[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.018606] audit: type=1800 audit(1544488136.061:25): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.039432] audit: type=1800 audit(1544488136.081:26): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.058976] audit: type=1800 audit(1544488136.101:27): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.185' (ECDSA) to the list of known hosts. 2018/12/11 00:29:12 fuzzer started 2018/12/11 00:29:17 dialing manager at 10.128.0.26:37383 2018/12/11 00:29:18 syscalls: 1 2018/12/11 00:29:18 code coverage: enabled 2018/12/11 00:29:18 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/11 00:29:18 setuid sandbox: enabled 2018/12/11 00:29:18 namespace sandbox: enabled 2018/12/11 00:29:18 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/11 00:29:18 fault injection: enabled 2018/12/11 00:29:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/11 00:29:18 net packet injection: enabled 2018/12/11 00:29:18 net device setup: enabled 00:31:44 executing program 0: unshare(0x8000400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) syzkaller login: [ 228.792212] IPVS: ftp: loaded support on port[0] = 21 [ 230.877621] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.884278] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.893068] device bridge_slave_0 entered promiscuous mode [ 231.025869] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.032517] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.041157] device bridge_slave_1 entered promiscuous mode [ 231.157382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.275589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.640162] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.763825] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:31:48 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040), 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7400ffffffff0000dffc0c00000000000000000000005b659a62290ffc380c2dbfdcfa3d13e1a0bd1dd464fbc3f5c1b4e2bf501fb1bb949869c2984d914d9f62f304075e4fcd4dd3056e0bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0806e75ffff000044f2a433a15b4ce56aa166"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) [ 232.493656] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.502440] team0: Port device team_slave_0 added [ 232.651403] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.659977] team0: Port device team_slave_1 added [ 232.668813] IPVS: ftp: loaded support on port[0] = 21 [ 232.774727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.781780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.790959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.937703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.944946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.954290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.162703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.170373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.179761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.403858] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.412133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.422001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.445920] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.452548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.459668] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.466293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.475446] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.872526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.900242] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.907005] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.915605] device bridge_slave_0 entered promiscuous mode [ 236.086084] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.092882] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.101604] device bridge_slave_1 entered promiscuous mode [ 236.217431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.362179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.906449] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.078719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.305556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.312801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 00:31:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x2000000000002b, &(0x7f0000000040), 0xff9e) [ 237.608685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.616076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.200313] IPVS: ftp: loaded support on port[0] = 21 [ 238.382618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.390869] team0: Port device team_slave_0 added [ 238.605164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.613972] team0: Port device team_slave_1 added [ 238.890044] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.899424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.908461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.143640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.151035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.160310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.361563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.369955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.379064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.690280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.698208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.707499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.125293] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.132123] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.140630] device bridge_slave_0 entered promiscuous mode [ 242.271478] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.278115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.285309] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.292175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.301232] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.451123] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.458069] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.466883] device bridge_slave_1 entered promiscuous mode [ 242.752192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 242.936523] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.052221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.539820] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.749643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.262584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.269805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:32:00 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x3, @win={{0x0, 0x0, 0x9}, 0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x0, 0x10000}, &(0x7f0000000080)={{}, &(0x7f0000000000)}}, 0x1, &(0x7f0000000300)}}) [ 