 150.220186] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 150.225576] ? syscall_return_slowpath+0x5e0/0x5e0 [ 150.230512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 150.235367] ? trace_hardirqs_on_caller+0x310/0x310 [ 150.240401] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 150.245427] ? prepare_exit_to_usermode+0x291/0x3b0 [ 150.250462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 150.250486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.250502] RIP: 0033:0x457659 [ 150.263708] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.282613] RSP: 002b:00007fe74a6adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 150.290360] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 150.297669] RDX: 0000000000000010 RSI: 0000000020606ff0 RDI: 0000000000000003 [ 150.304988] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 150.304998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe74a6ae6d4 [ 150.305008] R13: 00000000004bdc03 R14: 00000000004cce90 R15: 00000000ffffffff [ 150.305033] [ 150.305052] Allocated by task 8118: [ 150.305083] save_stack+0x43/0xd0 [ 150.305109] kasan_kmalloc+0xc7/0xe0 [ 150.305122] __kmalloc+0x15b/0x760 [ 150.305138] ___neigh_create+0x13fc/0x2600 [ 150.305150] __neigh_create+0x30/0x40 [ 150.305166] arp_req_set+0x59d/0xaa0 [ 150.319717] arp_ioctl+0x48b/0xae0 [ 150.319730] inet_ioctl+0x237/0x360 [ 150.319744] sock_do_ioctl+0xeb/0x420 [ 150.319757] sock_ioctl+0x313/0x690 [ 150.319770] do_vfs_ioctl+0x1de/0x1790 [ 150.319794] ksys_ioctl+0xa9/0xd0 [ 150.319811] __x64_sys_ioctl+0x73/0xb0 [ 150.364498] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551615) [ 150.366168] do_syscall_64+0x1b9/0x820 [ 150.366184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.366189] [ 150.366197] Freed by task 8078: [ 150.366212] save_stack+0x43/0xd0 [ 150.366228] __kasan_slab_free+0x102/0x150 [ 150.366242] kasan_slab_free+0xe/0x10 [ 150.366262] kfree+0xcf/0x230 [ 150.390634] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551615) [ 150.390962] rcu_process_callbacks+0x1140/0x1ac0 [ 150.390977] __do_softirq+0x308/0xb7e [ 150.390982] [ 150.390993] The buggy address belongs to the object at ffff8881b9ed8040 [ 150.390993] which belongs to the cache kmalloc-1k of size 1024 [ 150.391008] The buggy address is located 624 bytes inside of [ 150.391008] 1024-byte region [ffff8881b9ed8040, ffff8881b9ed8440) [ 150.391013] The buggy address belongs to the page: [ 150.391027] page:ffffea0006e7b600 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0x0 compound_mapcount: 0 [ 150.391042] flags: 0x2fffc0000010200(slab|head) [ 150.391063] raw: 02fffc0000010200 ffffea0006e71308 ffffea0006e7fc88 ffff8881da800ac0 [ 150.479310] raw: 0000000000000000 ffff8881b9ed8040 0000000100000007 0000000000000000 [ 150.479317] page dumped because: kasan: bad access detected [ 150.479322] [ 150.479327] Memory state around the buggy address: [ 150.479351] ffff8881b9ed8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 150.479363] ffff8881b9ed8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 150.479374] >ffff8881b9ed8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 150.479386] ^ [ 150.488550] kobject: 'loop5' (000000004b87bc8d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 150.491953] ffff8881b9ed8300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 150.491965] ffff8881b9ed8380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 150.491971] ================================================================== [ 150.491976] Disabling lock debugging due to kernel taint [ 150.492062] Kernel panic - not syncing: panic_on_warn set ... [ 150.556947] kobject: 