[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 76.600651][ T30] audit: type=1800 audit(1569606607.652:25): pid=11410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 76.623460][ T30] audit: type=1800 audit(1569606607.682:26): pid=11410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 76.659682][ T30] audit: type=1800 audit(1569606607.702:27): pid=11410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.34' (ECDSA) to the list of known hosts. 2019/09/27 17:50:21 fuzzer started 2019/09/27 17:50:25 dialing manager at 10.128.0.26:37065 2019/09/27 17:50:25 syscalls: 2385 2019/09/27 17:50:25 code coverage: enabled 2019/09/27 17:50:25 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/27 17:50:25 extra coverage: enabled 2019/09/27 17:50:25 setuid sandbox: enabled 2019/09/27 17:50:25 namespace sandbox: enabled 2019/09/27 17:50:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/27 17:50:25 fault injection: enabled 2019/09/27 17:50:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/27 17:50:25 net packet injection: enabled 2019/09/27 17:50:25 net device setup: enabled 17:53:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f00000036c0), 0x12) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffe) syzkaller login: [ 253.012455][T11576] IPVS: ftp: loaded support on port[0] = 21 [ 253.150198][T11576] chnl_net:caif_netlink_parms(): no params data found [ 253.205249][T11576] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.212462][T11576] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.221213][T11576] device bridge_slave_0 entered promiscuous mode [ 253.230570][T11576] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.237845][T11576] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.246495][T11576] device bridge_slave_1 entered promiscuous mode [ 253.277289][T11576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.289977][T11576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.321699][T11576] team0: Port device team_slave_0 added [ 253.330885][T11576] team0: Port device team_slave_1 added [ 253.397363][T11576] device hsr_slave_0 entered promiscuous mode [ 253.653398][T11576] device hsr_slave_1 entered promiscuous mode [ 253.893527][T11576] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.900750][T11576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.908554][T11576] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.915789][T11576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.994479][T11576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.014722][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.026471][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.037350][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.049339][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 254.073595][T11576] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.090342][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.100191][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.107426][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.136864][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.146297][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.153532][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.168436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.178163][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.206654][T11576] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 254.217199][T11576] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 254.231475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.240779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.250343][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.259844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.268974][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.278475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.287537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.297928][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.336378][T11576] 8021q: adding VLAN 0 to HW filter on device batadv0 17:53:05 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 've\a\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 17:53:05 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000843000/0x1000)=nil, 0x1000, 0x10) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x14) 17:53:05 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000843000/0x1000)=nil, 0x1000, 0x10) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x14) 17:53:05 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009371, &(0x7f0000000040)="01000000000000001801000005008000a0000000000000002f") 17:53:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)) 17:53:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x1be) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 17:53:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x1be) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 17:53:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) [ 255.284304][T11618] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:53:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x9}, 0x28, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00}']) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 