244.817854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.086909] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.095545] team0: Port device team_slave_0 added [ 245.370916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.379586] team0: Port device team_slave_1 added [ 245.656626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.664121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.673051] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.799987] IPVS: ftp: loaded support on port[0] = 21 [ 246.016985] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.024429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.033501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.044954] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.266208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.274121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.283378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.510262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.518188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.527863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.212694] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.219834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.228032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.378332] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.005673] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.012357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.019444] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.026101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.035685] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.132859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.500363] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.507189] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.515878] device bridge_slave_0 entered promiscuous mode [ 250.802122] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.808652] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.817483] device bridge_slave_1 entered promiscuous mode [ 251.106646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.406335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.290917] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.627466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.965454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.973664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.288739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.296052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.149801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.181740] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.190417] team0: Port device team_slave_0 added [ 254.488086] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.497108] team0: Port device team_slave_1 added 00:32:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 254.761035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.768607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.777570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.263366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.270568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.279819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.406827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 00:32:11 executing program 0: unshare(0x8000400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) [ 255.663916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.671600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.681113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.974028] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.981660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.990918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.037653] IPVS: ftp: loaded support on port[0] = 21 00:32:12 executing program 0: unshare(0x8000400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) 00:32:12 executing program 0: unshare(0x8000400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) [ 256.867286] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.873959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.881991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:32:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x44, 0x7, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, 0x0) 00:32:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x44, 0x7, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, 0x0) 00:32:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x44, 0x7, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, 0x0) 00:32:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x44, 0x7, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, 0x0) [ 258.193814] 8021q: adding VLAN 0 to HW filter on device team0 00:32:14 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x301000, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0x4) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000040)={0x1, "cff696ab580a2366e2e6cc6f86c406dfa7ed4e71b53476ac931ac287e4a9d50f", 0x3, 0x1}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x401}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x7}, &(0x7f0000000200)=0x8) [ 259.935687] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.942325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.949428] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.956103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.964977] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 259.971606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.857878] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.864548] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.873160] device bridge_slave_0 entered promiscuous mode [ 262.205694] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.212386] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.221115] device bridge_slave_1 entered promiscuous mode [ 262.567235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.882582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.368110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.888322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.205129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.460737] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.467722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 264.474933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.806918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 264.814413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.475249] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.481674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.489960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:32:21 executing program 1: [ 265.736583] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.745316] team0: Port device team_slave_0 added [ 265.942450] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.951007] team0: Port device team_slave_1 added [ 266.160007] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.178026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 266.187238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.196434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.430095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 266.437595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.446663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.669254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.677070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.686187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.834840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.842596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.851593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.827971] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.834586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.841665] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.848345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.857333] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.864010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.649818] 8021q: adding VLAN 0 to HW filter on device bond0 00:32:26 executing program 2: [ 270.344243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 270.815470] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 270.822043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.830090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.297937] 8021q: adding VLAN 0 to HW filter on device team0 00:32:30 executing program 3: [ 274.397832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.659503] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 274.917345] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 274.923788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.931466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.192271] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.827731] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 00:32:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:32 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4800, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="55702b8f13d14448bae0d3c11ee2fdb7", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="3bb8dfe6f5b3d6998087a1d6a4e0b2a5", 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp], 0x1) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000100)=""/208) ioctl$sock_bt(r0, 0x0, &(0x7f0000000200)="6843994a0bcd28255046ef089cc750f1223233b23aaa4a8ff89e1a003dd0ce3b3a51e6ae150614bf1ac5ba8faa836933b720311eef5bd0061e3079e589940a426c6768be6d510660e97a39099fbdcbd67d586be175865d36") ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000280)={0x0, {0x0, 0xff}}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x9, 0x4, 0x9, 0x9}, 0x10) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/exec\x00', 0x2, 0x0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/34, 0x22}], 0x1) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, &(0x7f00000003c0)=0x3000000000, 0x0, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000480)) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000004c0)={'veth1_to_bond\x00', {0x2, 0x4e23, @multicast2}}) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000500)={0x2, 0x80000000}) prctl$PR_SET_FP_MODE(0x2d, 0x3) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000540)={0x2, 0x100, 0x3}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000580)={0x30, 0x5, 0x0, {0x0, 0x0, 0x9, 0x3}}, 0x30) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x4e22, @rand_addr=0xcc61}}, 0x0, 0xffffffffffffffff, 0x0, "7935089983c55ac7c06f2f78e1b0e6b71d1edd49cd31307462674bc55a7522141514fa7ba01d4cbd0a56dcfe65c3b71816ab736fa453d81428ed2d1bbf230b1c6badab839781a4f8e48fc36e03345117"}, 0xd8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x141000, 0x0) clock_settime(0x4, &(0x7f0000000700)={0x0, 0x989680}) r3 = openat$cgroup_subtree(r2, &(0x7f0000000740)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000780)={{0xa5dd, 0x2}, {0x9, 0x6}, 0x3, 0x2, 0x7}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) recvfrom$packet(r2, &(0x7f0000000800)=""/192, 0xc0, 0x40000000, &(0x7f0000000a00)={0x11, 0x0, r4, 0x1, 0x6, 0x6, @dev={[], 0x19}}, 0x14) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000a40)={0x0, 0x3}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000ac0)={r5}, &(0x7f0000000b00)=0xc) 00:32:32 executing program 0: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000000)={0x2, 0xa, 0x67f, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) 00:32:32 executing program 1: 00:32:32 executing program 2: 00:32:32 executing program 3: [ 277.052807] binder_alloc: binder_alloc_mmap_handler: 8087 20010000-20014000 already mapped failed -16 00:32:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:33 executing program 2: 00:32:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) unlink(&(0x7f00000002c0)='./bus\x00') 00:32:33 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:33 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 00:32:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv6_delrule={0x20, 0x21, 0x21, 0x0, 0x0, {0xa, 0x0, 0x10}}, 0x20}}, 0x0) [ 277.674424] binder: BINDER_SET_CONTEXT_MGR already set [ 277.679934] binder: 8114:8118 ioctl 40046207 0 returned -16 [ 277.847816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 278.171020] IPVS: ftp: loaded support on port[0] = 21 [ 279.317228] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.323877] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.331473] device bridge_slave_0 entered promiscuous mode [ 279.399999] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.406495] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.414607] device bridge_slave_1 entered promiscuous mode [ 279.483316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 279.550080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 279.757143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 279.829655] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 280.163033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 280.170961] team0: Port device team_slave_0 added [ 280.242727] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 280.250491] team0: Port device team_slave_1 added [ 280.319497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.389506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 280.459651] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 280.467121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.476329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.541142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 