'loop0' (00000000148a0931): kobject_uevent_env [ 150.563338] CPU: 0 PID: 8264 Comm: syz-executor2 Tainted: G B 4.20.0-rc4+ #335 [ 150.578530] kobject: 'loop0' (00000000148a0931): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 150.582002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.582008] Call Trace: [ 150.582030] dump_stack+0x244/0x39d [ 150.582050] ? dump_stack_print_info.cold.1+0x20/0x20 [ 150.593732] kobject: 'loop3' (0000000017d64f60): kobject_uevent_env [ 150.597110] panic+0x2ad/0x55c [ 150.597126] ? add_taint.cold.5+0x16/0x16 [ 150.597145] ? trace_hardirqs_on+0xb4/0x310 [ 150.597163] kasan_end_report+0x47/0x4f [ 150.597181] kasan_report.cold.8+0x76/0x309 [ 150.608039] kobject: 'loop3' (0000000017d64f60): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 150.615986] ? __list_add_valid+0x8f/0xac [ 150.616004] __asan_report_load8_noabort+0x14/0x20 [ 150.616018] __list_add_valid+0x8f/0xac [ 150.616032] ___neigh_create+0x14b7/0x2600 [ 150.616045] ? zap_class+0x640/0x640 [ 150.616057] ? __lock_acquire+0x62f/0x4c20 [ 150.616076] ? neigh_remove_one+0x5a0/0x5a0 [ 150.616094] ? netlink_has_listeners+0x2a4/0x4a0 [ 150.616107] ? lock_downgrade+0x900/0x900 [ 150.616120] ? check_preemption_disabled+0x48/0x280 [ 150.616135] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 150.616149] ? kasan_check_read+0x11/0x20 [ 150.616161] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 150.616172] ? rcu_softirq_qs+0x20/0x20 [ 150.616191] ? netlink_has_listeners+0x2cb/0x4a0 [ 150.616205] ? netlink_tap_init_net+0x3d0/0x3d0 [ 150.616223] ? zap_class+0x640/0x640 [ 150.670412] kobject: 'loop1' (0000000037a5aa78): kobject_uevent_env [ 150.672449] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.677607] kobject: 'loop1' (0000000037a5aa78): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 150.680646] ? lock_acquire+0x1ed/0x520 [ 150.680668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.768487] ? check_preemption_disabled+0x48/0x280 [ 150.773492] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 150.779019] ? rcu_pm_notify+0xc0/0xc0 [ 150.782894] __neigh_create+0x30/0x40 [ 150.786680] ip_finish_output2+0xb8b/0x1860 [ 150.790984] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 150.795913] ? ip_copy_metadata+0xdb0/0xdb0 [ 150.800221] ? zap_class+0x640/0x640 [ 150.803936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.809467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.815006] ? ipv4_mtu+0x39f/0x590 [ 150.818619] ? __lock_is_held+0xb5/0x140 [ 150.822697] ip_finish_output+0x7fd/0xfa0 [ 150.826836] ? ip_finish_output+0x7fd/0xfa0 [ 150.831167] ? ip_fragment.constprop.51+0x240/0x240 [ 150.836189] ? kasan_check_read+0x11/0x20 [ 150.840329] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 150.845612] ? nf_nat_ipv4_out+0x2e1/0x340 [ 150.849872] ? rcu_softirq_qs+0x20/0x20 [ 150.853842] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 150.858871] ? nf_hook_slow+0x11e/0x1c0 [ 150.862846] ip_output+0x21d/0x8d0 [ 150.866373] ? ip_mc_output+0x15b0/0x15b0 [ 150.870507] ? ip_fragment.constprop.51+0x240/0x240 [ 150.875520] ? __lock_is_held+0xb5/0x140 [ 150.879570] ip_local_out+0xc5/0x1b0 [ 150.883270] __ip_queue_xmit+0x9af/0x1f40 [ 150.887407] ? ip_build_and_send_pkt+0xc90/0xc90 [ 150.892161] ? refcount_dec_if_one+0x180/0x180 [ 150.896744] ? rt_acct_proc_show+0x2c1/0x370 [ 150.901153] ? skb_split+0x11e0/0x11e0 [ 150.905025] ? __lock_is_held+0xb5/0x140 [ 150.909071] ip_queue_xmit+0x56/0x70 [ 150.912773] __tcp_transmit_skb+0x1bb7/0x3bb0 [ 150.917261] ? __tcp_select_window+0xa30/0xa30 [ 150.921832] ? pvclock_read_flags+0x160/0x160 [ 150.926338] ? tcp_connect+0x1477/0x4690 [ 