17:53:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x12, 0x0, 0x0, 0x8, &(0x7f0000000440)) timer_create(0x3, 0x0, 0x0) r2 = dup(r0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r0, 0x6, 0x7ab51b07805a3552, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0xfffffffffffffd79) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) pwrite64(r0, &(0x7f0000000500), 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8040fffffffd) socket$inet_smc(0x2b, 0x1, 0x0) [ 255.518280][T11626] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:53:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket$inet6(0xa, 0x80002, 0x88) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a40)=ANY=[@ANYBLOB="4404000024000705000000000000000000000000a38abb0ebb6ee932825431cdca1099db3010caac008dd9d5f6d04da003ea0c224797ebe6aee63aa40ca4e22b8c2860c4289f0cc10c2dcb4fc5775d0ff5c4db6cbf0ce4ef0740baa280dc966e6be4ce8d4facb647eb2b0563c87ff713", @ANYRES32=r6, @ANYBLOB="00000000f1ffffff000000000800010063627100180402001000050005000000000000000700000004040600"/1068], 0x444}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettfilter={0x24, 0x2a, 0xffffff1f, 0x0, 0x0, {0x0, r6, {}, {0x0, 0x2}}}, 0x24}}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@loopback, @in6=@rand_addr="f911f38e1cdbf5611eafe103572ce9d2", 0x4e20, 0x3, 0x4e20, 0x1ff, 0x2, 0x80, 0x80, 0xc0c0feef31b7c485, r6, 0xee00}, {0x4, 0x800, 0x1f, 0x4, 0xfff, 0x17b1, 0x3, 0x3}, {0x5, 0x28, 0x800, 0x100}, 0x9, 0x6e6bbc, 0x0, 0x1, 0x1}, {{@in=@loopback, 0x4d4, 0xff}, 0xa, @in=@broadcast, 0x3504, 0x2, 0x3, 0x80, 0xfffff240, 0x9, 0x8}}, 0xe8) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff0200000000000000000000000000013e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe49d6b63dc6591aacde50b32881721afab69cc3712c37ed0"], 0x0) 17:53:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000100)={0x666666666666c7e, 0x0, [{0xc0000000, 0x2, 0x3, 0x3, 0x1000, 0x46, 0xfffffff6}, {0x4000000a, 0x10001, 0x2, 0x1, 0x6, 0x7f, 0x6}, {0x4, 0x401, 0x5, 0x80000000, 0x1f, 0x0, 0x1}, {0x4, 0x2, 0xe, 0x0, 0x3, 0x7, 0x9}, {0x4, 0x3, 0x0, 0x0, 0x20, 0xffffffff, 0x8e4b}]}) [ 255.751464][T11630] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 255.767938][T11631] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.0'. 17:53:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001940)={'vxcan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3}, 0x14) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x400, 0x4) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, &(0x7f00000000c0)=""/128) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfdef}]) 17:53:07 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x40) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/225) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x141180) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x0, @empty, 0x101}, @ib={0x1b, 0x7, 0x2, {"5627a24e0dbeae7e9a08a9c8ce25ba66"}, 0x3, 0x4, 0x7ff}}}, 0x118) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x4003, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x1f, 0x5, [0x40, 0x40, 0xf800, 0x7, 0x198]}, 0x12) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000400)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee1, &(0x7f00000004c0)={0x0, 0x1, 0x3ff, &(0x7f0000000480)=0x9}) setxattr$security_selinux(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='security.selinux\x00', &(0x7f0000000580)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x0) socketpair(0xa, 0x3, 0xfb, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000600)={0x1}, 0x4) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f0000000640)={{0x0, 0x1, 0xc, 0x9, 0x0, 0x20, 0x9, 0x2, 0x5, 0x0, 0x17, 0x3}, {0x2000, 0x1000, 0x9a42f418b4ac1c53, 0x1, 0x7, 0xe4, 0x9, 0x1, 0x2, 0x8, 0xfa, 0x1}, {0x0, 0x5000, 0xe, 0x8, 0x8, 0x7, 0x7e, 0x8, 0x68, 0xb0, 0xa7, 0xf9}, {0x0, 0x2800, 0x4, 0x4, 0x20, 0x6, 0x40, 0x3, 0x9, 0x6, 0x5, 0x9}, {0x3000, 0x6000, 0x0, 0x6, 0x9, 0x80, 0x80, 0x0, 0x1, 0xff, 0x40}, {0x800, 0x5000, 0x0, 0x81, 0x7f, 0x5, 0x7, 0x6, 0x2, 0x6, 0x8, 0x7a}, {0x0, 0xf000, 0x8, 0x3, 0xff, 0x0, 0x1, 0xf5, 0xe7, 0x0, 0x8, 0x2}, {0x10000, 0x6000, 0xb, 0x2, 0x1, 0x1, 0x0, 0x9, 0x3, 0x7, 0x0, 0x3}, {0x2, 0x2000}, {0x102005, 0x1}, 0x40000008, 0x0, 0x1, 0x944a7a9460445856, 0x0, 0x400, 0x1, [0x81, 0x4, 0x401, 0x100000000]}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/audio\x00', 0x200000, 0x0) r7 = syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0xcf, 0x906284) ioctl$EVIOCGKEY(r7, 0x80404518, &(0x7f0000000800)=""/128) r8 = open(&(0x7f0000000880)='./file0\x00', 0x4000, 0x1ef) fsetxattr(r8, &(0x7f00000008c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000900)='/dev/vcs#\x00', 0xa, 0x3) r9 = syz_open_dev$cec(&(0x7f0000000940)='/dev/cec#\x00', 0x0, 0x2) r10 = socket$pptp(0x18, 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r10, &(0x7f0000000980)={0x80000000}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000009c0), &(0x7f0000000a00)=0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000a40)={0x0, 0x5}, &(0x7f0000000a80)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000ac0)={r11, @in6={{0xa, 