280.548690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.558877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.306126] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.312712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.319523] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.326087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.334076] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 282.012852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.107157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.364552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.619610] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.626023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.634192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.895346] 8021q: adding VLAN 0 to HW filter on device team0 00:32:42 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000017ff0)={&(0x7f0000000300)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc12502000000a0000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 00:32:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @remote, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "ed2f56", 0x44, 0x0, 0x0, @dev, @remote, {[], @gre}}}}}}, 0x0) 00:32:42 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x10, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) 00:32:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@ipv6_delrule={0x20, 0x21, 0x21, 0x0, 0x0, {0xa, 0x0, 0x10}}, 0x20}}, 0x0) 00:32:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="b4b92e1fd9b363b0cb4c14ea48f601a2ee84e1c1cd06161939689cdf0df063aed161a4671608777f2b955f9a0ca2fdd5dfee8a2c7bc70c16fbec0549eb49236407089fa0c7a5f744820aea1a6c0e47e338aac5c2a50d61fbf52f612e8ab257197a745966c61225b5a1c49002abdf71af48b037c73f61ba37af95bf44ce7d40a56594455b9f56fcfc85368fa81f0fcbfd23d339fee583204233f0623ce910a3195d8ac40f96e125df846c72e6e32730bc1029", 0xb2, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0xfffffffffffffeef) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x3) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[], 0x0, 0x1200}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 286.714187] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 00:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) setreuid(0x0, 0x0) 00:32:43 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001400)={0x2, 0x4e23}, 0x10) 00:32:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001400)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @local}, 0x10) 00:32:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001400)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 00:32:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) [ 287.214160] kauditd_printk_skb: 3 callbacks suppressed [ 287.214192] audit: type=1326 audit(1544488363.261:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8407 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ba code=0xffff0000 00:32:43 executing program 4: 00:32:43 executing program 5: 00:32:43 executing program 2: 00:32:43 executing program 4: 00:32:43 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) [ 287.816331] audit: type=1326 audit(1544488363.861:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8407 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ba code=0xffff0000 00:32:44 executing program 0: 00:32:44 executing program 5: 00:32:44 executing program 2: 00:32:44 executing program 4: 00:32:44 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:44 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:44 executing program 4: 00:32:44 executing program 5: 00:32:44 executing program 2: 00:32:44 executing program 0: 00:32:44 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:44 executing program 5: 00:32:44 executing program 4: 00:32:44 executing program 2: 00:32:45 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:45 executing program 0: 00:32:45 executing program 4: 00:32:45 executing program 5: 00:32:45 executing program 2: 00:32:45 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00'}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:45 executing program 0: 00:32:45 executing program 2: 00:32:45 executing program 4: 00:32:45 executing program 5: 00:32:45 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00'}) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:45 executing program 2: 00:32:45 executing program 0: 00:32:45 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:46 executing program 5: 00:32:46 executing program 4: 00:32:46 executing program 2: 00:32:46 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:46 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:46 executing program 0: 00:32:46 executing program 5: 00:32:46 executing program 4: 00:32:46 executing program 0: 00:32:46 executing program 2: 00:32:46 executing program 1: r0 = socket(0x0, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:46 executing program 5: 00:32:46 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:46 executing program 0: 00:32:47 executing program 4: 00:32:47 executing program 2: 00:32:47 executing program 5: 00:32:47 executing program 1: r0 = socket(0x200000000000011, 0x0, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:47 executing program 0: 00:32:47 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:47 executing program 4: 00:32:47 executing program 2: 00:32:47 executing program 5: 00:32:47 executing program 0: 00:32:47 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:47 executing program 0: 00:32:47 executing program 4: 00:32:47 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:47 executing program 2: 00:32:48 executing program 5: 00:32:48 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:48 executing program 0: 00:32:48 executing program 4: 00:32:48 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:48 executing program 2: 00:32:48 executing program 0: 00:32:48 executing program 5: 00:32:48 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:48 executing program 4: 00:32:48 executing program 2: 00:32:48 executing program 0: 00:32:48 executing program 5: 00:32:49 executing program 4: 00:32:49 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:49 executing program 2: 00:32:49 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:49 executing program 5: 00:32:49 executing program 4: 00:32:49 executing program 0: 00:32:49 executing program 2: 00:32:49 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:49 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:49 executing program 5: 00:32:49 executing program 4: 00:32:49 executing program 0: 00:32:49 executing program 2: 00:32:50 executing program 5: 00:32:50 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:50 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:50 executing program 4: 00:32:50 executing program 0: 00:32:50 executing program 5: 00:32:50 executing program 0: 00:32:50 executing program 2: 00:32:50 executing program 4: 00:32:50 