[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.907478] audit: type=1800 audit(1542701016.951:25): pid=6528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.926643] audit: type=1800 audit(1542701016.971:26): pid=6528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.946101] audit: type=1800 audit(1542701016.981:27): pid=6528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.29' (ECDSA) to the list of known hosts. 2018/11/20 08:03:52 fuzzer started 2018/11/20 08:03:57 dialing manager at 10.128.0.26:38037 2018/11/20 08:03:57 syscalls: 1 2018/11/20 08:03:57 code coverage: enabled 2018/11/20 08:03:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/20 08:03:57 setuid sandbox: enabled 2018/11/20 08:03:57 namespace sandbox: enabled 2018/11/20 08:03:57 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/20 08:03:57 fault injection: enabled 2018/11/20 08:03:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/20 08:03:57 net packet injection: enabled 2018/11/20 08:03:57 net device setup: enabled 08:06:46 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0), 0x8) syzkaller login: [ 252.793106] IPVS: ftp: loaded support on port[0] = 21 [ 255.165802] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.172466] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.181049] device bridge_slave_0 entered promiscuous mode [ 255.322754] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.329226] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.338247] device bridge_slave_1 entered promiscuous mode [ 255.476951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.615172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.038243] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.179486] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:06:51 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f00008f0000/0xf000)=nil, 0xf000, 0x0, 0x12, r0, 0x0) mprotect(&(0x7f00008fb000/0x2000)=nil, 0x2000, 0x0) [ 257.119534] IPVS: ftp: loaded support on port[0] = 21 [ 257.236860] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.245118] team0: Port device team_slave_0 added [ 257.481922] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.490111] team0: Port device team_slave_1 added [ 257.661880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 257.669007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.677962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.942414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 257.949466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.958736] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.129186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.137093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.146546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.326861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.334752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.344004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.986878] ip (6805) used greatest stack depth: 53456 bytes left [ 260.812299] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.818817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.825881] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.832434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.841417] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 261.043302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.256501] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.263153] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.271835] device bridge_slave_0 entered promiscuous mode [ 261.528818] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.535458] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.544352] device bridge_slave_1 entered promiscuous mode [ 261.787538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.011884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.545929] bond0: Enslaving bond_slave_0 as an active interface with an up link 08:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x3, @remote}}}, 0x108) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 262.845621] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.376824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.384708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.571699] IPVS: ftp: loaded support on port[0] = 21 [ 264.190969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.199199] team0: Port device team_slave_0 added [ 264.518942] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.527063] team0: Port device team_slave_1 added [ 264.821209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 264.828528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.837407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.027559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.035091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.044293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.373764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.381393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.390750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.706767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.714572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.723686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.568068] ip (6938) used greatest stack depth: 53168 bytes left [ 267.935214] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.941718] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.950477] device bridge_slave_0 entered promiscuous mode [ 268.250704] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.257300] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.266063] device bridge_slave_1 entered promiscuous mode [ 268.514020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.607198] not chained 10000 origins [ 268.611074] CPU: 0 PID: 6984 Comm: ip Not tainted 4.20.0-rc3+ #89 [ 268.617330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.626703] Call Trace: [ 268.629322] dump_stack+0x32d/0x480 [ 268.632999] kmsan_internal_chain_origin+0x222/0x240 [ 268.638175] ? save_stack_trace+0xc6/0x110 [ 268.642443] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 268.647588] ? kmsan_internal_chain_origin+0x1e3/0x240 [ 268.652905] ? kmsan_internal_chain_origin+0x136/0x240 [ 268.658204] ? __msan_chain_origin+0x6d/0xb0 [ 268.662641] ? save_stack_trace+0xfa/0x110 [ 268.666899] ? kmsan_internal_chain_origin+0x136/0x240 [ 268.672203] ? kmsan_memcpy_origins+0x13d/0x190 [ 268.676915] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 268.682395] ? in_task_stack+0x12c/0x210 [ 268.686502] __msan_chain_origin+0x6d/0xb0 [ 268.690762] ? ___sys_recvmsg+0x444/0xae0 [ 268.694939] __save_stack_trace+0x8be/0xc60 [ 268.699318] ? ___sys_recvmsg+0x444/0xae0 [ 268.703511] save_stack_trace+0xc6/0x110 [ 268.707608] kmsan_internal_chain_origin+0x136/0x240 [ 268.712754] ? kmsan_internal_chain_origin+0x136/0x240 [ 268.718055] ? kmsan_memcpy_origins+0x13d/0x190 [ 268.722749] ? __msan_memcpy+0x6f/0x80 [ 268.726696] ? nla_put+0x20a/0x2d0 [ 268.730289] ? br_port_fill_attrs+0x42b/0x1ea0 [ 268.734906] ? br_port_fill_slave_info+0xff/0x120 [ 268.739774] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 268.744292] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 268.748807] ? netlink_dump+0xc79/0x1c90 [ 268.752889] ? netlink_recvmsg+0xec2/0x19d0 [ 268.757250] ? sock_recvmsg+0x1d1/0x230 [ 268.761247] ? ___sys_recvmsg+0x444/0xae0 [ 268.765419] ? __se_sys_recvmsg+0x2fa/0x450 [ 268.769766] ? __x64_sys_recvmsg+0x4a/0x70 [ 268.774025] ? do_syscall_64+0xcf/0x110 [ 268.778022] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.783423] ? __msan_poison_alloca+0x1e0/0x270 [ 268.788150] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 268.793538] ? find_next_bit+0x25b/0x2a0 [ 268.797618] ? vmalloc_to_page+0x585/0x6c0 [ 268.801886] ? kmsan_set_origin+0x7f/0x100 [ 268.806159] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 268.811558] kmsan_memcpy_origins+0x13d/0x190 [ 268.816087] __msan_memcpy+0x6f/0x80 [ 268.819856] nla_put+0x20a/0x2d0 [ 268.823274] br_port_fill_attrs+0x42b/0x1ea0 [ 268.827724] br_port_fill_slave_info+0xff/0x120 [ 268.832438] ? br_port_get_slave_size+0x30/0x30 [ 268.837150] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 268.841554] rtnl_dump_ifinfo+0x18b5/0x2140 [ 268.846034] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 268.851438] ? rtnl_getlink+0xec0/0xec0 [ 268.855433] netlink_dump+0xc79/0x1c90 [ 268.859384] netlink_recvmsg+0xec2/0x19d0 [ 268.863595] sock_recvmsg+0x1d1/0x230 [ 268.867423] ? netlink_sendmsg+0x1440/0x1440 [ 268.871861] ___sys_recvmsg+0x444/0xae0 [ 268.875893] ? __msan_poison_alloca+0x1e0/0x270 [ 268.880600] ? __se_sys_recvmsg+0xca/0x450 [ 268.884866] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 268.890259] ? __fdget+0x23c/0x440 [ 268.893840] __se_sys_recvmsg+0x2fa/0x450 [ 268.898044] __x64_sys_recvmsg+0x4a/0x70 [ 268.902140] do_syscall_64+0xcf/0x110 [ 268.905979] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.911190] RIP: 0033:0x7faea0ee2210 [ 268.914932] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 268.933857] RSP: 002b:00007fff6f26f8f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 268.941590] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faea0ee2210 [ 268.948881] RDX: 0000000000000000 RSI: 00007fff6f26f940 RDI: 0000000000000003 [ 268.956170] RBP: 0000000000001fe4 R08: 00007faea118bec8 R09: 0000000000000000 [ 268.963460] R10: 0000000000000008 R11: 0000000000000246 R12: 00000000006395c0 [ 268.970754] R13: 00007fff6f2739d0 R14: 0000000000001fe4 R15: 00007fff6f271964 [ 268.978244] Uninit was stored to memory at: [ 268.982595] kmsan_internal_chain_origin+0x136/0x240 [ 268.987718] __msan_chain_origin+0x6d/0xb0 [ 268.991976] __save_stack_trace+0x8be/0xc60 [ 268.996335] save_stack_trace+0xc6/0x110 [ 269.000418] kmsan_internal_chain_origin+0x136/0x240 [ 269.005549] kmsan_memcpy_origins+0x13d/0x190 [ 269.010068] __msan_memcpy+0x6f/0x80 [ 269.013825] nla_put+0x20a/0x2d0 [ 269.017219] br_port_fill_attrs+0x366/0x1ea0 [ 269.021668] br_port_fill_slave_info+0xff/0x120 [ 269.026366] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.030708] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.035055] netlink_dump+0xc79/0x1c90 [ 269.038964] netlink_recvmsg+0xec2/0x19d0 [ 269.043146] sock_recvmsg+0x1d1/0x230 [ 269.046965] ___sys_recvmsg+0x444/0xae0 [ 269.050956] __se_sys_recvmsg+0x2fa/0x450 [ 269.055134] __x64_sys_recvmsg+0x4a/0x70 [ 269.059214] do_syscall_64+0xcf/0x110 [ 269.063056] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.068254] [ 269.069892] Uninit was stored to memory at: [ 269.074242] kmsan_internal_chain_origin+0x136/0x240 [ 269.079369] __msan_chain_origin+0x6d/0xb0 [ 269.083628] __save_stack_trace+0x8be/0xc60 [ 269.087973] save_stack_trace+0xc6/0x110 [ 269.092068] kmsan_internal_chain_origin+0x136/0x240 [ 269.097201] kmsan_memcpy_origins+0x13d/0x190 [ 269.101720] __msan_memcpy+0x6f/0x80 [ 269.105459] nla_put+0x20a/0x2d0 [ 269.108851] br_port_fill_attrs+0x366/0x1ea0 [ 269.113282] br_port_fill_slave_info+0xff/0x120 [ 269.117973] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.122313] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.126650] netlink_dump+0xc79/0x1c90 [ 269.130552] netlink_recvmsg+0xec2/0x19d0 [ 269.134721] sock_recvmsg+0x1d1/0x230 [ 269.138542] ___sys_recvmsg+0x444/0xae0 [ 269.142532] __se_sys_recvmsg+0x2fa/0x450 [ 269.146699] __x64_sys_recvmsg+0x4a/0x70 [ 269.150779] do_syscall_64+0xcf/0x110 [ 269.154607] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.159801] [ 269.161436] Uninit was stored to memory at: [ 269.165784] kmsan_internal_chain_origin+0x136/0x240 [ 269.170906] __msan_chain_origin+0x6d/0xb0 [ 269.175174] __save_stack_trace+0x8be/0xc60 [ 269.179517] save_stack_trace+0xc6/0x110 [ 269.183605] kmsan_internal_chain_origin+0x136/0x240 [ 269.188732] kmsan_memcpy_origins+0x13d/0x190 [ 269.193257] __msan_memcpy+0x6f/0x80 [ 269.196993] nla_put+0x20a/0x2d0 [ 269.200384] br_port_fill_attrs+0x366/0x1ea0 [ 269.204817] br_port_fill_slave_info+0xff/0x120 [ 269.209508] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.213847] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.218186] netlink_dump+0xc79/0x1c90 [ 269.222099] netlink_recvmsg+0xec2/0x19d0 [ 269.226277] sock_recvmsg+0x1d1/0x230 [ 269.230098] ___sys_recvmsg+0x444/0xae0 [ 269.234114] __se_sys_recvmsg+0x2fa/0x450 [ 269.238280] __x64_sys_recvmsg+0x4a/0x70 [ 269.242376] do_syscall_64+0xcf/0x110 [ 269.246204] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.251433] [ 269.253069] Uninit was stored to memory at: [ 269.257424] kmsan_internal_chain_origin+0x136/0x240 [ 269.262547] __msan_chain_origin+0x6d/0xb0 [ 269.266801] __save_stack_trace+0x8be/0xc60 [ 269.271152] save_stack_trace+0xc6/0x110 [ 269.275245] kmsan_internal_chain_origin+0x136/0x240 [ 269.280370] kmsan_memcpy_origins+0x13d/0x190 [ 269.284886] __msan_memcpy+0x6f/0x80 [ 269.288625] nla_put+0x20a/0x2d0 [ 269.292015] br_port_fill_attrs+0x366/0x1ea0 [ 269.296449] br_port_fill_slave_info+0xff/0x120 [ 269.301152] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.305495] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.309836] netlink_dump+0xc79/0x1c90 [ 269.313743] netlink_recvmsg+0xec2/0x19d0 [ 269.317910] sock_recvmsg+0x1d1/0x230 [ 269.321732] ___sys_recvmsg+0x444/0xae0 [ 269.325730] __se_sys_recvmsg+0x2fa/0x450 [ 269.329895] __x64_sys_recvmsg+0x4a/0x70 [ 269.333979] do_syscall_64+0xcf/0x110 [ 269.337807] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.343005] [ 269.344642] Uninit was stored to memory at: [ 269.348990] kmsan_internal_chain_origin+0x136/0x240 [ 269.354124] __msan_chain_origin+0x6d/0xb0 [ 269.358385] __save_stack_trace+0x8be/0xc60 [ 269.362726] save_stack_trace+0xc6/0x110 [ 269.366816] kmsan_internal_chain_origin+0x136/0x240 [ 269.371940] kmsan_memcpy_origins+0x13d/0x190 [ 269.376453] __msan_memcpy+0x6f/0x80 [ 269.380193] nla_put+0x20a/0x2d0 [ 269.383588] br_port_fill_attrs+0x366/0x1ea0 [ 269.388018] br_port_fill_slave_info+0xff/0x120 [ 269.392706] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.397049] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.401393] netlink_dump+0xc79/0x1c90 [ 269.405300] netlink_recvmsg+0xec2/0x19d0 [ 269.409469] sock_recvmsg+0x1d1/0x230 [ 269.413290] ___sys_recvmsg+0x444/0xae0 [ 269.417286] __se_sys_recvmsg+0x2fa/0x450 [ 269.421451] __x64_sys_recvmsg+0x4a/0x70 [ 269.425530] do_syscall_64+0xcf/0x110 [ 269.429354] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.434934] [ 269.436575] Uninit was stored to memory at: [ 269.440949] kmsan_internal_chain_origin+0x136/0x240 [ 269.446081] __msan_chain_origin+0x6d/0xb0 [ 269.450349] __save_stack_trace+0x8be/0xc60 [ 269.454695] save_stack_trace+0xc6/0x110 [ 269.458776] kmsan_internal_chain_origin+0x136/0x240 [ 269.463900] kmsan_memcpy_origins+0x13d/0x190 [ 269.468415] __msan_memcpy+0x6f/0x80 [ 269.472158] nla_put+0x20a/0x2d0 [ 269.475556] br_port_fill_attrs+0x366/0x1ea0 [ 269.479992] br_port_fill_slave_info+0xff/0x120 [ 269.484678] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.489018] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.493356] netlink_dump+0xc79/0x1c90 [ 269.497266] netlink_recvmsg+0xec2/0x19d0 [ 269.501438] sock_recvmsg+0x1d1/0x230 [ 269.505271] ___sys_recvmsg+0x444/0xae0 [ 269.509271] __se_sys_recvmsg+0x2fa/0x450 [ 269.513439] __x64_sys_recvmsg+0x4a/0x70 [ 269.517517] do_syscall_64+0xcf/0x110 [ 269.521357] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.526555] [ 269.528196] Uninit was stored to memory at: [ 269.532552] kmsan_internal_chain_origin+0x136/0x240 [ 269.537683] __msan_chain_origin+0x6d/0xb0 [ 269.541946] __save_stack_trace+0x8be/0xc60 [ 269.546288] save_stack_trace+0xc6/0x110 [ 269.550374] kmsan_internal_chain_origin+0x136/0x240 [ 269.555501] kmsan_memcpy_origins+0x13d/0x190 [ 269.560019] __msan_memcpy+0x6f/0x80 [ 269.563885] nla_put+0x20a/0x2d0 [ 269.567278] br_port_fill_attrs+0x366/0x1ea0 [ 269.571708] br_port_fill_slave_info+0xff/0x120 [ 269.576395] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 269.580735] rtnl_dump_ifinfo+0x18b5/0x2140 [ 269.585075] netlink_dump+0xc79/0x1c90 [ 269.588991] netlink_recvmsg+0xec2/0x19d0 [ 269.593164] sock_recvmsg+0x1d1/0x230 [ 269.596985] ___sys_recvmsg+0x444/0xae0 [ 269.600977] __se_sys_recvmsg+0x2fa/0x450 [ 269.605147] __x64_sys_recvmsg+0x4a/0x70 [ 269.609237] do_syscall_64+0xcf/0x110 [ 269.613064] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.618280] [ 269.619919] Local variable description: ----c.i.i@should_fail [ 269.625809] Variable was created at: [ 269.629548] should_fail+0x162/0x13c0 [ 269.633370] __alloc_pages_nodemask+0x73f/0x63e0 [ 269.655987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.664177] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.670640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.677615] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.684154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.693062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 270.456553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 270.663331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:07:05 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000980)={{0x0, 0xfffffffffffff366}}, 0x10) [ 270.768504] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.121382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 271.128712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.536035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 271.543475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.859395] IPVS: ftp: loaded support on port[0] = 21 [ 272.550404] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 272.558769] team0: Port device team_slave_0 added [ 272.938446] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 272.946680] team0: Port device team_slave_1 added [ 273.203458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 273.210517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.219524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.464178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 273.471265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.480263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.826834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 273.834655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.843984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.007249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.210067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.217888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.227098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.160570] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.531455] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.538028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.546254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.797489] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.823408] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.829873] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.838788] device bridge_slave_0 entered promiscuous mode [ 278.185319] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.191890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.199000] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.205568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.214658] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.228501] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.235195] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.243801] device bridge_slave_1 entered promiscuous mode [ 278.594808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.864613] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 279.142611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.960800] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 280.327361] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 280.700361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 280.707544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.051898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.059324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:07:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000280)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000240)) [ 282.217493] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.225642] team0: Port device team_slave_0 added [ 282.603836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.611936] team0: Port device team_slave_1 added [ 282.990091] IPVS: ftp: loaded support on port[0] = 21 [ 283.025481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 283.032757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.041659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.417878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 283.425274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.434190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.851907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 283.860021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.870748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.288293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.296246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.305256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.430620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.050101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 287.708926] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 287.715457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.723528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.752085] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.758683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.765781] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.772335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.781170] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 289.364535] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.789825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.150787] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.157375] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.165986] device bridge_slave_0 entered promiscuous mode [ 290.918138] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.924856] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.933569] device bridge_slave_1 entered promiscuous mode [ 291.385043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 08:07:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') [ 291.812644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 08:07:27 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') socket$inet_udp(0x2, 0x2, 0x0) open(&(0x7f0000000080)='./file1\x00', 0x8000101842, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32], 0x1b) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000400)="43d530d1dc906020fd37fcd3af2b0e4309108b9816b4ffdff45a3b197fc7f94da2597fc15b915829f975bca4e1bc6f339629f0638841d96a63f76038fc1ee4a3", &(0x7f00000004c0), 0x40}) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000002c0)={0x40, 0x7, 0x1}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x1f}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 292.884846] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 293.052585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 293.578274] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:07:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4b564d03, 0x1]}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae9c, 0xfffffffffffffffd) [ 294.088992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 294.096228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:07:29 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x40000005}) [ 294.473829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 294.480916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:07:29 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x111000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/198) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x877801d805ff5cbd, 0xffffffffffffffff, 0x0) 08:07:30 executing program 0: r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = shmget(0x3, 0x2000, 0x800, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000003000)=""/4096) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 295.409432] 8021q: adding VLAN 0 to HW filter on device bond0 08:07:30 executing program 0: r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = shmget(0x3, 0x2000, 0x800, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000003000)=""/4096) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 08:07:30 executing program 5: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x5058, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="84a33962d0cb134cd1ac2448a65ab70db0e44c0a39877b1a74bc84c656f9a65b9e267d20bd19b7bc9171c32d7d77085f99bc9f96615170f3378f68a5f003df6729e759c40121fa147a") r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0xe0) r3 = accept4$alg(r2, 0x0, 0x0, 0x80800) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) lchown(&(0x7f00000001c0)='./file0\x00', r0, r1) r4 = socket$l2tp(0x18, 0x1, 0x1) fcntl$getownex(r3, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$getregset(0x4204, r5, 0x2, &(0x7f0000001240)={&(0x7f0000000240)=""/4096, 0x1000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000012c0)={0x9, 0x7}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000001300)={0x8001005, 0x0, 0x2}) getsockopt(r4, 0x71e, 0x3, &(0x7f0000001340)=""/19, &(0x7f0000001380)=0x13) mq_timedsend(r2, &(0x7f00000013c0)="65aa0df3bc8096fdcdd937cbbf44b7409433c246840c574b4710e72fd0ed6a4744e94728dfe3cf8aa606deb7f424a3b09b3b89c5f5edd9609f457667472539175004000f6cf0f06516905dffd03d94a294071204ff7f9d0731ad98689a873e8cb7aaf450165bcfc92ff17b24f9abdc0b6d6bc9cba3efdcc4f28ab4e3a59b7e74e08aab57cd1c8d95c06582e55b85b7edad4e754b", 0x94, 0x833, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000001480)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0}, &(0x7f0000001500)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001540)={@broadcast, @local, 0x0}, &(0x7f0000001580)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000015c0)={'bcsh0\x00', r9}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) prctl$PR_SET_FPEXC(0xc, 0xf0083) ustat(0x7fff, &(0x7f0000001600)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000001640)=[@in6={0xa, 0x4e20, 0x6, @mcast1, 0x2}, @in6={0xa, 0x4e22, 0x9, @ipv4={[], [], @multicast1}, 0x2}, @in6={0xa, 0x4e23, 0x20, @remote, 0x1f}, @in6={0xa, 0x4e22, 0x1, @ipv4, 0x9}, @in6={0xa, 0x4e24, 0x2e55, @remote, 0x100000000}], 0x8c) readlink(&(0x7f0000001700)='./file1\x00', &(0x7f0000001740)=""/225, 0xe1) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000001840)={0x2, r2}) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0, 0x0}, &(0x7f00000018c0)=0xc) openat$kvm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/kvm\x00', 0x10000, 0x0) chown(&(0x7f0000001940)='./file0\x00', r8, r10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000001980)) [ 295.759423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 295.767569] team0: Port device team_slave_0 added [ 296.186730] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 296.194869] team0: Port device team_slave_1 added [ 296.368965] not chained 20000 origins [ 296.372833] CPU: 0 PID: 7616 Comm: ip Not tainted 4.20.0-rc3+ #89 [ 296.379072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.388437] Call Trace: [ 296.391059] dump_stack+0x32d/0x480 [ 296.394734] kmsan_internal_chain_origin+0x222/0x240 [ 296.399894] ? save_stack_trace+0xc6/0x110 [ 296.404177] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 296.409313] ? kmsan_internal_chain_origin+0x1e3/0x240 [ 296.414634] ? kmsan_internal_chain_origin+0x136/0x240 [ 296.419936] ? __msan_chain_origin+0x6d/0xb0 [ 296.424372] ? save_stack_trace+0xfa/0x110 [ 296.428638] ? kmsan_internal_chain_origin+0x136/0x240 [ 296.434294] ? kmsan_memcpy_origins+0x13d/0x190 [ 296.439084] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 296.444578] ? in_task_stack+0x12c/0x210 [ 296.448680] __msan_chain_origin+0x6d/0xb0 [ 296.452943] ? __x64_sys_recvmsg+0x4a/0x70 [ 296.457206] __save_stack_trace+0x8be/0xc60 [ 296.461634] ? __x64_sys_recvmsg+0x4a/0x70 [ 296.465907] save_stack_trace+0xc6/0x110 [ 296.470004] kmsan_internal_chain_origin+0x136/0x240 [ 296.475165] ? kmsan_internal_chain_origin+0x136/0x240 [ 296.480477] ? kmsan_memcpy_origins+0x13d/0x190 [ 296.485194] ? __msan_memcpy+0x6f/0x80 [ 296.489109] ? nla_put+0x20a/0x2d0 [ 296.492687] ? br_port_fill_attrs+0x42b/0x1ea0 [ 296.497296] ? br_port_fill_slave_info+0xff/0x120 [ 296.502178] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 296.506699] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 296.511209] ? netlink_dump+0xc79/0x1c90 [ 296.515296] ? netlink_recvmsg+0xec2/0x19d0 [ 296.519646] ? sock_recvmsg+0x1d1/0x230 [ 296.523642] ? ___sys_recvmsg+0x444/0xae0 [ 296.527810] ? __se_sys_recvmsg+0x2fa/0x450 [ 296.532153] ? __x64_sys_recvmsg+0x4a/0x70 [ 296.536418] ? do_syscall_64+0xcf/0x110 [ 296.540421] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.545815] ? __msan_poison_alloca+0x1e0/0x270 [ 296.550532] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 296.555928] ? find_next_bit+0x25b/0x2a0 [ 296.560022] ? vmalloc_to_page+0x585/0x6c0 [ 296.564308] ? kmsan_set_origin+0x7f/0x100 [ 296.568575] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 296.573982] kmsan_memcpy_origins+0x13d/0x190 [ 296.578522] __msan_memcpy+0x6f/0x80 [ 296.582337] nla_put+0x20a/0x2d0 [ 296.585750] br_port_fill_attrs+0x42b/0x1ea0 [ 296.590203] br_port_fill_slave_info+0xff/0x120 [ 296.594912] ? br_port_get_slave_size+0x30/0x30 [ 296.599607] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 296.604003] rtnl_dump_ifinfo+0x18b5/0x2140 [ 296.608480] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 296.613887] ? rtnl_getlink+0xec0/0xec0 [ 296.617884] netlink_dump+0xc79/0x1c90 [ 296.621842] netlink_recvmsg+0xec2/0x19d0 [ 296.626055] sock_recvmsg+0x1d1/0x230 [ 296.629885] ? netlink_sendmsg+0x1440/0x1440 [ 296.634332] ___sys_recvmsg+0x444/0xae0 [ 296.638368] ? __msan_poison_alloca+0x1e0/0x270 [ 296.643069] ? __se_sys_recvmsg+0xca/0x450 [ 296.647340] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 296.652733] ? __fdget+0x23c/0x440 [ 296.656309] __se_sys_recvmsg+0x2fa/0x450 [ 296.660507] __x64_sys_recvmsg+0x4a/0x70 [ 296.664594] do_syscall_64+0xcf/0x110 [ 296.668426] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.673639] RIP: 0033:0x7efde8fde210 [ 296.677373] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 296.696303] RSP: 002b:00007fff102362a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 296.704034] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efde8fde210 [ 296.711319] RDX: 0000000000000000 RSI: 00007fff102362f0 RDI: 0000000000000003 [ 296.718605] RBP: 0000000000001c24 R08: 00007efde9287ec8 R09: 00007efde9024c00 [ 296.725893] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 296.733184] R13: 00007fff1023a380 R14: 0000000000001c24 R15: 00007fff10237f54 [ 296.738089] IPVS: ftp: loaded support on port[0] = 21 [ 296.740483] Uninit was stored to memory at: [ 296.750026] kmsan_internal_chain_origin+0x136/0x240 [ 296.755160] __msan_chain_origin+0x6d/0xb0 [ 296.759417] __save_stack_trace+0x8be/0xc60 [ 296.763764] save_stack_trace+0xc6/0x110 [ 296.767844] kmsan_internal_chain_origin+0x136/0x240 [ 296.772963] kmsan_memcpy_origins+0x13d/0x190 [ 296.777472] __msan_memcpy+0x6f/0x80 [ 296.781203] nla_put+0x20a/0x2d0 [ 296.784595] br_port_fill_attrs+0x366/0x1ea0 [ 296.789023] br_port_fill_slave_info+0xff/0x120 [ 296.793707] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 296.798039] rtnl_dump_ifinfo+0x18b5/0x2140 [ 296.802375] netlink_dump+0xc79/0x1c90 [ 296.806286] netlink_recvmsg+0xec2/0x19d0 [ 296.810450] sock_recvmsg+0x1d1/0x230 [ 296.814268] ___sys_recvmsg+0x444/0xae0 [ 296.818261] __se_sys_recvmsg+0x2fa/0x450 [ 296.822427] __x64_sys_recvmsg+0x4a/0x70 [ 296.826509] do_syscall_64+0xcf/0x110 [ 296.830321] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.835509] [ 296.837130] Uninit was stored to memory at: [ 296.841444] kmsan_internal_chain_origin+0x136/0x240 [ 296.846538] __msan_chain_origin+0x6d/0xb0 [ 296.850768] __save_stack_trace+0x8be/0xc60 [ 296.855084] save_stack_trace+0xc6/0x110 [ 296.859140] kmsan_internal_chain_origin+0x136/0x240 [ 296.864246] kmsan_memcpy_origins+0x13d/0x190 [ 296.868732] __msan_memcpy+0x6f/0x80 [ 296.872446] nla_put+0x20a/0x2d0 [ 296.875805] br_port_fill_attrs+0x366/0x1ea0 [ 296.880203] br_port_fill_slave_info+0xff/0x120 [ 296.884870] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 296.889183] rtnl_dump_ifinfo+0x18b5/0x2140 [ 296.893494] netlink_dump+0xc79/0x1c90 [ 296.897375] netlink_recvmsg+0xec2/0x19d0 [ 296.901513] sock_recvmsg+0x1d1/0x230 [ 296.905308] ___sys_recvmsg+0x444/0xae0 [ 296.909271] __se_sys_recvmsg+0x2fa/0x450 [ 296.913412] __x64_sys_recvmsg+0x4a/0x70 [ 296.917463] do_syscall_64+0xcf/0x110 [ 296.921258] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.926431] [ 296.928043] Uninit was stored to memory at: [ 296.932359] kmsan_internal_chain_origin+0x136/0x240 [ 296.937456] __msan_chain_origin+0x6d/0xb0 [ 296.941682] __save_stack_trace+0x8be/0xc60 [ 296.945995] save_stack_trace+0xc6/0x110 [ 296.950047] kmsan_internal_chain_origin+0x136/0x240 [ 296.955149] kmsan_memcpy_origins+0x13d/0x190 [ 296.959637] __msan_memcpy+0x6f/0x80 [ 296.963342] nla_put+0x20a/0x2d0 [ 296.966707] br_port_fill_attrs+0x366/0x1ea0 [ 296.971140] br_port_fill_slave_info+0xff/0x120 [ 296.975802] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 296.980112] rtnl_dump_ifinfo+0x18b5/0x2140 [ 296.984447] netlink_dump+0xc79/0x1c90 [ 296.988323] netlink_recvmsg+0xec2/0x19d0 [ 296.992465] sock_recvmsg+0x1d1/0x230 [ 296.996358] ___sys_recvmsg+0x444/0xae0 [ 297.000325] __se_sys_recvmsg+0x2fa/0x450 [ 297.004463] __x64_sys_recvmsg+0x4a/0x70 [ 297.008514] do_syscall_64+0xcf/0x110 [ 297.012310] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.017514] [ 297.019129] Uninit was stored to memory at: [ 297.023467] kmsan_internal_chain_origin+0x136/0x240 [ 297.028560] __msan_chain_origin+0x6d/0xb0 [ 297.032787] __save_stack_trace+0x8be/0xc60 [ 297.037107] save_stack_trace+0xc6/0x110 [ 297.041165] kmsan_internal_chain_origin+0x136/0x240 [ 297.046263] kmsan_memcpy_origins+0x13d/0x190 [ 297.050749] __msan_memcpy+0x6f/0x80 [ 297.054459] nla_put+0x20a/0x2d0 [ 297.057816] br_port_fill_attrs+0x366/0x1ea0 [ 297.062232] br_port_fill_slave_info+0xff/0x120 [ 297.066958] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 297.071273] rtnl_dump_ifinfo+0x18b5/0x2140 [ 297.075585] netlink_dump+0xc79/0x1c90 [ 297.079463] netlink_recvmsg+0xec2/0x19d0 [ 297.083605] sock_recvmsg+0x1d1/0x230 [ 297.087403] ___sys_recvmsg+0x444/0xae0 [ 297.091366] __se_sys_recvmsg+0x2fa/0x450 [ 297.095507] __x64_sys_recvmsg+0x4a/0x70 [ 297.099558] do_syscall_64+0xcf/0x110 [ 297.103351] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.108522] [ 297.110151] Uninit was stored to memory at: [ 297.114470] kmsan_internal_chain_origin+0x136/0x240 [ 297.119565] __msan_chain_origin+0x6d/0xb0 [ 297.123792] __save_stack_trace+0x8be/0xc60 [ 297.128106] save_stack_trace+0xc6/0x110 [ 297.132190] kmsan_internal_chain_origin+0x136/0x240 [ 297.137306] kmsan_memcpy_origins+0x13d/0x190 [ 297.141795] __msan_memcpy+0x6f/0x80 [ 297.145501] nla_put+0x20a/0x2d0 [ 297.148862] br_port_fill_attrs+0x366/0x1ea0 [ 297.153269] br_port_fill_slave_info+0xff/0x120 [ 297.157930] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 297.162266] rtnl_dump_ifinfo+0x18b5/0x2140 [ 297.166586] netlink_dump+0xc79/0x1c90 [ 297.170462] netlink_recvmsg+0xec2/0x19d0 [ 297.174606] sock_recvmsg+0x1d1/0x230 [ 297.178396] ___sys_recvmsg+0x444/0xae0 [ 297.182361] __se_sys_recvmsg+0x2fa/0x450 [ 297.186498] __x64_sys_recvmsg+0x4a/0x70 [ 297.190559] do_syscall_64+0xcf/0x110 [ 297.194395] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.199570] [ 297.201184] Uninit was stored to memory at: [ 297.205501] kmsan_internal_chain_origin+0x136/0x240 [ 297.210595] __msan_chain_origin+0x6d/0xb0 [ 297.214823] __save_stack_trace+0x8be/0xc60 [ 297.219142] save_stack_trace+0xc6/0x110 [ 297.223196] kmsan_internal_chain_origin+0x136/0x240 [ 297.228290] kmsan_memcpy_origins+0x13d/0x190 [ 297.232780] __msan_memcpy+0x6f/0x80 [ 297.236486] nla_put+0x20a/0x2d0 [ 297.239853] br_port_fill_attrs+0x366/0x1ea0 [ 297.244259] br_port_fill_slave_info+0xff/0x120 [ 297.248923] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 297.253238] rtnl_dump_ifinfo+0x18b5/0x2140 [ 297.257556] netlink_dump+0xc79/0x1c90 [ 297.261436] netlink_recvmsg+0xec2/0x19d0 [ 297.265581] sock_recvmsg+0x1d1/0x230 [ 297.269368] ___sys_recvmsg+0x444/0xae0 [ 297.273331] __se_sys_recvmsg+0x2fa/0x450 [ 297.277466] __x64_sys_recvmsg+0x4a/0x70 [ 297.281520] do_syscall_64+0xcf/0x110 [ 297.285313] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.290503] [ 297.292133] Uninit was stored to memory at: [ 297.296472] kmsan_internal_chain_origin+0x136/0x240 [ 297.301567] __msan_chain_origin+0x6d/0xb0 [ 297.305798] __save_stack_trace+0x8be/0xc60 [ 297.310108] save_stack_trace+0xc6/0x110 [ 297.314168] kmsan_internal_chain_origin+0x136/0x240 [ 297.319264] kmsan_memcpy_origins+0x13d/0x190 [ 297.323755] __msan_memcpy+0x6f/0x80 [ 297.327460] nla_put+0x20a/0x2d0 [ 297.330820] br_port_fill_attrs+0x366/0x1ea0 [ 297.335219] br_port_fill_slave_info+0xff/0x120 [ 297.339882] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 297.344197] rtnl_dump_ifinfo+0x18b5/0x2140 [ 297.348508] netlink_dump+0xc79/0x1c90 [ 297.352389] netlink_recvmsg+0xec2/0x19d0 [ 297.356532] sock_recvmsg+0x1d1/0x230 [ 297.360320] ___sys_recvmsg+0x444/0xae0 [ 297.364286] __se_sys_recvmsg+0x2fa/0x450 [ 297.368423] __x64_sys_recvmsg+0x4a/0x70 [ 297.372480] do_syscall_64+0xcf/0x110 [ 297.376272] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.381442] [ 297.383064] Local variable description: ----c.i.i@should_fail [ 297.388946] Variable was created at: [ 297.392662] should_fail+0x162/0x13c0 [ 297.396457] __alloc_pages_nodemask+0x73f/0x63e0 [ 297.444629] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 297.451691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.460453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.773999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 297.781079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.789988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.812731] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 298.117872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 298.126050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.135084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.455485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 298.463271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.472389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.089940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 299.096536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.104538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:07:35 executing program 1: [ 300.621263] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.801993] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.808598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.815654] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.822207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.830497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.504476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.881270] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.887883] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.896521] device bridge_slave_0 entered promiscuous mode [ 303.139223] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.146174] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.154790] device bridge_slave_1 entered promiscuous mode [ 303.473835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 303.763360] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 303.997308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.399605] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 304.683264] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 304.875785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 304.883337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.052449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 305.059518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.259879] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.882732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 305.890822] team0: Port device team_slave_0 added [ 306.206078] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 306.214451] team0: Port device team_slave_1 added [ 306.289908] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 306.299011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.307226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.598812] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 306.606003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 306.615178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 306.837301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 306.844532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 306.853456] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.120946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.128668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.137770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.191784] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.400320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 307.408099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.417425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 08:07:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0xff}, {0x0, 0x0, 0x1800}, {}], 0x3, &(0x7f0000000080)={0x77359400}) [ 310.081300] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.087853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.094891] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.101353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.109720] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 310.116577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.884529] 8021q: adding VLAN 0 to HW filter on device bond0 08:07:47 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r4, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r6]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r5, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) execveat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r7, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) [ 312.696886] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 313.442552] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 313.448944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.457482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.068973] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.798355] not chained 30000 origins [ 316.802223] CPU: 1 PID: 8213 Comm: ip Not tainted 4.20.0-rc3+ #89 [ 316.808466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.817829] Call Trace: [ 316.820444] dump_stack+0x32d/0x480 [ 316.824113] kmsan_internal_chain_origin+0x222/0x240 [ 316.829287] ? save_stack_trace+0xc6/0x110 [ 316.833547] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 316.838679] ? kmsan_internal_chain_origin+0x1e3/0x240 [ 316.843992] ? kmsan_internal_chain_origin+0x136/0x240 [ 316.849288] ? __msan_chain_origin+0x6d/0xb0 [ 316.853744] ? save_stack_trace+0xfa/0x110 [ 316.858361] ? kmsan_internal_chain_origin+0x136/0x240 [ 316.863659] ? kmsan_memcpy_origins+0x13d/0x190 [ 316.868364] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 316.873833] ? in_task_stack+0x12c/0x210 [ 316.877932] __msan_chain_origin+0x6d/0xb0 [ 316.882195] ? br_port_fill_slave_info+0xff/0x120 [ 316.887061] __save_stack_trace+0x8be/0xc60 [ 316.891438] ? br_port_fill_slave_info+0xff/0x120 [ 316.896306] save_stack_trace+0xc6/0x110 [ 316.900406] kmsan_internal_chain_origin+0x136/0x240 [ 316.905549] ? kmsan_internal_chain_origin+0x136/0x240 [ 316.910845] ? kmsan_memcpy_origins+0x13d/0x190 [ 316.915546] ? __msan_memcpy+0x6f/0x80 [ 316.919458] ? nla_put+0x20a/0x2d0 [ 316.923021] ? br_port_fill_attrs+0x42b/0x1ea0 [ 316.927624] ? br_port_fill_slave_info+0xff/0x120 [ 316.932489] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 316.937003] ? rtnl_dump_ifinfo+0x18b5/0x2140 [ 316.941518] ? netlink_dump+0xc79/0x1c90 [ 316.945598] ? netlink_recvmsg+0xec2/0x19d0 [ 316.949944] ? sock_recvmsg+0x1d1/0x230 [ 316.953938] ? ___sys_recvmsg+0x444/0xae0 [ 316.958107] ? __se_sys_recvmsg+0x2fa/0x450 [ 316.962455] ? __x64_sys_recvmsg+0x4a/0x70 [ 316.966706] ? do_syscall_64+0xcf/0x110 [ 316.970704] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.976093] ? __msan_poison_alloca+0x1e0/0x270 [ 316.980816] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 316.986203] ? find_next_bit+0x25b/0x2a0 [ 316.990284] ? vmalloc_to_page+0x585/0x6c0 [ 316.994812] ? kmsan_set_origin+0x7f/0x100 [ 316.999077] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 317.004478] kmsan_memcpy_origins+0x13d/0x190 [ 317.009006] __msan_memcpy+0x6f/0x80 [ 317.012745] nla_put+0x20a/0x2d0 [ 317.016164] br_port_fill_attrs+0x42b/0x1ea0 [ 317.020610] br_port_fill_slave_info+0xff/0x120 [ 317.025307] ? br_port_get_slave_size+0x30/0x30 [ 317.030001] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.034407] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.038881] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 317.044291] ? rtnl_getlink+0xec0/0xec0 [ 317.048288] netlink_dump+0xc79/0x1c90 [ 317.052239] netlink_recvmsg+0xec2/0x19d0 [ 317.056447] sock_recvmsg+0x1d1/0x230 [ 317.060273] ? netlink_sendmsg+0x1440/0x1440 [ 317.064714] ___sys_recvmsg+0x444/0xae0 [ 317.068738] ? __msan_poison_alloca+0x1e0/0x270 [ 317.073440] ? __se_sys_recvmsg+0xca/0x450 [ 317.077702] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 317.083560] ? __fdget+0x23c/0x440 [ 317.087148] __se_sys_recvmsg+0x2fa/0x450 [ 317.091346] __x64_sys_recvmsg+0x4a/0x70 [ 317.095429] do_syscall_64+0xcf/0x110 [ 317.099255] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.104467] RIP: 0033:0x7f8a88196210 [ 317.108214] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 317.127138] RSP: 002b:00007ffd016eb388 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 317.134867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8a88196210 [ 317.142161] RDX: 0000000000000000 RSI: 00007ffd016eb3d0 RDI: 0000000000000003 [ 317.149447] RBP: 0000000000001c28 R08: 00007f8a8843fec8 R09: 00007f8a881dcc00 [ 317.156732] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 317.164018] R13: 00007ffd016ef460 R14: 0000000000001c28 R15: 00007ffd016ed038 [ 317.171325] Uninit was stored to memory at: [ 317.175673] kmsan_internal_chain_origin+0x136/0x240 [ 317.180808] __msan_chain_origin+0x6d/0xb0 [ 317.185063] __save_stack_trace+0x8be/0xc60 [ 317.189398] save_stack_trace+0xc6/0x110 [ 317.193477] kmsan_internal_chain_origin+0x136/0x240 [ 317.198598] kmsan_memcpy_origins+0x13d/0x190 [ 317.203113] __msan_memcpy+0x6f/0x80 [ 317.206855] nla_put+0x20a/0x2d0 [ 317.210244] br_port_fill_attrs+0x366/0x1ea0 [ 317.214659] br_port_fill_slave_info+0xff/0x120 [ 317.219319] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.223631] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.227944] netlink_dump+0xc79/0x1c90 [ 317.231830] netlink_recvmsg+0xec2/0x19d0 [ 317.235988] sock_recvmsg+0x1d1/0x230 [ 317.239783] ___sys_recvmsg+0x444/0xae0 [ 317.243747] __se_sys_recvmsg+0x2fa/0x450 [ 317.247888] __x64_sys_recvmsg+0x4a/0x70 [ 317.251939] do_syscall_64+0xcf/0x110 [ 317.255733] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.260911] [ 317.262525] Uninit was stored to memory at: [ 317.266856] kmsan_internal_chain_origin+0x136/0x240 [ 317.271949] __msan_chain_origin+0x6d/0xb0 [ 317.276179] __save_stack_trace+0x8be/0xc60 [ 317.280492] save_stack_trace+0xc6/0x110 [ 317.284543] kmsan_internal_chain_origin+0x136/0x240 [ 317.289635] kmsan_memcpy_origins+0x13d/0x190 [ 317.294120] __msan_memcpy+0x6f/0x80 [ 317.297834] nla_put+0x20a/0x2d0 [ 317.301194] br_port_fill_attrs+0x366/0x1ea0 [ 317.305596] br_port_fill_slave_info+0xff/0x120 [ 317.310255] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.314578] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.318892] netlink_dump+0xc79/0x1c90 [ 317.322784] netlink_recvmsg+0xec2/0x19d0 [ 317.326943] sock_recvmsg+0x1d1/0x230 [ 317.330730] ___sys_recvmsg+0x444/0xae0 [ 317.334698] __se_sys_recvmsg+0x2fa/0x450 [ 317.338837] __x64_sys_recvmsg+0x4a/0x70 [ 317.342890] do_syscall_64+0xcf/0x110 [ 317.346687] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.351863] [ 317.353477] Uninit was stored to memory at: [ 317.357792] kmsan_internal_chain_origin+0x136/0x240 [ 317.362906] __msan_chain_origin+0x6d/0xb0 [ 317.367138] __save_stack_trace+0x8be/0xc60 [ 317.371456] save_stack_trace+0xc6/0x110 [ 317.375507] kmsan_internal_chain_origin+0x136/0x240 [ 317.380600] kmsan_memcpy_origins+0x13d/0x190 [ 317.385086] __msan_memcpy+0x6f/0x80 [ 317.388794] nla_put+0x20a/0x2d0 [ 317.392173] br_port_fill_attrs+0x366/0x1ea0 [ 317.396588] br_port_fill_slave_info+0xff/0x120 [ 317.401251] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.405566] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.409876] netlink_dump+0xc79/0x1c90 [ 317.413760] netlink_recvmsg+0xec2/0x19d0 [ 317.417918] sock_recvmsg+0x1d1/0x230 [ 317.421711] ___sys_recvmsg+0x444/0xae0 [ 317.425682] __se_sys_recvmsg+0x2fa/0x450 [ 317.429823] __x64_sys_recvmsg+0x4a/0x70 [ 317.433874] do_syscall_64+0xcf/0x110 [ 317.437826] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.443001] [ 