150.930405] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.935494] ? zap_class+0x640/0x640 [ 150.939205] ? kvm_clock_read+0x18/0x30 [ 150.943174] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 150.948175] ? ktime_get+0x2c1/0x400 [ 150.951875] ? kasan_check_write+0x14/0x20 [ 150.956099] ? tcp_rbtree_insert+0x141/0x190 [ 150.960508] tcp_connect+0x3349/0x4690 [ 150.964383] ? tcp_push_one+0x110/0x110 [ 150.968362] ? mark_held_locks+0xc7/0x130 [ 150.972499] ? ktime_get_with_offset+0x38b/0x470 [ 150.977245] ? pvclock_read_flags+0x160/0x160 [ 150.981724] ? secure_tcp_seq+0xa4/0x180 [ 150.985771] ? trace_hardirqs_off_caller+0x310/0x310 [ 150.990863] ? kvm_clock_read+0x18/0x30 [ 150.994820] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 150.999835] ? ktime_get_with_offset+0x310/0x470 [ 151.004577] ? ktime_get+0x400/0x400 [ 151.008276] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 151.013799] ? tcp_fastopen_defer_connect+0x173/0x4a0 [ 151.018975] ? tcp_fastopen_cookie_check+0x470/0x470 [ 151.024074] ? secure_tcp_ts_off+0xdf/0x1a0 [ 151.028403] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 151.033927] ? sk_setup_caps+0x209/0x690 [ 151.037990] tcp_v4_connect+0x19bb/0x1df0 [ 151.042129] ? tcp_v4_parse_md5_keys+0x340/0x340 [ 151.046871] ? find_held_lock+0x36/0x1c0 [ 151.050919] __inet_stream_connect+0x992/0x1150 [ 151.055584] ? inet_dgram_connect+0x2e0/0x2e0 [ 151.060099] ? trace_hardirqs_on+0xbd/0x310 [ 151.064421] ? lock_release+0xa00/0xa00 [ 151.068390] ? lock_sock_nested+0xe2/0x120 [ 151.072610] ? trace_hardirqs_off_caller+0x310/0x310 [ 151.077718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.083270] ? check_preemption_disabled+0x48/0x280 [ 151.088290] ? lock_sock_nested+0x9a/0x120 [ 151.092526] ? lock_sock_nested+0x9a/0x120 [ 151.096789] ? __local_bh_enable_ip+0x160/0x260 [ 151.101447] inet_stream_connect+0x58/0xa0 [ 151.105676] __sys_connect+0x37d/0x4c0 [ 151.109551] ? __ia32_sys_accept+0xb0/0xb0 [ 151.113773] ? kasan_check_read+0x11/0x20 [ 151.117909] ? _copy_to_user+0xc8/0x110 [ 151.121869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.127394] ? put_timespec64+0x10f/0x1b0 [ 151.131532] ? do_syscall_64+0x9a/0x820 [ 151.135492] ? do_syscall_64+0x9a/0x820 [ 151.139456] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 151.144037] ? trace_hardirqs_on+0xbd/0x310 [ 151.148355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.153877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.159228] ? trace_hardirqs_off_caller+0x310/0x310 [ 151.164319] __x64_sys_connect+0x73/0xb0 [ 151.168366] do_syscall_64+0x1b9/0x820 [ 151.172270] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 151.177633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 151.182556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.187386] ? trace_hardirqs_on_caller+0x310/0x310 [ 151.192385] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 151.197392] ? prepare_exit_to_usermode+0x291/0x3b0 [ 151.202425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.207260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.212433] RIP: 0033:0x457659 [ 151.215610] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.234506] RSP: 002b:00007fe74a6adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 151.242207] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 151.249464] RDX: 0000000000000010 RSI: 0000000020606ff0 RDI: 0000000000000003 [ 151.256720] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 151.263975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe74a6ae6d4 [ 151.271241] R13: 00000000004bdc03 R14: 00000000004cce90 R15: 00000000ffffffff [ 151.279409] Kernel Offset: disabled [ 151.283032] Rebooting in 86400 seconds..