0x4e20, 0x9607, @mcast1, 0xe38}}, 0x80000001, 0x7f, 0x5, 0x7f, 0x1}, 0x98) r12 = syz_open_dev$sndpcmp(&(0x7f0000000b80)='/dev/snd/pcmC#D#p\x00', 0x0, 0x6200) ioctl$EVIOCGBITKEY(r12, 0x80404521, &(0x7f0000000bc0)=""/6) r13 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/dlm-monitor\x00', 0x329080, 0x0) setsockopt$packet_fanout(r13, 0x107, 0x12, &(0x7f0000000c40)={0x4, 0x6, 0x8000}, 0x4) 17:53:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001940)={'vxcan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3}, 0x14) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x400, 0x4) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, &(0x7f00000000c0)=""/128) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfdef}]) [ 256.939002][T11646] IPVS: ftp: loaded support on port[0] = 21 17:53:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r3, &(0x7f0000004a80)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) r4 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r4, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000012c0)=0x38c) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x6c, 0x10, 0x8, 0x0, 0x3, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x4c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x3c, 0x2, [@IFLA_BR_VLAN_DEFAULT_PVID={0x8, 0x27, 0xfe}, @IFLA_BR_AGEING_TIME={0x8}, @IFLA_BR_MCAST_STATS_ENABLED={0x8}, @IFLA_BR_MCAST_MLD_VERSION={0x8}, @IFLA_BR_MCAST_MEMBERSHIP_INTVL={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8, 0x1c, 0x7}, @IFLA_BR_MCAST_LAST_MEMBER_INTVL={0x8, 0x1e, 0x5}]}}}]}, 0x6c}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r6, r7, 0x0, 0x80000001) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000001240)={{0x6b, 0x1}, {0x55, 0xf9}, 0x10001, 0x1, 0x3f}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1ed, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) [ 257.130645][T11646] chnl_net:caif_netlink_parms(): no params data found [ 257.190296][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.197925][T11646] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.206714][T11646] device bridge_slave_0 entered promiscuous mode [ 257.219683][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.227064][T11646] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.235949][T11646] device bridge_slave_1 entered promiscuous mode 17:53:08 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x341080, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000080)={0x6, 0x1, 0x1, 0x4, 0x4}, 0xc) listen(r0, 0xfff) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x56815d43e56a1e47, 0x0, 0x0) timer_create(0x1, &(0x7f0000cd0000)={0x0, 0x29, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x21250, 0x4) r2 = gettid() tkill(r2, 0x1000000000016) [ 257.271723][T11646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.306911][T11646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.349867][T11646] team0: Port device team_slave_0 added [ 257.366319][T11646] team0: Port device team_slave_1 added [ 257.447333][T11646] device hsr_slave_0 entered promiscuous mode [ 257.473648][T11646] device hsr_slave_1 entered promiscuous mode [ 257.512993][T11646] debugfs: Directory 'hsr0' with parent '/' already present! [ 257.542395][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.549748][T11646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.557521][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.564738][T11646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.645353][T11646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.665394][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.677954][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.687694][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.698719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 257.719927][T11646] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.738560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.747974][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.755197][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.812116][T11646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 257.823050][T11646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.840506][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.849548][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.856776][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.867727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.877746][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.887166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.896602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.906964][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.915614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.958878][T11646] 8021q: adding VLAN 0 to HW filter on device batadv0 17:53:09 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x1) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000001f5f0000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="440400002400070500008000000b000027510000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500010000000000000003000000"], 0x444}}, 0x0) r7 