317.444613] Uninit was stored to memory at: [ 317.448932] kmsan_internal_chain_origin+0x136/0x240 [ 317.454044] __msan_chain_origin+0x6d/0xb0 [ 317.458278] __save_stack_trace+0x8be/0xc60 [ 317.462591] save_stack_trace+0xc6/0x110 [ 317.466645] kmsan_internal_chain_origin+0x136/0x240 [ 317.471738] kmsan_memcpy_origins+0x13d/0x190 [ 317.476229] __msan_memcpy+0x6f/0x80 [ 317.479953] nla_put+0x20a/0x2d0 [ 317.483313] br_port_fill_attrs+0x366/0x1ea0 [ 317.487711] br_port_fill_slave_info+0xff/0x120 [ 317.492374] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.496689] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.501000] netlink_dump+0xc79/0x1c90 [ 317.504882] netlink_recvmsg+0xec2/0x19d0 [ 317.509023] sock_recvmsg+0x1d1/0x230 [ 317.512814] ___sys_recvmsg+0x444/0xae0 [ 317.516782] __se_sys_recvmsg+0x2fa/0x450 [ 317.520932] __x64_sys_recvmsg+0x4a/0x70 [ 317.524985] do_syscall_64+0xcf/0x110 [ 317.528781] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.533954] [ 317.535566] Uninit was stored to memory at: [ 317.539879] kmsan_internal_chain_origin+0x136/0x240 [ 317.544989] __msan_chain_origin+0x6d/0xb0 [ 317.549216] __save_stack_trace+0x8be/0xc60 [ 317.553530] save_stack_trace+0xc6/0x110 [ 317.557582] kmsan_internal_chain_origin+0x136/0x240 [ 317.562685] kmsan_memcpy_origins+0x13d/0x190 [ 317.567175] __msan_memcpy+0x6f/0x80 [ 317.571012] nla_put+0x20a/0x2d0 [ 317.574380] br_port_fill_attrs+0x366/0x1ea0 [ 317.578781] br_port_fill_slave_info+0xff/0x120 [ 317.583442] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.587751] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.592083] netlink_dump+0xc79/0x1c90 [ 317.595968] netlink_recvmsg+0xec2/0x19d0 [ 317.600108] sock_recvmsg+0x1d1/0x230 [ 317.603904] ___sys_recvmsg+0x444/0xae0 [ 317.607869] __se_sys_recvmsg+0x2fa/0x450 [ 317.612006] __x64_sys_recvmsg+0x4a/0x70 [ 317.616057] do_syscall_64+0xcf/0x110 [ 317.619848] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.625038] [ 317.626654] Uninit was stored to memory at: [ 317.630975] kmsan_internal_chain_origin+0x136/0x240 [ 317.636068] __msan_chain_origin+0x6d/0xb0 [ 317.640292] __save_stack_trace+0x8be/0xc60 [ 317.644605] save_stack_trace+0xc6/0x110 [ 317.648686] kmsan_internal_chain_origin+0x136/0x240 [ 317.653780] kmsan_memcpy_origins+0x13d/0x190 [ 317.658267] __msan_memcpy+0x6f/0x80 [ 317.661972] nla_put+0x20a/0x2d0 [ 317.665333] br_port_fill_attrs+0x366/0x1ea0 [ 317.669749] br_port_fill_slave_info+0xff/0x120 [ 317.674416] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.678725] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.683055] netlink_dump+0xc79/0x1c90 [ 317.686935] netlink_recvmsg+0xec2/0x19d0 [ 317.691072] sock_recvmsg+0x1d1/0x230 [ 317.694877] ___sys_recvmsg+0x444/0xae0 [ 317.698839] __se_sys_recvmsg+0x2fa/0x450 [ 317.702977] __x64_sys_recvmsg+0x4a/0x70 [ 317.707028] do_syscall_64+0xcf/0x110 [ 317.710823] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.715994] [ 317.717607] Uninit was stored to memory at: [ 317.721919] kmsan_internal_chain_origin+0x136/0x240 [ 317.727015] __msan_chain_origin+0x6d/0xb0 [ 317.731240] __save_stack_trace+0x8be/0xc60 [ 317.735559] save_stack_trace+0xc6/0x110 [ 317.739679] kmsan_internal_chain_origin+0x136/0x240 [ 317.744781] kmsan_memcpy_origins+0x13d/0x190 [ 317.749268] __msan_memcpy+0x6f/0x80 [ 317.752974] nla_put+0x20a/0x2d0 [ 317.756333] br_port_fill_attrs+0x366/0x1ea0 [ 317.760735] br_port_fill_slave_info+0xff/0x120 [ 317.765400] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 317.769711] rtnl_dump_ifinfo+0x18b5/0x2140 [ 317.774044] netlink_dump+0xc79/0x1c90 [ 317.777921] netlink_recvmsg+0xec2/0x19d0 [ 317.782060] sock_recvmsg+0x1d1/0x230 [ 317.785848] ___sys_recvmsg+0x444/0xae0 [ 317.789811] __se_sys_recvmsg+0x2fa/0x450 [ 317.793948] __x64_sys_recvmsg+0x4a/0x70 [ 317.798000] do_syscall_64+0xcf/0x110 [ 317.801794] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.807316] [ 317.808932] Local variable description: ----c.i.i@should_fail [ 317.814798] Variable was created at: [ 317.818504] should_fail+0x162/0x13c0 [ 317.822298] __alloc_pages_nodemask+0x73f/0x63e0 [ 317.970868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.425076] kauditd_printk_skb: 3 callbacks suppressed [ 318.425118] audit: type=1326 audit(1542701273.471:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 318.482537] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 318.852327] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 318.858727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.866839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.218326] audit: type=1326 audit(1542701274.261:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 319.248007] 8021q: adding VLAN 0 to HW filter on device team0 08:07:54 executing program 4: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r4, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r6]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r5, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) execveat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r7, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) 08:07:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) 08:07:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0xff}, {0x0, 0x0, 0x1800}, {}], 0x3, &(0x7f0000000080)={0x77359400}) 08:07:54 executing program 1: 08:07:54 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r4, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r6]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r5, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) execveat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r7, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) 08:07:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x2, 0x2}) 08:07:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0f"]}) 08:07:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"1705804ffa92c7a6a9d9b505eeee72f7"}}}}, 0xa0) 08:07:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f00000000c0)) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/116, 0x4}], 0x1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:07:57 executing program 1: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000180)="f48d4d47d9b3bf44541a060d7c66810efe0ec0075808d460b065133f7d0685d1f6593e908ac27bb472ccaa32d8ab92b5ee191f6d30b5c1351431893474c31fd61525c8c80d06381a4cc7ed8f3588d7f7683d", 0x52}], 0x1, &(0x7f0000001340)=[{0x70, 0x10e, 0x80000000, "680e5fd3f7c27dfbca62ff98d7adce6d7777b4fa64181c728430cdcae22c866639e18e1fe86816de10f865cf2296d9dabfe5ac611d207725d8455dadbf5b50c73d7f06f067c41e95d4a2699bec4ffced5d819647791b5868320c74"}], 0x70, 0x10}, 0x655}], 0x1, 0x20000000) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:07:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001040)={r0, &(0x7f0000001040), &(0x7f0000000000)=""/4096}, 0x18) 08:07:57 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, r1) fcntl$getownex(r2, 0x10, &(0x7f00000006c0)={0x0, 0x0}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) 08:07:57 executing program 4: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r4, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r6]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r5, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) execveat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r7, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) 08:07:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7a, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000000e80), 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x31a) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001c00)=ANY=[@ANYBLOB="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"], 0x4b7) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb49) [ 322.192866] ptrace attach of "/root/syz-executor0"[6693] was attempted by "/root/syz-executor0"[8346] [ 322.290323] ptrace attach of "/root/syz-executor0"[6693] was attempted by "/root/syz-executor0"[8346] 08:07:57 executing program 2: r0 = memfd_create(&(0x7f0000000380)="656d3076626f786e657430a900", 0x0) write$FUSE_LK(r0, &(0x7f0000000140)={0x28}, 0x28) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:07:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7a, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000000e80), 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x31a) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001c00)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000c02000000000000a6d10000030038000200ffffffff468051e5c6f980acc10ca4f35c18ca7464030000000300000000000000bc080000000000bcc28a6df5d97c00ffff7f0000000000000600000000000000000800000000000005000000edffffff6f000000000000000000000000000000ea2b000000000000000000000000000003000000000000000800000000000000f8d1cf6bb60a3cc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21b6b33f3293bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3d9c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f00000000000000775f402d0000000000000000000000000000000000000000000000000000100000000000000000000000000000000002000000008f00000000000000000000000000f9ffffff000000000000000000000000000000000000000100001e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004b4bc88c77000000000000000000000000ff070000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000cba200dcb4b5108bbf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b15dce6ee2c53c5e9a34dc000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000065b70000000000000000db0000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd494ae985e53468473c711971a0f1c6201ef789867a6a6a43da1331e65f4e1a7cff734508108e299bb2ba8fae27b9f3b46f1329d14223f181cfcf9590b42ecbeeee9de504ee9fda58c875dd97bd55aaa58b2174a9cbbe23d5609a63c3951d7616db09dc03000000f714acee2f2773517cdc617e6e49edc138789a290e2500002e272bde30b3d5eb58cb44445581208d996d05518914c517b67b956b285f05768037f6ec66c9bed1ce1c7f2072713dd85abbbdc01660f374864ea3fa9cbe56a0adecb649a78d6b562c51b10a865c7ac4d5ef7fd9cb9fb7d7c074e00fcfae3a"], 0x4b7) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb49) 08:07:57 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000000000), &(0x7f0000000080)="73797a6b616c6c939c1c956430d6d85715c3004bea657200", 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 08:07:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, &(0x7f0000000000), 0x32a) 08:07:57 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:07:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) 08:07:58 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)='\n\\') r0 = memfd_create(&(0x7f0000000240)="00000600000000000000", 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:07:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7a, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000000e80), 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x31a) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001c00)=ANY=[@ANYBLOB="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"], 0x4b7) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xb49) 08:07:58 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xcd9734) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x1) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8}, 0x5) 08:07:58 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x20) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 08:07:58 executing program 4: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r4, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r6]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r5, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) execveat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES32], 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r7, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) 08:07:58 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) 08:07:58 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) [ 323.605945] not chained 40000 origins [ 323.609821] CPU: 1 PID: 8416 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 323.617028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.626406] Call Trace: [ 323.629033] dump_stack+0x32d/0x480 [ 323.632706] ? save_stack_trace+0xc6/0x110 [ 323.636987] kmsan_internal_chain_origin+0x222/0x240 [ 323.642154] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 323.647552] ? is_bpf_text_address+0x49e/0x4d0 [ 323.652189] ? INIT_INT+0xc/0x30 [ 323.655609] ? __msan_warning+0x76/0xc0 [ 