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00'}) bind$packet(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:50 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:50 executing program 5: 00:32:50 executing program 0: 00:32:50 executing program 4: 00:32:50 executing program 2: 00:32:51 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:51 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:51 executing program 4: 00:32:51 executing program 0: 00:32:51 executing program 5: 00:32:51 executing program 2: 00:32:51 executing program 0: 00:32:51 executing program 4: 00:32:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 00:32:51 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)={'syz1', "8e1af5f5d36a9c2708416e81ba12c9ea5057c800ec64fd268176a770fa85733d562a99e14a"}, 0x29) 00:32:51 executing program 5: 00:32:51 executing program 0: 00:32:51 executing program 2: 00:32:51 executing program 4: 00:32:52 executing program 5: 00:32:52 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r0, 0x0, 0x0) 00:32:52 executing program 0: fchmodat(0xffffffffffffffff, 0x0, 0x10) getuid() fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="430f977c0c0ec422b1b70765410fe234d041d9f865460f175208c441fd503df2410f7d3e64f34b0f2c3f6fc4c1f96e06c4c1f8532a2666410f383cb205ac0000") 00:32:52 executing program 3: r0 = socket(0x0, 0x4000000000080002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf32(r0, 0x0, 0x0) 00:32:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 00:32:52 executing program 5: [ 296.352930] ================================================================== [ 296.360369] BUG: KMSAN: uninit-value in vti6_tnl_xmit+0x540/0x28a0 [ 296.366704] CPU: 1 PID: 8713 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #111 [ 296.373985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.383345] Call Trace: [ 296.385950] dump_stack+0x284/0x3b0 [ 296.389585] ? vti6_tnl_xmit+0x540/0x28a0 [ 296.393798] kmsan_report+0x12d/0x290 [ 296.397737] __msan_warning+0x76/0xc0 [ 296.401566] vti6_tnl_xmit+0x540/0x28a0 [ 296.405563] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 296.414344] ? __msan_poison_alloca+0x1e0/0x270 [ 296.419060] ? vti6_dev_uninit+0x670/0x670 [ 296.423320] dev_hard_start_xmit+0x6a8/0xd80 [ 296.424658] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 296.427772] __dev_queue_xmit+0x2e9d/0x3ad0 [ 296.427834] dev_queue_xmit+0x4b/0x60 [ 296.453917] ? __netdev_pick_tx+0x1390/0x1390 [ 296.458439] packet_sendmsg+0x83bb/0x9070 [ 296.462605] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf70 [ 296.468064] ? kmsan_memcpy_metadata+0xb/0x10 [ 296.472579] ? sock_write_iter+0x102/0x4f0 [ 296.476841] ? __se_sys_write+0x17a/0x370 [ 296.481004] ? do_syscall_64+0xcd/0x110 [ 296.484999] ? kmsan_save_stack_with_flags+0x130/0x130 [ 296.490290] ? futex_wait+0xcb1/0xe60 [ 296.494100] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 296.499466] ? aa_sk_perm+0x7ab/0x9e0 [ 296.503307] ? compat_packet_setsockopt+0x360/0x360 [ 296.508333] sock_write_iter+0x3f4/0x4f0 [ 296.512425] ? sock_read_iter+0x4e0/0x4e0 [ 296.516574] __vfs_write+0x888/0xb80 [ 296.520311] vfs_write+0x4b4/0x900 [ 296.524041] __se_sys_write+0x17a/0x370 [ 296.528022] __x64_sys_write+0x4a/0x70 [ 296.531910] do_syscall_64+0xcd/0x110 [ 296.535710] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.540893] RIP: 0033:0x457659 [ 296.544106] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.563197] RSP: 002b:00007f9eadefec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 296.570902] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 296.578164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 296.585434] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 296.592697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9eadeff6d4 [ 296.599959] R13: 00000000004c6097 R14: 00000000004dac28 R15: 00000000ffffffff [ 296.607230] [ 296.608846] Uninit was created at: [ 296.612470] kmsan_internal_poison_shadow+0x92/0x150 [ 296.617571] kmsan_kmalloc+0xa1/0x100 [ 296.621416] kmsan_slab_alloc+0xe/0x10 [ 296.625307] __kmalloc_node_track_caller+0xf72/0x1280 [ 296.630503] __alloc_skb+0x3f9/0xdf0 [ 296.634217] alloc_skb_with_frags+0x1c9/0xa80 [ 296.638705] sock_alloc_send_pskb+0xd49/0x1360 [ 296.643288] packet_sendmsg+0x66a9/0x9070 [ 296.647433] sock_write_iter+0x3f4/0x4f0 [ 296.651491] __vfs_write+0x888/0xb80 [ 296.655198] vfs_write+0x4b4/0x900 [ 296.658735] __se_sys_write+0x17a/0x370 [ 296.662707] __x64_sys_write+0x4a/0x70 [ 296.666586] do_syscall_64+0xcd/0x110 [ 296.670398] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.675576] ================================================================== [ 296.682923] Disabling lock debugging due to kernel taint [ 296.688366] Kernel panic - not syncing: panic_on_warn set ... [ 296.694246] CPU: 1 PID: 8713 Comm: syz-executor1 Tainted: G B 4.20.0-rc5+ #111 [ 296.702904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.712262] Call Trace: [ 296.714860] dump_stack+0x284/0x3b0 [ 296.718491] panic+0x533/0xb02 [ 296.721709] kmsan_report+0x290/0x290 [ 296.725600] __msan_warning+0x76/0xc0 [ 296.729406] vti6_tnl_xmit+0x540/0x28a0 [ 296.733376] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 296.738757] ? __msan_poison_alloca+0x1e0/0x270 [ 296.743433] ? vti6_dev_uninit+0x670/0x670 [ 296.747665] dev_hard_start_xmit+0x6a8/0xd80 [ 296.752087] __dev_queue_xmit+0x2e9d/0x3ad0 [ 296.756431] dev_queue_xmit+0x4b/0x60 [ 296.760225] ? __netdev_pick_tx+0x1390/0x1390 [ 296.764717] packet_sendmsg+0x83bb/0x9070 [ 296.768865] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf70 [ 296.774309] ? kmsan_memcpy_metadata+0xb/0x10 [ 296.778803] ? sock_write_iter+0x102/0x4f0 [ 296.783036] ? __se_sys_write+0x17a/0x370 [ 296.787184] ? do_syscall_64+0xcd/0x110 [ 296.791161] ? kmsan_save_stack_with_flags+0x130/0x130 [ 296.796433] ? futex_wait+0xcb1/0xe60 [ 296.800236] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 296.805597] ? aa_sk_perm+0x7ab/0x9e0 [ 296.809425] ? compat_packet_setsockopt+0x360/0x360 [ 296.814437] sock_write_iter+0x3f4/0x4f0 [ 296.818509] ? sock_read_iter+0x4e0/0x4e0 [ 296.822656] __vfs_write+0x888/0xb80 [ 296.826388] vfs_write+0x4b4/0x900 [ 296.829943] __se_sys_write+0x17a/0x370 [ 296.833927] __x64_sys_write+0x4a/0x70 [ 296.837815] do_syscall_64+0xcd/0x110 [ 296.841613] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.846800] RIP: 0033:0x457659 [ 296.849988] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.868973] RSP: 002b:00007f9eadefec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 296.876675] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 296.883938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 296.891213] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 296.898477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9eadeff6d4 [ 296.905738] R13: 00000000004c6097 R14: 00000000004dac28 R15: 00000000ffffffff [ 296.914231] Kernel Offset: disabled [ 296.917858] Rebooting in 86400 seconds..