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r7, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0xc7, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24000000290001efe335bc0162268a0000000000", @ANYRES32=r6], 0x2}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000240)=0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:53:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r10, r11, 0x0, 0x80000001) ioctl$DRM_IOCTL_RES_CTX(r11, 0xc0106426, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r9, 0x4010641c, &(0x7f0000000440)={r12, &(0x7f0000000400)=""/41}) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r6, 0x0) r13 = fcntl$dupfd(r6, 0x0, r5) mmap(&(0x7f0000fee000/0x10000)=nil, 0x10000, 0x0, 0x12, r13, 0x0) write$P9_RWALK(r13, &(0x7f0000000580)=ANY=[@ANYBLOB="710000006f02000800010000000004000000000093cf8a272c2c2fce52604c629e0000000400000008000000000000006001000000030000000000000002030000000100000000000000540400000008ecffffff000000040200000005000200000008000000000000008500000000060000000000000000000000000000c86b19f09b023756a15ac9c81717be2a46cb706a9cb19af52d1bc2da11f3cb898d5cab65f3ce480f4738567677f2076fc382ce0c4d96a88f3433f36ef4bb72d84b600a2bad6ce0fcba075b4f9f9175d2350800789d29d86f5bfe5709189f2f3afc7b430d0f6ba18fd58346c243423fcfd92248fcfe188f3a5a01e2"], 0x71) 17:53:11 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40000) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x3) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x44d, 0x100) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000000c0)={0x9, @raw_data="349ce66862db26a102e96cb5ad1aaea573a79887c10752d6913d7ce7dcc67d4c6255cfc244cf37506e71709c1b184e28e84078aeed49529f5c068f76dcd67639bd45ce36bb90b5a18f73f2e0612d565abd0f68e6cd682ae00137791e9592f398d02b62f14f98688c907745ab8f15a94e50e8f90c2876870f2d01be242caf7a6febb9df24c334ec05bd4e3aab4d159160ba3f78027643d1697bf81fad63db9c2788294d0a16a0adfd5dafd3d1497c60886b196d4e84ca34cf905bb76881f1da0c9ee1dbf5741aff52"}) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)=0x74) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl(r2, 0x40, &(0x7f0000000200)="0cf879af59702fe9a003a347711c6a99530fedf79a") getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x89) move_mount(r0, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000340)='./file0\x00', 0x7) r4 = msgget(0x3, 0x404) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000380)=""/127) r5 = syz_open_dev$video4linux(&(0x7f0000000400)='/dev/v4l-subdev#\x00', 0x7f, 0x141000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r5, 0xc0305615, &(0x7f0000000440)={0x0, {0x9, 0x1}}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x40180, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x7fff) syz_usb_connect$printer(0x6, 0x2d, &(0x7f00000004c0)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x7f, 0x50, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x2, 0x5, "", {{{0x9, 0x5, 0x1, 0x2, 0x224, 0x48, 0x9, 0x80}}}}}]}}]}}, &(0x7f0000000640)={0xa, &(0x7f0000000500)={0xa, 0x6, 0x300, 0xa3, 0x5, 0x1f, 0x10, 0xfe}, 0xf, &(0x7f0000000540)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x4, 0x4, 0x40, 0x5, 0x1}]}, 0x2, [{0x56, &(0x7f0000000580)=@string={0x56, 0x3, "8d64d5492eaaeaec9d32c705acca245a6f9eafe4b98720d732348641b243c3a70fac79e8ec9d71cc57bd5a5acb960006a50cf9ac68b464eff24e2f6b2161a9f6f45d8292fd56afb42479b78e13c4e12bf6f56169"}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x457}}]}) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x28000, 0x0) write$binfmt_misc(r7, &(0x7f00000006c0)={'syz1', "070f1a93ed8fe61875d67229bdf01fce9d26b0b3be0438c9549192a0cad2f75571f7f9124c4754cf26537abcbcba9204f6d4e95c06825317814b561afad763be59766a6b6271f1537cd67bfd0ddfae3d260dedbb95a5a9b30ef74ef1612e9c4138fd4ffa34be5b153391e034383a163bf2bf6fe335c1c38cdbdc9081c75f"}, 0x82) r8 = syz_open_dev$dmmidi(&(0x7f0000000780)='/dev/dmmidi#\x00', 0x9, 0x800) fspick(r8, &(0x7f00000007c0)='./file0\x00', 0x1) r9 = syz_open_dev$vbi(&(0x7f0000000800)='/dev/vbi#\x00', 0x0, 0x2) ioctl$ASHMEM_GET_PIN_STATUS(r9, 0x7709, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000840)={0x7ff, 0x7, 0x400, 0x1, 0x9}) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000880)={0x0, 0x0, {0x1f, 0x5, 0x3016, 0x1, 0x0, 0x6, 0x2, 0x2}}) r10 = syz_open_dev$mice(&(0x7f0000000900)='/dev/input/mice\x00', 0x0, 0x100) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000940)) getitimer(0x631417378cc8767e, &(0x7f0000000980)) r11 = syz_open_dev$cec(&(0x7f00000009c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$CAPI_GET_SERIAL(r11, 0xc0044308, &(0x7f0000000a00)=0x84c) 17:53:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = socket(0x5, 0x1, 0x9) r4 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r4, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) connect$netlink(r5, &(0x7f0000000000)=@unspec, 0xc) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x4}, 