323.659633] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 323.665121] ? __save_stack_trace+0x9f2/0xc60 [ 323.669698] __msan_chain_origin+0x6d/0xb0 [ 323.673974] save_stack_trace+0xfa/0x110 [ 323.678083] kmsan_internal_chain_origin+0x136/0x240 [ 323.683219] ? do_syscall_64+0xcf/0x110 [ 323.687245] ? kmsan_internal_chain_origin+0x136/0x240 [ 323.692558] ? kmsan_memcpy_origins+0x13d/0x190 [ 323.697253] ? __msan_memcpy+0x6f/0x80 [ 323.701181] ? pskb_expand_head+0x436/0x1d20 [ 323.705619] ? tcp_trim_head+0x214/0x9b0 [ 323.709707] ? tcp_ack+0x3193/0xa010 [ 323.713453] ? tcp_rcv_established+0xf7e/0x2940 [ 323.718165] ? tcp_v4_do_rcv+0x686/0xd80 [ 323.722258] ? __release_sock+0x32d/0x750 [ 323.726431] ? release_sock+0x99/0x2a0 [ 323.730345] ? tcp_sendmsg+0xd6/0x100 [ 323.734190] ? inet_sendmsg+0x4e9/0x800 [ 323.738199] ? sock_write_iter+0x3f4/0x4f0 [ 323.742471] ? __vfs_write+0x888/0xb80 [ 323.746392] ? vfs_write+0x4a3/0x8f0 [ 323.750145] ? __se_sys_write+0x17a/0x370 [ 323.754322] ? __x64_sys_write+0x4a/0x70 [ 323.758407] ? do_syscall_64+0xcf/0x110 [ 323.762414] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.767821] ? memcg_kmem_put_cache+0x73/0x460 [ 323.772459] ? __msan_get_context_state+0x9/0x20 [ 323.777251] ? INIT_INT+0xc/0x30 [ 323.780656] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 323.786071] kmsan_memcpy_origins+0x13d/0x190 [ 323.790611] __msan_memcpy+0x6f/0x80 [ 323.794379] pskb_expand_head+0x436/0x1d20 [ 323.798683] tcp_trim_head+0x214/0x9b0 [ 323.802633] tcp_ack+0x3193/0xa010 [ 323.806318] tcp_rcv_established+0xf7e/0x2940 [ 323.810867] ? __msan_get_context_state+0x9/0x20 [ 323.815676] tcp_v4_do_rcv+0x686/0xd80 [ 323.819613] ? inet_sk_rx_dst_set+0x200/0x200 [ 323.824156] __release_sock+0x32d/0x750 [ 323.828199] release_sock+0x99/0x2a0 [ 323.831956] tcp_sendmsg+0xd6/0x100 [ 323.835628] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 323.840330] inet_sendmsg+0x4e9/0x800 [ 323.844184] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.849588] ? security_socket_sendmsg+0x1bd/0x200 [ 323.854566] ? inet_getname+0x490/0x490 [ 323.858573] sock_write_iter+0x3f4/0x4f0 [ 323.862689] ? sock_read_iter+0x4e0/0x4e0 [ 323.866864] __vfs_write+0x888/0xb80 [ 323.870635] vfs_write+0x4a3/0x8f0 [ 323.874224] __se_sys_write+0x17a/0x370 [ 323.878247] __x64_sys_write+0x4a/0x70 [ 323.882181] do_syscall_64+0xcf/0x110 [ 323.886024] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.891253] RIP: 0033:0x457569 [ 323.894472] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.913404] RSP: 002b:00007fe20f4f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.921155] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 323.928456] RDX: 00000000000004b7 RSI: 0000000020001c00 RDI: 0000000000000005 [ 323.935752] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 323.943068] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f4f86d4 [ 323.950367] R13: 00000000004c5cf1 R14: 00000000004da0a8 R15: 00000000ffffffff [ 323.958358] Uninit was stored to memory at: [ 323.962716] kmsan_internal_chain_origin+0x136/0x240 [ 323.967854] __msan_chain_origin+0x6d/0xb0 [ 323.972108] save_stack_trace+0xfa/0x110 [ 323.976216] kmsan_internal_chain_origin+0x136/0x240 [ 323.981349] kmsan_memcpy_origins+0x13d/0x190 [ 323.985870] __msan_memcpy+0x6f/0x80 [ 323.989617] pskb_expand_head+0x436/0x1d20 [ 323.993879] tcp_trim_head+0x214/0x9b0 [ 323.997811] tcp_ack+0x3193/0xa010 [ 324.001382] tcp_rcv_established+0xf7e/0x2940 [ 324.005903] tcp_v4_do_rcv+0x686/0xd80 [ 324.009813] __release_sock+0x32d/0x750 [ 324.013811] release_sock+0x99/0x2a0 [ 324.017554] tcp_sendmsg+0xd6/0x100 [ 324.021207] inet_sendmsg+0x4e9/0x800 [ 324.025030] sock_write_iter+0x3f4/0x4f0 [ 324.029116] __vfs_write+0x888/0xb80 [ 324.032874] vfs_write+0x4a3/0x8f0 [ 324.036443] __se_sys_write+0x17a/0x370 [ 324.040447] __x64_sys_write+0x4a/0x70 [ 324.044363] do_syscall_64+0xcf/0x110 [ 324.048195] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.053396] [ 324.055042] Uninit was stored to memory at: [ 324.059393] kmsan_internal_chain_origin+0x136/0x240 [ 324.064524] __msan_chain_origin+0x6d/0xb0 [ 324.068792] __save_stack_trace+0x833/0xc60 [ 324.073163] save_stack_trace+0xc6/0x110 [ 324.077257] kmsan_internal_chain_origin+0x136/0x240 [ 324.082390] kmsan_memcpy_origins+0x13d/0x190 [ 324.086916] __msan_memcpy+0x6f/0x80 [ 324.090659] pskb_expand_head+0x436/0x1d20 [ 324.094920] tcp_trim_head+0x214/0x9b0 [ 324.098835] tcp_ack+0x3193/0xa010 [ 324.102407] tcp_rcv_established+0xf7e/0x2940 [ 324.106936] tcp_v4_do_rcv+0x686/0xd80 [ 324.110851] __release_sock+0x32d/0x750 [ 324.114855] release_sock+0x99/0x2a0 [ 324.118589] tcp_sendmsg+0xd6/0x100 [ 324.122255] inet_sendmsg+0x4e9/0x800 [ 324.126067] sock_write_iter+0x3f4/0x4f0 [ 324.130157] __vfs_write+0x888/0xb80 [ 324.133898] vfs_write+0x4a3/0x8f0 [ 324.137449] __se_sys_write+0x17a/0x370 [ 324.141434] __x64_sys_write+0x4a/0x70 [ 324.145333] do_syscall_64+0xcf/0x110 [ 324.149164] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.154360] [ 324.155993] Uninit was stored to memory at: [ 324.160334] kmsan_internal_chain_origin+0x136/0x240 [ 324.165452] __msan_chain_origin+0x6d/0xb0 [ 324.169701] save_stack_trace+0xfa/0x110 [ 324.173789] kmsan_internal_chain_origin+0x136/0x240 [ 324.178921] kmsan_memcpy_origins+0x13d/0x190 [ 324.183433] __msan_memcpy+0x6f/0x80 [ 324.187170] pskb_expand_head+0x436/0x1d20 [ 324.191418] tcp_trim_head+0x214/0x9b0 [ 324.195336] tcp_ack+0x3193/0xa010 [ 324.198892] tcp_rcv_established+0xf7e/0x2940 [ 324.203400] tcp_v4_do_rcv+0x686/0xd80 [ 324.207302] __release_sock+0x32d/0x750 [ 324.211292] release_sock+0x99/0x2a0 [ 324.215023] tcp_sendmsg+0xd6/0x100 [ 324.218667] inet_sendmsg+0x4e9/0x800 [ 324.222478] sock_write_iter+0x3f4/0x4f0 [ 324.226552] __vfs_write+0x888/0xb80 [ 324.230273] vfs_write+0x4a3/0x8f0 [ 324.233825] __se_sys_write+0x17a/0x370 [ 324.237809] __x64_sys_write+0x4a/0x70 [ 324.241726] do_syscall_64+0xcf/0x110 [ 324.245573] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.250803] [ 324.252439] Uninit was stored to memory at: [ 324.256787] kmsan_internal_chain_origin+0x136/0x240 [ 324.261910] __msan_chain_origin+0x6d/0xb0 [ 324.266168] __save_stack_trace+0x833/0xc60 [ 324.270504] save_stack_trace+0xc6/0x110 [ 324.274580] kmsan_internal_chain_origin+0x136/0x240 [ 324.279700] kmsan_memcpy_origins+0x13d/0x190 [ 324.284212] __msan_memcpy+0x6f/0x80 [ 324.287946] pskb_expand_head+0x436/0x1d20 [ 324.292198] tcp_trim_head+0x214/0x9b0 [ 324.296102] tcp_ack+0x3193/0xa010 [ 324.299668] tcp_rcv_established+0xf7e/0x2940 [ 324.304181] tcp_v4_do_rcv+0x686/0xd80 [ 324.308080] __release_sock+0x32d/0x750 [ 324.312068] release_sock+0x99/0x2a0 [ 324.315805] tcp_sendmsg+0xd6/0x100 [ 324.319450] inet_sendmsg+0x4e9/0x800 [ 324.323262] sock_write_iter+0x3f4/0x4f0 [ 324.327335] __vfs_write+0x888/0xb80 [ 324.331063] vfs_write+0x4a3/0x8f0 [ 324.334613] __se_sys_write+0x17a/0x370 [ 324.338601] __x64_sys_write+0x4a/0x70 [ 324.342501] do_syscall_64+0xcf/0x110 [ 324.346321] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.351512] [ 324.353152] Uninit was stored to memory at: [ 324.357491] kmsan_internal_chain_origin+0x136/0x240 [ 324.362612] __msan_chain_origin+0x6d/0xb0 [ 324.366859] save_stack_trace+0xfa/0x110 [ 324.370953] kmsan_internal_chain_origin+0x136/0x240 [ 324.376074] kmsan_memcpy_origins+0x13d/0x190 [ 324.380582] __msan_memcpy+0x6f/0x80 [ 324.384312] pskb_expand_head+0x436/0x1d20 [ 324.388555] tcp_trim_head+0x214/0x9b0 [ 324.392458] tcp_ack+0x3193/0xa010 [ 324.396043] tcp_rcv_established+0xf7e/0x2940 [ 324.400548] tcp_v4_do_rcv+0x686/0xd80 [ 324.404447] __release_sock+0x32d/0x750 [ 324.408436] release_sock+0x99/0x2a0 [ 324.412172] tcp_sendmsg+0xd6/0x100 [ 324.415816] inet_sendmsg+0x4e9/0x800 [ 324.419627] sock_write_iter+0x3f4/0x4f0 [ 324.423700] __vfs_write+0x888/0xb80 [ 324.427424] vfs_write+0x4a3/0x8f0 [ 324.430979] __se_sys_write+0x17a/0x370 [ 324.435113] __x64_sys_write+0x4a/0x70 [ 324.439024] do_syscall_64+0xcf/0x110 [ 324.442843] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.448032] [ 324.449670] Uninit was stored to memory at: [ 324.454010] kmsan_internal_chain_origin+0x136/0x240 [ 324.459128] __msan_chain_origin+0x6d/0xb0 [ 324.463387] __save_stack_trace+0x833/0xc60 [ 324.467721] save_stack_trace+0xc6/0x110 [ 324.471804] kmsan_internal_chain_origin+0x136/0x240 [ 324.476926] kmsan_memcpy_origins+0x13d/0x190 [ 324.481439] __msan_memcpy+0x6f/0x80 [ 324.485172] pskb_expand_head+0x436/0x1d20 [ 324.489426] tcp_trim_head+0x214/0x9b0 [ 324.493331] tcp_ack+0x3193/0xa010 [ 324.496893] tcp_rcv_established+0xf7e/0x2940 [ 324.501402] tcp_v4_do_rcv+0x686/0xd80 [ 324.505306] __release_sock+0x32d/0x750 [ 324.509302] release_sock+0x99/0x2a0 [ 324.513029] tcp_sendmsg+0xd6/0x100 [ 324.516691] inet_sendmsg+0x4e9/0x800 [ 324.520505] sock_write_iter+0x3f4/0x4f0 [ 324.524578] __vfs_write+0x888/0xb80 [ 324.528301] vfs_write+0x4a3/0x8f0 [ 324.531852] __se_sys_write+0x17a/0x370 [ 324.535838] __x64_sys_write+0x4a/0x70 [ 324.539744] do_syscall_64+0xcf/0x110 [ 324.543571] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.548771] [ 324.550404] Uninit was stored to memory at: [ 324.554744] kmsan_internal_chain_origin+0x136/0x240 [ 324.559867] __msan_chain_origin+0x6d/0xb0 [ 324.564607] save_stack_trace+0xfa/0x110 [ 324.568681] kmsan_internal_chain_origin+0x136/0x240 [ 324.573803] kmsan_memcpy_origins+0x13d/0x190 [ 324.578317] __msan_memcpy+0x6f/0x80 [ 324.582045] pskb_expand_head+0x436/0x1d20 [ 324.586295] tcp_trim_head+0x214/0x9b0 [ 324.590198] tcp_ack+0x3193/0xa010 [ 324.593868] tcp_rcv_established+0xf7e/0x2940 [ 324.598379] tcp_v4_do_rcv+0x686/0xd80 [ 324.602284] __release_sock+0x32d/0x750 [ 324.606274] release_sock+0x99/0x2a0 [ 324.610006] tcp_sendmsg+0xd6/0x100 [ 324.613646] inet_sendmsg+0x4e9/0x800 [ 324.617463] sock_write_iter+0x3f4/0x4f0 [ 324.621540] __vfs_write+0x888/0xb80 [ 324.625266] vfs_write+0x4a3/0x8f0 [ 324.628822] __se_sys_write+0x17a/0x370 [ 324.632813] __x64_sys_write+0x4a/0x70 [ 324.637093] do_syscall_64+0xcf/0x110 [ 324.640914] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.646110] [ 324.647755] Local variable description: ----counter@try_charge [ 324.653738] Variable was created at: 08:07:58 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) [ 324.657470] try_charge+0x302/0x4100 [ 324.661200] mem_cgroup_charge_skmem+0x1af/0x380 [ 324.673537] Invalid option length (771) for dns_resolver key 08:07:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000d40)={&(0x7f0000000080), 0xc, &(0x7f0000000d00)={&(0x7f0000000980)=@updpolicy={0xb8, 0x19, 0x421, 0x0, 0x0, {{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 08:07:59 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) [ 324.922342] hrtimer: interrupt took 259320 ns 08:08:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) 08:08:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{}, {0x80}, 0x0, 0xbf}) 08:08:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7a, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000000e80), 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x31a) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001c00)=ANY=[@ANYBLOB="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"], 