0xb) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x28, r8, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001680)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000001640)={&(0x7f0000001280)={0x390, r8, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfaa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3800}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x45}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xf0be, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x7}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd8c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x946}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x13c, @ipv4={[], [], @multicast2}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x8000841) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000040)={r10}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x400, 0x9, 0xffffffffffffff94, 0xffffffffe4297199, 0x1, 0x40, {r10, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0xffff}}, 0xfffffffffffffffe, 0x5, 0xed, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000080)={r10}, &(0x7f00000000c0)=0x8) r12 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r12, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) getsockopt$bt_BT_SNDMTU(r12, 0x112, 0xc, &(0x7f00000016c0)=0xe1a6, &(0x7f0000001700)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r11, @in6={{0xa, 0x4e20, 0x1, @local, 0x8}}, [0x73, 0x6, 0x50c9b33b, 0x5, 0x7, 0x5, 0xa635, 0x23ed22a5, 0x100, 0x8, 0x359, 0x3, 0x2, 0x0, 0xfffffffffffffffc]}, &(0x7f0000000140)=0x100) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 260.776379][T11680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.784041][T11680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:53:11 executing program 1: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffffd}) write$binfmt_aout(r0, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYPTR, @ANYPTR, @ANYRESOCT], 0x39) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000000c0)={0x40, 0x5, 0x5cf3, 0x4, 0x3ff}) ioctl(r0, 0x0, &(0x7f0000000080)="fc6a1531197ceefb766afbc4a14bf4c739a2d4543bec1c7beb8f9c6d0a54d1f6a7e1bb9223b802f01480098e99be73190b78a181e4cf32c224d5390910") [ 260.836061][T11684] IPVS: ftp: loaded support on port[0] = 21 [ 260.973990][T11680] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 17:53:12 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffffd}) write$binfmt_aout(r3, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYPTR, @ANYPTR, @ANYRESOCT], 0x39) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000900)=0xd001, 0x4) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000040)={0x6, 0x9}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x740, 0xf0, 0xf0, 0xf0, 0x580, 0x338, 0x670, 0x670, 0x670, 0x670, 0x670, 0x6, &(0x7f00000000c0), {[{{@ipv6={@mcast1, @ipv4={[], [], @broadcast}, [0xffffff00, 0xff000000, 0xff000000, 0x1017fff80], [0x0, 0x0, 0xffffffff, 0xffff7f], 'eql\x00', 'ip6erspan0\x00', {0x101}, {0x181}, 0x87, 0x5, 0x4, 0x17}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0xff}}}, {{@ipv6={@empty, @mcast2, [0xff000000, 0xffffffff, 0xffffffff, 0xff000000], [0xffffff00, 0xff, 0xffffff00, 0xff], 'nr0\x00', 'vlan0\x00', {}, {0x17e}, 0x55b2f8fb70bd5365, 0x20, 0x1, 0x1}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x6}}}, {{@ipv6={@rand_addr="450cfbdbdce356af63efb3e827b6d831", @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, [0x5b6d9deaac249546, 0xffffff00, 0xff], [0xff, 0x80ffffff, 0x345396a1bd7389c9], 'team_slave_1\x00', '\x00', {}, {}, 0x2, 0x0, 0x1, 0xb}, 0x0, 0x118, 0x158, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @common=@eui64={0x28, 'eui64\x00'}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xe90b0000, 0x4, @ipv6=@mcast2, 0x4e24}}}, {{@ipv6={@empty, @empty, [0x3dce33cdc85b8526, 0xb3b975fe04b65fd0, 0xff, 0xffffff00], [0xffffff00, 0x0, 0xff, 0xff0000ff], 'veth1\x00', 'tunl0\x00', {0x101}, {0xff}, 0x5e, 0xe2, 0x5, 0x9}, 0x0, 0x220, 0x248, 0x0, {}, [@common=@inet=@hashlimit3={0x158, 'hashlimit\x00', 0x3, {'rose0\x00', {0xe0, 0x100000001, 0x4, 0xc3c, 0x7, 0x5, 0x4, 0x6, 0x20}, 0x2}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x4, 0x6}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x780}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7a0) [ 261.170217][T11694] ptrace attach of "/root/syz-executor.1"[11646] was attempted by "/root/syz-executor.1"[11694] [ 261.266061][T11692] ptrace attach of "/root/syz-executor.1"[11646] was attempted by "/root/syz-executor.1"[11692] 17:53:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = socket(0x5, 0x1, 0x9) r4 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r4, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) connect$netlink(r5, &(0x7f0000000000)=@unspec, 0xc) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x4}, 0xb) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x28, r8, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001680)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000001640)={&(0x7f0000001280)={0x390, r8, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfaa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3800}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x45}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xf0be, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x7}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd8c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x946}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x13c, @ipv4={[], [], @multicast2}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x8000841) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000040)={r10}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x400, 0x9, 0xffffffffffffff94, 0xffffffffe4297199, 0x1, 0x40, {r10, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0xffff}}, 0xfffffffffffffffe, 0x5, 0xed, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000080)={r10}, &(0x7f00000000c0)=0x8) r12 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r12, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) getsockopt$bt_BT_SNDMTU(r12, 0x112, 0xc, &(0x7f00000016c0)=0xe1a6, &(0x7f0000001700)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r11, @in6={{0xa, 0x4e20, 0x1, @local, 0x8}}, [0x73, 0x6, 0x50c9b33b, 0x5, 0x7, 0x5, 0xa635, 0x23ed22a5, 0x100, 0x8, 0x359, 0x3, 0x2, 0x0, 0xfffffffffffffffc]}, &(0x7f0000000140)=0x100) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 261.333557][T11684] chnl_net:caif_netlink_parms(): no params data found 17:53:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = socket(0x5, 0x1, 0x9) r4 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r4, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) connect$netlink(r5, &(0x7f0000000000)=@unspec, 0xc) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x4}, 0xb) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x28, r8, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001680)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000001640)={&(0x7f0000001280)={0x390, r8, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfaa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3800}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x45}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xf0be, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x7}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd8c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x946}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x13c, @ipv4={[], [], @multicast2}, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x390}, 0x1, 0x0, 0x0, 0x80}, 0x8000841) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000040)={r10}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x400, 0x9, 0xffffffffffffff94, 0xffffffffe4297199, 0x1, 0x40, {r10, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0xffff}}, 0xfffffffffffffffe, 0x5, 0xed, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000080)={r10}, &(0x7f00000000c0)=0x8) r12 = socket(0x840000000002, 0x3, 0xff) sendmsg$rds(r12, &(0x7f0000004a80)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x1d81b3f9794facea) getsockopt$bt_BT_SNDMTU(r12, 0x112, 0xc, &(0x7f00000016c0)=0xe1a6, &(0x7f0000001700)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000280)={r11, @in6={{0xa, 0x4e20, 0x1, @local, 0x8}}, [0x73, 0x6, 0x50c9b33b, 0x5, 0x7, 0x5, 0xa635, 0x23ed22a5, 0x100, 0x8, 0x359, 0x3, 0x2, 0x0, 0xfffffffffffffffc]}, &(0x7f0000000140)=0x100) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 261.460710][T11684] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.468181][T11684] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.476871][T11684] device bridge_slave_0 entered promiscuous mode [ 261.545149][T11700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.613216][T11700] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 261.630339][T11684] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.637627][T11684] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.646425][T11684] device bridge_slave_1 entered promiscuous mode [ 261.864357][T11710] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.871863][T11710] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.953924][T11710] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 262.014489][T11684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.057415][T11684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 262.146730][T11684] team0: Port device team_slave_0 added [ 262.178055][T11684] team0: Port device team_slave_1 added [ 262.328227][T11684] device hsr_slave_0 entered promiscuous mode [ 262.373469][T11684] device hsr_slave_1 entered promiscuous mode [ 262.413295][T11684] debugfs: Directory 'hsr0' with parent '/' already present! 17:53:13 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) r5 = geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(0x0, r8, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x1e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000e2ffffff0000000000000000000000000000000000000000ffffffff01000000050000000000000000006e7230000000000000000000000070edc56d47c95c7f0000000000000000000079616d3000000000000000000000000076657468315f746f5f7465616d0000000180c2000000fd0000000000aaaaaaaaaa00fd000301000000007000000020010000500100006d61726b000000000000000000000000000000000000000000000000000000001000000000000000000000000000006c2c2072464095342ab9f2ad66889400feffffff00000000000000000009e73ae0136b08dcfca5ffbe55670172bc3c3c3d4bcf2701974f4e000000000000000000000000000000000000000000000000000000500000000000000006000000090002000000000063ae1307c9e613e052bf024cdb48fe2ed47cd545241b64b9952440dc1f265eea6de2a1c80c19619d21212499fb7dc07196a0f0cb57fddb269c6e00000000415544495400"]}, 0x252) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r12 = socket$inet6(0xa, 0x800000000000002, 0x0) r13 = accept$inet(r11, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r13, 0x84, 0x12, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r14 = semget(0x3, 0x4, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0xee01, 0xee00]) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(r13, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f0000000400)={{0x7, r15, r16, r17, r18, 0x18}, 0x8, 0x4, 0xffffffffffffffe1}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x1, r2}, {0x2, 0x3, r4}, {0x2, 0x1, r5}, {0x2, 0x4}, {0x2, 0x5, r8}, {0x2, 0x6, 0xffffffffffffffff}], {0x4, 0x3}, [{0x8, 0x2, r10}, {0x8, 0x0, r18}, {0x8, 0x7, r19}], {}, {0x20, 0x1}}, 0x6c, 0x3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 17:53:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) r6 = request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)='sfb\x00', 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r6, 0x10000) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2400000011000100"/20, @ANYRES32=r5, @ANYBLOB="f3ff00000005000000000000"], 0x24}}, 0x0) [ 262.510862][T11684] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.518154][T11684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.525942][T11684] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.533258][T11684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.578072][ T2931] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.612975][ T2931] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.690330][T11717] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 263.000741][T11717] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.097704][T11717] device bridge_slave_1 left promiscuous mode [ 263.104057][T11717] bridge0: port 2(bridge_slave_1) entered disabled state 17:53:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f00000004c0)="91dca50d5e0bcfe47bf01f928c4f716170") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfeca, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x1e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x258) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @link_local}, 0x0, {0x2, 0x4e20, @multicast1}, 'nr0\x00'}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ENCAP_DPORT={0x8, 0x8}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}]}, 0x44}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000500)='illinois\x00', 0x9) [ 263.227810][T11720] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 17:53:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000240)="2f0000001d0003fd6d0000360000000002dd07000218f6001f5f08c908000100020073730beeffff005867855e7fa5", 0x2f}], 0x1}, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=""/245, 0xf5) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6000000000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x2) [ 263.309356][T11684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.323628][T11723] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 263.345141][T11724] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 17:53:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f00000004c0)="91dca50d5e0bcfe47bf01f928c4f716170") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xfeca, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x1e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x258) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @link_local}, 0x0, {0x2, 0x4e20, @multicast1}, 'nr0\x00'}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ENCAP_DPORT={0x8, 0x8}], @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}]}, 0x44}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000500)='illinois\x00', 0x9) [ 263.386751][ T743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.395352][ T743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.418637][T11684] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.460113][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.470140][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.479236][ T2931] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.486474][ T2931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.558157][T11684] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 263.568996][T11684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 263.585293][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.594802][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.604225][ T2931] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.611392][ T2931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.621153][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.631266][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.641218][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.650711][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.660175][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.669810][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.679252][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.688306][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.697812][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.706850][ T2931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.725216][T11735] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 263.775883][T11684] 8021q: adding VLAN 0 to HW filter on device batadv0 17:53:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'ip6_vti0\x00'}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x14a02, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400200, 0x0) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000080)=0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'team_slave_0\x00'}, 0x18) bind$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x1, @host}, 0x10) [ 263.922174][T11739] IPVS: stopping master sync thread 11742 ... [ 263.936319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.945619][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.949271][T11745] IPVS: sync thread started: state = MASTER, mcast_ifn = team_slave_0, syncid = 0, id = 0 [ 264.262798][ T743] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 264.632963][ T743] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 548 [ 264.803180][ T743] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 264.812406][ T743] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 264.820636][ T743] usb 3-1: Product: syz [ 264.824921][ T743] usb 3-1: Manufacturer: ї [ 264.829499][ T743] usb 3-1: SerialNumber: syz [ 265.188763][ T743] ================================================================== [ 265.196991][ T743] BUG: KMSAN: uninit-value in kcov_remote_start+0xfe/0x2a0 [ 265.204187][ T743] CPU: 1 PID: 743 Comm: kworker/1:2 Not tainted 5.3.0-rc7+ #0 [ 265.211648][ T743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.221833][ T743] Workqueue: usb_hub_wq hub_event [ 265.226861][ T743] Call Trace: [ 265.230270][ T743] dump_stack+0x191/0x1f0 [ 265.234653][ T743] kmsan_report+0x162/0x2d0 [ 265.239170][ T743] kmsan_internal_check_memory+0x3ce/0x4e0 [ 265.244987][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.251089][ T743] kmsan_check_memory+0xd/0x10 [ 265.255856][ T743] kcov_remote_start+0xfe/0x2a0 [ 265.260715][ T743] hub_event+0x159/0x72f0 [ 265.265055][ T743] ? kmsan_set_origin+0x6a/0xf0 [ 265.269934][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.275834][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.281749][ T743] ? led_work+0x720/0x720 [ 265.286095][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.291995][ T743] ? led_work+0x720/0x720 [ 265.296334][ T743] ? led_work+0x720/0x720 [ 265.300687][ T743] process_one_work+0x1572/0x1ef0 [ 265.305742][ T743] worker_thread+0x189c/0x2460 [ 265.310532][ T743] kthread+0x4b5/0x4f0 [ 265.314604][ T743] ? process_one_work+0x1ef0/0x1ef0 [ 265.319810][ T743] ? kthread_blkcg+0xf0/0xf0 [ 265.324449][ T743] ret_from_fork+0x35/0x40 [ 265.328874][ T743] [ 265.331201][ T743] Uninit was created at: [ 265.335480][ T743] kmsan_save_stack_with_flags+0x37/0x70 [ 265.341111][ T743] kmsan_alloc_page+0x151/0x360 [ 265.345958][ T743] __alloc_pages_nodemask+0x142d/0x5fa0 [ 265.351504][ T743] alloc_pages_current+0x68d/0x9a0 [ 265.356623][ T743] __vmalloc_node_range+0x82c/0x14b0 [ 265.361908][ T743] vmalloc+0xd7/0xf0 [ 265.365803][ T743] kcov_remote_start+0x167/0x2a0 [ 265.370749][ T743] hub_event+0x159/0x72f0 [ 265.375079][ T743] process_one_work+0x1572/0x1ef0 [ 265.380100][ T743] worker_thread+0x111b/0x2460 [ 265.384866][ T743] kthread+0x4b5/0x4f0 [ 265.388949][ T743] ret_from_fork+0x35/0x40 [ 265.393369][ T743] [ 265.395696][ T743] Bytes 0-15 of 16 are uninitialized [ 265.400971][ T743] Memory access of size 16 starts at ffffc9000c3f0000 [ 265.407719][ T743] ================================================================== [ 265.415785][ T743] Disabling lock debugging due to kernel taint [ 265.421944][ T743] Kernel panic - not syncing: panic_on_warn set ... [ 265.428537][ T743] CPU: 1 PID: 743 Comm: kworker/1:2 Tainted: G B 5.3.0-rc7+ #0 [ 265.437380][ T743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.447473][ T743] Workqueue: usb_hub_wq hub_event [ 265.452492][ T743] Call Trace: [ 265.455787][ T743] dump_stack+0x191/0x1f0 [ 265.460124][ T743] panic+0x3c9/0xc1e [ 265.464045][ T743] kmsan_report+0x2ca/0x2d0 [ 265.468552][ T743] kmsan_internal_check_memory+0x3ce/0x4e0 [ 265.474359][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.480279][ T743] kmsan_check_memory+0xd/0x10 [ 265.485044][ T743] kcov_remote_start+0xfe/0x2a0 [ 265.489904][ T743] hub_event+0x159/0x72f0 [ 265.494240][ T743] ? kmsan_set_origin+0x6a/0xf0 [ 265.499110][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.505255][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.511146][ T743] ? led_work+0x720/0x720 [ 265.515474][ T743] ? kmsan_get_shadow_origin_ptr+0x6e/0x4c0 [ 265.521366][ T743] ? led_work+0x720/0x720 [ 265.525693][ T743] ? led_work+0x720/0x720 [ 265.530022][ T743] process_one_work+0x1572/0x1ef0 [ 265.535244][ T743] worker_thread+0x189c/0x2460 [ 265.540041][ T743] kthread+0x4b5/0x4f0 [ 265.544115][ T743] ? process_one_work+0x1ef0/0x1ef0 [ 265.549315][ T743] ? kthread_blkcg+0xf0/0xf0 [ 265.553910][ T743] ret_from_fork+0x35/0x40 [ 265.559744][ T743] Kernel Offset: disabled [ 265.564066][ T743] Rebooting in 86400 seconds..