0x4b7) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea0002000070010046acea0a000000000000f7ffffffffffffff00000000ffffffff000000000000000001000000010004000100000000000000010000700400000005000000000000000000000000000000050000000000000001000000d15c0000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8305002bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcdb1469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327e9f073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea731ca1adde2691a5b3040000002001cb9377fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e29bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506ab48000000000000c988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7e4a16277f3cc34e0ac8e9102e5c83c9e6d3cc39c1b6b6b9005eaaf0d9037fa57675b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fc2baf87c254bb540835206fc5f63dbc82581cec68813c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13faee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df8010001009b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a497a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357e8c67298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde005237bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee9fc93841a7a4ec7420c1d78c09f9355b41c5b6a2e94d84218428a4e4e40bcab84f0cdc9a230101146a11e1f36367b4b5f21e76b5e58c31aec27a47e7ce6c22d29c553f03d0515199b541750e92718c53542cb8c0e4202c89b5bc2a4e3cd4fd1e33ba846b2d2d1c94d2e73327b1d327fe80ff1113634e2e94769b97a1088c2f00001fd26ffbf3b4b82036e960a01efd1eecb0e4cff79c5943cb7f3390757f2ebaa20ac131cddf19065dad03237cca7406b5c30228494fe25d9d26631795f3b0a17ac6c8c27e37a75bce127c592beed29fe6137efe5ac28a2a89597db794c570055e318e92f1819ade8026682c9c966d13605ba9cfa66d91f8203260ed06d8c53912b2c25be01165ebda24b3b70c4fa4a99c56470ee400000092272d6ba4a0906d5b8df7039b82bf83378b78ce124aca8b7944fffdd65bfca51e33614282fb1738dd43c6b95f2bc5e9b24605ff3fb5a06ece40c2c4a86b93acdde501040000c5196e7ef7d65ff45606324b402aa6b81afa463f63f96bc442cd25a033b7b6feed08de0f00bccb16c439813c6c4b1d1733bb55a6245a9180ec71a7f31631613c60af161f5ef64493b859a6c4baa9e3811250984db538169178a4f4cb4141f74e366a28b4fdeef59bb22f6f525c493912a044bd99a3b4b86b2834a40437d58d4292a22a730b6a2e5ec7bf358c2016326fff4889d5d5e1beec898a3888d0f4a450d86548a1a9b1cc1bee45e6a4e2c4e0c8d69a51d46190755bd42c1e53d4a1f80010da651d6c500a066afa9c98755acf643ff381af66742c6e091746c77e0f14f2583d6d70339ed50e9da34a0aa8820359872132179f087f16cdaf3636688927e39a857a99f911d08406b6addefa9f895f3b29812234eaf4d5a93b9363fa02a4ee9fe8676811004fabc8121f7639e9f92c0d7f796a6355e984d7a85aadc638b3b17d74fa96eb571516eb1a9fc487e918956411823e1edef555a61ba7d45931457b221bdcc8aaad58000000000000000000000000000000fb2003a820d44ebe975bb29b3f3a098f"], 0xb49) 08:08:00 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004140)=[{{&(0x7f0000004240)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/33, 0x21}], 0x1, &(0x7f0000000300)=""/151, 0x97}}], 0x1, 0x0, &(0x7f0000008bc0)={0x0, 0x1c9c380}) 08:08:00 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x2e, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x7, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000040)) 08:08:00 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000080)=0xe00, 0x100000010a000201) 08:08:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 08:08:00 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) [ 325.737380] not chained 50000 origins [ 325.741256] CPU: 0 PID: 8462 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 325.748469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.757847] Call Trace: [ 325.760477] dump_stack+0x32d/0x480 [ 325.764173] kmsan_internal_chain_origin+0x222/0x240 [ 325.769353] ? save_stack_trace+0xc6/0x110 [ 325.773623] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 325.778797] ? kmsan_internal_chain_origin+0x90/0x240 [ 325.784055] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 325.789453] ? is_bpf_text_address+0x49e/0x4d0 [ 325.794076] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 325.799562] ? in_task_stack+0x12c/0x210 [ 325.803676] __msan_chain_origin+0x6d/0xb0 [ 325.807966] ? __release_sock+0x32d/0x750 [ 325.812173] __save_stack_trace+0x8be/0xc60 [ 325.816564] ? __release_sock+0x32d/0x750 [ 325.820751] save_stack_trace+0xc6/0x110 [ 325.824852] kmsan_internal_chain_origin+0x136/0x240 [ 325.829981] ? __se_sys_write+0x17a/0x370 [ 325.834187] ? kmsan_internal_chain_origin+0x136/0x240 [ 325.839500] ? kmsan_memcpy_origins+0x13d/0x190 [ 325.844204] ? __msan_memcpy+0x6f/0x80 [ 325.848133] ? pskb_expand_head+0x436/0x1d20 [ 325.852589] ? tcp_fragment+0x378/0x21d0 [ 325.856681] ? tcp_sacktag_walk+0xe88/0x29d0 [ 325.861115] ? tcp_sacktag_write_queue+0x2805/0x4630 [ 325.866254] ? tcp_ack+0x2888/0xa010 [ 325.869999] ? tcp_rcv_established+0xf7e/0x2940 [ 325.874690] ? tcp_v4_do_rcv+0x686/0xd80 [ 325.878800] ? __release_sock+0x32d/0x750 [ 325.882990] ? release_sock+0x99/0x2a0 [ 325.886911] ? tcp_sendmsg+0xd6/0x100 [ 325.890743] ? inet_sendmsg+0x4e9/0x800 [ 325.894746] ? sock_write_iter+0x3f4/0x4f0 [ 325.899012] ? __vfs_write+0x888/0xb80 [ 325.902927] ? vfs_write+0x4a3/0x8f0 [ 325.906673] ? __se_sys_write+0x17a/0x370 [ 325.910846] ? __x64_sys_write+0x4a/0x70 [ 325.914936] ? do_syscall_64+0xcf/0x110 [ 325.918947] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.924346] ? memcg_kmem_put_cache+0x73/0x460 [ 325.928984] ? __msan_get_context_state+0x9/0x20 [ 325.933786] ? INIT_INT+0xc/0x30 [ 325.937189] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 325.942602] kmsan_memcpy_origins+0x13d/0x190 [ 325.947151] __msan_memcpy+0x6f/0x80 [ 325.950910] pskb_expand_head+0x436/0x1d20 [ 325.955227] tcp_fragment+0x378/0x21d0 [ 325.959178] ? kmsan_set_origin+0x7f/0x100 [ 325.963473] tcp_sacktag_walk+0xe88/0x29d0 [ 325.967796] tcp_sacktag_write_queue+0x2805/0x4630 [ 325.972765] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 325.977978] tcp_ack+0x2888/0xa010 [ 325.981556] ? tcp_parse_options+0xbe/0x1cf0 [ 325.985993] ? tcp_validate_incoming+0x50b/0x29d0 [ 325.990876] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 325.996364] ? tcp_parse_options+0x1c55/0x1cf0 [ 326.001072] tcp_rcv_established+0xf7e/0x2940 [ 326.005624] ? __msan_get_context_state+0x9/0x20 [ 326.010427] tcp_v4_do_rcv+0x686/0xd80 [ 326.014356] ? inet_sk_rx_dst_set+0x200/0x200 [ 326.018891] __release_sock+0x32d/0x750 [ 326.022919] release_sock+0x99/0x2a0 [ 326.026669] tcp_sendmsg+0xd6/0x100 [ 326.030335] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 326.035037] inet_sendmsg+0x4e9/0x800 [ 326.038875] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.044280] ? security_socket_sendmsg+0x1bd/0x200 [ 326.049269] ? inet_getname+0x490/0x490 [ 326.053280] sock_write_iter+0x3f4/0x4f0 [ 326.057405] ? sock_read_iter+0x4e0/0x4e0 [ 326.061599] __vfs_write+0x888/0xb80 [ 326.065380] vfs_write+0x4a3/0x8f0 [ 326.068967] __se_sys_write+0x17a/0x370 [ 326.072989] __x64_sys_write+0x4a/0x70 [ 326.076922] do_syscall_64+0xcf/0x110 [ 326.080750] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.085957] RIP: 0033:0x457569 08:08:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) [ 326.089183] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.108110] RSP: 002b:00007fe20f518c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 326.115859] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 326.123159] RDX: 00000000000004b7 RSI: 0000000020001c00 RDI: 0000000000000003 [ 326.130453] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.137747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f5196d4 [ 326.145036] R13: 00000000004c5cf1 R14: 00000000004da0a8 R15: 00000000ffffffff [ 326.152344] Uninit was stored to memory at: [ 326.156701] kmsan_internal_chain_origin+0x136/0x240 [ 326.161832] __msan_chain_origin+0x6d/0xb0 [ 326.166108] __save_stack_trace+0x8be/0xc60 [ 326.170464] save_stack_trace+0xc6/0x110 [ 326.174548] kmsan_internal_chain_origin+0x136/0x240 [ 326.179681] kmsan_memcpy_origins+0x13d/0x190 [ 326.184198] __msan_memcpy+0x6f/0x80 [ 326.187937] pskb_expand_head+0x436/0x1d20 [ 326.192198] tcp_fragment+0x378/0x21d0 [ 326.196107] tcp_sacktag_walk+0xe88/0x29d0 [ 326.200386] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.205341] tcp_ack+0x2888/0xa010 [ 326.208912] tcp_rcv_established+0xf7e/0x2940 [ 326.213424] tcp_v4_do_rcv+0x686/0xd80 [ 326.217335] __release_sock+0x32d/0x750 [ 326.221334] release_sock+0x99/0x2a0 [ 326.225341] tcp_sendmsg+0xd6/0x100 [ 326.228991] inet_sendmsg+0x4e9/0x800 [ 326.232819] sock_write_iter+0x3f4/0x4f0 [ 326.236902] __vfs_write+0x888/0xb80 [ 326.240638] vfs_write+0x4a3/0x8f0 [ 326.244205] __se_sys_write+0x17a/0x370 [ 326.248201] __x64_sys_write+0x4a/0x70 [ 326.252111] do_syscall_64+0xcf/0x110 [ 326.255974] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.261182] [ 326.262821] Uninit was stored to memory at: [ 326.267202] kmsan_internal_chain_origin+0x136/0x240 [ 326.272334] __msan_chain_origin+0x6d/0xb0 [ 326.276599] __save_stack_trace+0x8be/0xc60 [ 326.280949] save_stack_trace+0xc6/0x110 [ 326.285050] kmsan_internal_chain_origin+0x136/0x240 [ 326.290182] kmsan_memcpy_origins+0x13d/0x190 [ 326.294704] __msan_memcpy+0x6f/0x80 [ 326.298443] pskb_expand_head+0x436/0x1d20 [ 326.302700] tcp_fragment+0x378/0x21d0 [ 326.306607] tcp_sacktag_walk+0xe88/0x29d0 [ 326.310888] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.315838] tcp_ack+0x2888/0xa010 [ 326.319405] tcp_rcv_established+0xf7e/0x2940 [ 326.323927] tcp_v4_do_rcv+0x686/0xd80 [ 326.327839] __release_sock+0x32d/0x750 [ 326.331844] release_sock+0x99/0x2a0 [ 326.335583] tcp_sendmsg+0xd6/0x100 [ 326.339241] inet_sendmsg+0x4e9/0x800 [ 326.343068] sock_write_iter+0x3f4/0x4f0 [ 326.347163] __vfs_write+0x888/0xb80 [ 326.350903] vfs_write+0x4a3/0x8f0 [ 326.354466] __se_sys_write+0x17a/0x370 [ 326.358456] __x64_sys_write+0x4a/0x70 [ 326.362380] do_syscall_64+0xcf/0x110 [ 326.366208] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.371410] [ 326.373048] Uninit was stored to memory at: [ 326.377394] kmsan_internal_chain_origin+0x136/0x240 [ 326.382520] __msan_chain_origin+0x6d/0xb0 [ 326.386781] __save_stack_trace+0x8be/0xc60 [ 326.391125] save_stack_trace+0xc6/0x110 [ 326.395223] kmsan_internal_chain_origin+0x136/0x240 [ 326.400358] kmsan_memcpy_origins+0x13d/0x190 [ 326.404881] __msan_memcpy+0x6f/0x80 [ 326.408620] pskb_expand_head+0x436/0x1d20 [ 326.412875] tcp_fragment+0x378/0x21d0 [ 326.416783] tcp_sacktag_walk+0xe88/0x29d0 [ 326.421041] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.425996] tcp_ack+0x2888/0xa010 [ 326.430390] tcp_rcv_established+0xf7e/0x2940 [ 326.435248] tcp_v4_do_rcv+0x686/0xd80 [ 326.439174] __release_sock+0x32d/0x750 [ 326.443196] release_sock+0x99/0x2a0 [ 326.446932] tcp_sendmsg+0xd6/0x100 [ 326.450614] inet_sendmsg+0x4e9/0x800 [ 326.454434] sock_write_iter+0x3f4/0x4f0 [ 326.458525] __vfs_write+0x888/0xb80 [ 326.462258] vfs_write+0x4a3/0x8f0 [ 326.465830] __se_sys_write+0x17a/0x370 [ 326.469825] __x64_sys_write+0x4a/0x70 [ 326.473735] do_syscall_64+0xcf/0x110 [ 326.477560] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.482759] [ 326.484405] Uninit was stored to memory at: [ 326.488750] kmsan_internal_chain_origin+0x136/0x240 [ 326.493875] __msan_chain_origin+0x6d/0xb0 [ 326.498129] __save_stack_trace+0x8be/0xc60 [ 326.502481] save_stack_trace+0xc6/0x110 [ 326.506569] kmsan_internal_chain_origin+0x136/0x240 [ 326.511695] kmsan_memcpy_origins+0x13d/0x190 [ 326.516226] __msan_memcpy+0x6f/0x80 [ 326.519989] pskb_expand_head+0x436/0x1d20 [ 326.524267] tcp_fragment+0x378/0x21d0 [ 326.528182] tcp_sacktag_walk+0xe88/0x29d0 [ 326.532447] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.537411] tcp_ack+0x2888/0xa010 [ 326.540980] tcp_rcv_established+0xf7e/0x2940 [ 326.545496] tcp_v4_do_rcv+0x686/0xd80 [ 326.549412] __release_sock+0x32d/0x750 [ 326.553408] release_sock+0x99/0x2a0 [ 326.557152] tcp_sendmsg+0xd6/0x100 [ 326.560817] inet_sendmsg+0x4e9/0x800 [ 326.564642] sock_write_iter+0x3f4/0x4f0 [ 326.568725] __vfs_write+0x888/0xb80 [ 326.572462] vfs_write+0x4a3/0x8f0 [ 326.576019] __se_sys_write+0x17a/0x370 [ 326.580014] __x64_sys_write+0x4a/0x70 [ 326.583941] do_syscall_64+0xcf/0x110 [ 326.587766] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.592968] [ 326.594605] Uninit was stored to memory at: [ 326.598967] kmsan_internal_chain_origin+0x136/0x240 [ 326.604091] __msan_chain_origin+0x6d/0xb0 [ 326.608357] __save_stack_trace+0x8be/0xc60 [ 326.612701] save_stack_trace+0xc6/0x110 [ 326.616782] kmsan_internal_chain_origin+0x136/0x240 [ 326.621911] kmsan_memcpy_origins+0x13d/0x190 [ 326.626427] __msan_memcpy+0x6f/0x80 [ 326.630177] pskb_expand_head+0x436/0x1d20 [ 326.634432] tcp_fragment+0x378/0x21d0 [ 326.638340] tcp_sacktag_walk+0xe88/0x29d0 [ 326.642596] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.647545] tcp_ack+0x2888/0xa010 [ 326.651110] tcp_rcv_established+0xf7e/0x2940 [ 326.655643] tcp_v4_do_rcv+0x686/0xd80 [ 326.659555] __release_sock+0x32d/0x750 [ 326.663552] release_sock+0x99/0x2a0 [ 326.667300] tcp_sendmsg+0xd6/0x100 [ 326.670952] inet_sendmsg+0x4e9/0x800 [ 326.674773] sock_write_iter+0x3f4/0x4f0 [ 326.678871] __vfs_write+0x888/0xb80 [ 326.682624] vfs_write+0x4a3/0x8f0 [ 326.686233] __se_sys_write+0x17a/0x370 [ 326.690235] __x64_sys_write+0x4a/0x70 [ 326.694175] do_syscall_64+0xcf/0x110 [ 326.698007] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.703214] [ 326.704866] Uninit was stored to memory at: [ 326.709213] kmsan_internal_chain_origin+0x136/0x240 [ 326.714346] __msan_chain_origin+0x6d/0xb0 [ 326.718604] __save_stack_trace+0x8be/0xc60 [ 326.722949] save_stack_trace+0xc6/0x110 [ 326.727035] kmsan_internal_chain_origin+0x136/0x240 [ 326.732173] kmsan_memcpy_origins+0x13d/0x190 [ 326.736694] __msan_memcpy+0x6f/0x80 [ 326.740433] pskb_expand_head+0x436/0x1d20 [ 326.744693] tcp_fragment+0x378/0x21d0 [ 326.748600] tcp_sacktag_walk+0xe88/0x29d0 [ 326.752893] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.757841] tcp_ack+0x2888/0xa010 [ 326.761416] tcp_rcv_established+0xf7e/0x2940 [ 326.765933] tcp_v4_do_rcv+0x686/0xd80 [ 326.769841] __release_sock+0x32d/0x750 [ 326.773838] release_sock+0x99/0x2a0 [ 326.777574] tcp_sendmsg+0xd6/0x100 [ 326.781225] inet_sendmsg+0x4e9/0x800 [ 326.785050] sock_write_iter+0x3f4/0x4f0 [ 326.789130] __vfs_write+0x888/0xb80 [ 326.792880] vfs_write+0x4a3/0x8f0 [ 326.796439] __se_sys_write+0x17a/0x370 [ 326.800432] __x64_sys_write+0x4a/0x70 [ 326.804349] do_syscall_64+0xcf/0x110 [ 326.808185] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.813385] [ 326.815028] Uninit was stored to memory at: [ 326.819380] kmsan_internal_chain_origin+0x136/0x240 [ 326.824514] __msan_chain_origin+0x6d/0xb0 [ 326.828775] __save_stack_trace+0x8be/0xc60 [ 326.833120] save_stack_trace+0xc6/0x110 [ 326.837228] kmsan_internal_chain_origin+0x136/0x240 [ 326.842362] kmsan_memcpy_origins+0x13d/0x190 [ 326.846886] __msan_memcpy+0x6f/0x80 [ 326.850621] pskb_expand_head+0x436/0x1d20 [ 326.854881] tcp_fragment+0x378/0x21d0 [ 326.858803] tcp_sacktag_walk+0xe88/0x29d0 [ 326.863068] tcp_sacktag_write_queue+0x2805/0x4630 [ 326.868021] tcp_ack+0x2888/0xa010 [ 326.871588] tcp_rcv_established+0xf7e/0x2940 [ 326.876101] tcp_v4_do_rcv+0x686/0xd80 [ 326.880017] __release_sock+0x32d/0x750 [ 326.884008] release_sock+0x99/0x2a0 [ 326.887742] tcp_sendmsg+0xd6/0x100 08:08:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x2a, 0x100000010a000201) [ 326.891391] inet_sendmsg+0x4e9/0x800 [ 326.895217] sock_write_iter+0x3f4/0x4f0 [ 326.899309] __vfs_write+0x888/0xb80 [ 326.903046] vfs_write+0x4a3/0x8f0 [ 326.906629] __se_sys_write+0x17a/0x370 [ 326.910625] __x64_sys_write+0x4a/0x70 [ 326.914537] do_syscall_64+0xcf/0x110 [ 326.918362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.923560] [ 326.925210] Local variable description: ----_tcph@tcp_packet [ 326.931018] Variable was created at: [ 326.934753] tcp_packet+0xe1/0x73c0 [ 326.938400] nf_conntrack_in+0x9f0/0x1edd 08:08:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000100)='./file0\x00', 0x0) [ 327.125669] not chained 60000 origins [ 327.129545] CPU: 1 PID: 8462 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 327.136748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.146133] Call Trace: [ 327.148782] dump_stack+0x32d/0x480 [ 327.152460] kmsan_internal_chain_origin+0x222/0x240 [ 327.157601] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.162989] ? __module_address+0x6a/0x5f0 [ 327.167252] ? is_bpf_text_address+0x3e5/0x4d0 [ 327.171887] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.177286] ? __module_address+0x6a/0x5f0 [ 327.181544] ? is_bpf_text_address+0x3e5/0x4d0 [ 327.186169] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 327.191556] ? is_bpf_text_address+0x49e/0x4d0 [ 327.196195] ? kmsan_internal_chain_origin+0x90/0x240 [ 327.201459] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 327.206840] ? is_bpf_text_address+0x49e/0x4d0 [ 327.211455] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 327.216937] ? in_task_stack+0x12c/0x210 [ 327.221042] __msan_chain_origin+0x6d/0xb0 [ 327.225310] ? release_sock+0x99/0x2a0 [ 327.229226] __save_stack_trace+0x8be/0xc60 [ 327.233607] ? release_sock+0x99/0x2a0 [ 327.237528] save_stack_trace+0xc6/0x110 [ 327.241673] kmsan_internal_chain_origin+0x136/0x240 [ 327.246818] ? __se_sys_write+0x17a/0x370 [ 327.251001] ? kmsan_internal_chain_origin+0x136/0x240 [ 327.256305] ? kmsan_memcpy_origins+0x13d/0x190 [ 327.261000] ? __msan_memcpy+0x6f/0x80 [ 327.264913] ? pskb_expand_head+0x436/0x1d20 [ 327.269345] ? tcp_fragment+0x378/0x21d0 [ 327.273425] ? tcp_sacktag_walk+0xe88/0x29d0 [ 327.277861] ? tcp_sacktag_write_queue+0x2805/0x4630 [ 327.282985] ? tcp_ack+0x2888/0xa010 [ 327.286720] ? tcp_rcv_established+0xf7e/0x2940 [ 327.291418] ? tcp_v4_do_rcv+0x686/0xd80 [ 327.295506] ? __release_sock+0x32d/0x750 [ 327.299681] ? release_sock+0x99/0x2a0 [ 327.303609] ? tcp_sendmsg+0xd6/0x100 [ 327.307441] ? inet_sendmsg+0x4e9/0x800 [ 327.311443] ? sock_write_iter+0x3f4/0x4f0 [ 327.315702] ? __vfs_write+0x888/0xb80 [ 327.319619] ? vfs_write+0x4a3/0x8f0 [ 327.323357] ? __se_sys_write+0x17a/0x370 [ 327.327533] ? __x64_sys_write+0x4a/0x70 [ 327.331620] ? do_syscall_64+0xcf/0x110 [ 327.335626] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.341037] ? memcg_kmem_put_cache+0x73/0x460 [ 327.345677] ? __msan_get_context_state+0x9/0x20 [ 327.350459] ? INIT_INT+0xc/0x30 [ 327.353875] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 327.359267] ? kmsan_set_origin+0x7f/0x100 [ 327.363546] kmsan_memcpy_origins+0x13d/0x190 [ 327.368083] __msan_memcpy+0x6f/0x80 [ 327.371837] pskb_expand_head+0x436/0x1d20 [ 327.376152] tcp_fragment+0x378/0x21d0 [ 327.380114] tcp_sacktag_walk+0xe88/0x29d0 [ 327.384451] tcp_sacktag_write_queue+0x2805/0x4630 [ 327.389485] tcp_ack+0x2888/0xa010 [ 327.393056] ? tcp_parse_options+0xbe/0x1cf0 [ 327.397495] ? tcp_validate_incoming+0x50b/0x29d0 [ 327.402380] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 327.407866] ? tcp_parse_options+0x1c55/0x1cf0 [ 327.412574] tcp_rcv_established+0xf7e/0x2940 [ 327.417116] ? __msan_get_context_state+0x9/0x20 [ 327.421928] tcp_v4_do_rcv+0x686/0xd80 [ 327.425852] ? inet_sk_rx_dst_set+0x200/0x200 [ 327.430381] __release_sock+0x32d/0x750 [ 327.434401] release_sock+0x99/0x2a0 [ 327.438163] tcp_sendmsg+0xd6/0x100 [ 327.441834] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 327.446535] inet_sendmsg+0x4e9/0x800 [ 327.450366] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.455755] ? security_socket_sendmsg+0x1bd/0x200 [ 327.460737] ? inet_getname+0x490/0x490 [ 327.464741] sock_write_iter+0x3f4/0x4f0 [ 327.468860] ? sock_read_iter+0x4e0/0x4e0 [ 327.473034] __vfs_write+0x888/0xb80 [ 327.476810] vfs_write+0x4a3/0x8f0 [ 327.480400] __se_sys_write+0x17a/0x370 [ 327.484417] __x64_sys_write+0x4a/0x70 [ 327.488335] do_syscall_64+0xcf/0x110 [ 327.492179] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.497392] RIP: 0033:0x457569 [ 327.500605] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.519523] RSP: 002b:00007fe20f518c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 327.527259] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 327.534553] RDX: 00000000000004b7 RSI: 0000000020001c00 RDI: 0000000000000003 [ 327.541847] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 327.549152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f5196d4 [ 327.556457] R13: 00000000004c5cf1 R14: 00000000004da0a8 R15: 00000000ffffffff [ 327.564300] Uninit was stored to memory at: [ 327.568661] kmsan_internal_chain_origin+0x136/0x240 [ 327.573796] __msan_chain_origin+0x6d/0xb0 [ 327.578056] __save_stack_trace+0x8be/0xc60 [ 327.582407] save_stack_trace+0xc6/0x110 [ 327.586494] kmsan_internal_chain_origin+0x136/0x240 [ 327.591621] kmsan_memcpy_origins+0x13d/0x190 [ 327.596161] __msan_memcpy+0x6f/0x80 [ 327.599906] pskb_expand_head+0x436/0x1d20 [ 327.604173] tcp_fragment+0x378/0x21d0 [ 327.608085] tcp_sacktag_walk+0xe88/0x29d0 [ 327.612347] tcp_sacktag_write_queue+0x2805/0x4630 [ 327.617306] tcp_ack+0x2888/0xa010 [ 327.620875] tcp_rcv_established+0xf7e/0x2940 [ 327.625394] tcp_v4_do_rcv+0x686/0xd80 [ 327.629304] __release_sock+0x32d/0x750 [ 327.633307] release_sock+0x99/0x2a0 [ 327.637035] tcp_sendmsg+0xd6/0x100 [ 327.640659] inet_sendmsg+0x4e9/0x800 [ 327.644455] sock_write_iter+0x3f4/0x4f0 [ 327.648512] __vfs_write+0x888/0xb80 [ 327.652223] vfs_write+0x4a3/0x8f0 [ 327.655771] __se_sys_write+0x17a/0x370 [ 327.659755] __x64_sys_write+0x4a/0x70 [ 327.663657] do_syscall_64+0xcf/0x110 [ 327.667456] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.672628] [ 327.674255] Uninit was stored to memory at: [ 327.678592] kmsan_internal_chain_origin+0x136/0x240 [ 327.683692] __msan_chain_origin+0x6d/0xb0 [ 327.687930] __save_stack_trace+0x8be/0xc60 [ 327.692258] save_stack_trace+0xc6/0x110 [ 327.696332] kmsan_internal_chain_origin+0x136/0x240 [ 327.701462] kmsan_memcpy_origins+0x13d/0x190 [ 327.705955] __msan_memcpy+0x6f/0x80 [ 327.709679] pskb_expand_head+0x436/0x1d20 [ 327.713925] tcp_fragment+0x378/0x21d0 [ 327.717835] tcp_sacktag_walk+0xe88/0x29d0 [ 327.722071] tcp_sacktag_write_queue+0x2805/0x4630 [ 327.726998] tcp_ack+0x2888/0xa010 [ 327.730533] tcp_rcv_established+0xf7e/0x2940 [ 327.735024] tcp_v4_do_rcv+0x686/0xd80 [ 327.738904] __release_sock+0x32d/0x750 [ 327.742872] release_sock+0x99/0x2a0 [ 327.746580] tcp_sendmsg+0xd6/0x100 [ 327.750202] inet_sendmsg+0x4e9/0x800 [ 327.754009] sock_write_iter+0x3f4/0x4f0 [ 327.758080] __vfs_write+0x888/0xb80 [ 327.761793] vfs_write+0x4a3/0x8f0 [ 327.765359] __se_sys_write+0x17a/0x370 [ 327.769327] __x64_sys_write+0x4a/0x70 [ 327.773208] do_syscall_64+0xcf/0x110 [ 327.777019] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.782212] [ 327.783833] Uninit was stored to memory at: [ 327.788162] kmsan_internal_chain_origin+0x136/0x240 [ 327.793263] __msan_chain_origin+0x6d/0xb0 [ 327.797503] __save_stack_trace+0x8be/0xc60 [ 327.801835] save_stack_trace+0xc6/0x110 [ 327.805889] kmsan_internal_chain_origin+0x136/0x240 [ 327.811000] kmsan_memcpy_origins+0x13d/0x190 [ 327.815507] __msan_memcpy+0x6f/0x80 [ 327.819217] pskb_expand_head+0x436/0x1d20 [ 327.823447] tcp_fragment+0x378/0x21d0 [ 327.827328] tcp_sacktag_walk+0xe88/0x29d0 [ 327.831572] tcp_sacktag_write_queue+0x2805/0x4630 [ 327.836514] tcp_ack+0x2888/0xa010 [ 327.840067] tcp_rcv_established+0xf7e/0x2940 [ 327.844575] tcp_v4_do_rcv+0x686/0xd80 [ 327.848473] __release_sock+0x32d/0x750 [ 327.852457] release_sock+0x99/0x2a0 [ 327.856173] tcp_sendmsg+0xd6/0x100 [ 327.859796] inet_sendmsg+0x4e9/0x800 [ 327.863588] sock_write_iter+0x3f4/0x4f0 [ 327.867653] __vfs_write+0x888/0xb80 [ 327.871395] vfs_write+0x4a3/0x8f0 [ 327.874959] __se_sys_write+0x17a/0x370 [ 327.878951] __x64_sys_write+0x4a/0x70 [ 327.882832] do_syscall_64+0xcf/0x110 [ 327.886632] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.891826] [ 327.893460] Uninit was stored to memory at: [ 327.897788] kmsan_internal_chain_origin+0x136/0x240 [ 327.902901] __msan_chain_origin+0x6d/0xb0 [ 327.907162] __save_stack_trace+0x8be/0xc60 [ 327.911478] save_stack_trace+0xc6/0x110 [ 327.915533] kmsan_internal_chain_origin+0x136/0x240 [ 327.920630] kmsan_memcpy_origins+0x13d/0x190 [ 327.925120] __msan_memcpy+0x6f/0x80 [ 327.928852] pskb_expand_head+0x436/0x1d20 [ 327.933096] tcp_fragment+0x378/0x21d0 [ 327.937006] tcp_sacktag_walk+0xe88/0x29d0 [ 327.941241] tcp_sacktag_write_queue+0x2805/0x4630 [ 327.946173] tcp_ack+0x2888/0xa010 [ 327.949707] tcp_rcv_established+0xf7e/0x2940 [ 327.954226] tcp_v4_do_rcv+0x686/0xd80 [ 327.958148] __release_sock+0x32d/0x750 [ 327.962127] release_sock+0x99/0x2a0 [ 327.965861] tcp_sendmsg+0xd6/0x100 [ 327.969486] inet_sendmsg+0x4e9/0x800 [ 327.973284] sock_write_iter+0x3f4/0x4f0 [ 327.977339] __vfs_write+0x888/0xb80 [ 327.981045] vfs_write+0x4a3/0x8f0 [ 327.984575] __se_sys_write+0x17a/0x370 [ 327.988575] __x64_sys_write+0x4a/0x70 [ 327.992485] do_syscall_64+0xcf/0x110 [ 327.996294] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.001484] [ 328.003106] Uninit was stored to memory at: [ 328.007449] kmsan_internal_chain_origin+0x136/0x240 [ 328.012545] __msan_chain_origin+0x6d/0xb0 [ 328.016796] __save_stack_trace+0x8be/0xc60 [ 328.021126] save_stack_trace+0xc6/0x110 [ 328.025202] kmsan_internal_chain_origin+0x136/0x240 [ 328.030302] kmsan_memcpy_origins+0x13d/0x190 [ 328.034813] __msan_memcpy+0x6f/0x80 [ 328.038538] pskb_expand_head+0x436/0x1d20 [ 328.042770] tcp_fragment+0x378/0x21d0 [ 328.046652] tcp_sacktag_walk+0xe88/0x29d0 [ 328.050888] tcp_sacktag_write_queue+0x2805/0x4630 [ 328.055940] tcp_ack+0x2888/0xa010 [ 328.059478] tcp_rcv_established+0xf7e/0x2940 [ 328.063968] tcp_v4_do_rcv+0x686/0xd80 [ 328.067868] __release_sock+0x32d/0x750 [ 328.071837] release_sock+0x99/0x2a0 [ 328.075673] tcp_sendmsg+0xd6/0x100 [ 328.079300] inet_sendmsg+0x4e9/0x800 [ 328.083116] sock_write_iter+0x3f4/0x4f0 [ 328.087199] __vfs_write+0x888/0xb80 [ 328.090924] vfs_write+0x4a3/0x8f0 [ 328.094458] __se_sys_write+0x17a/0x370 [ 328.098423] __x64_sys_write+0x4a/0x70 [ 328.102319] do_syscall_64+0xcf/0x110 [ 328.106156] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.111347] [ 328.113054] Uninit was stored to memory at: [ 328.117376] kmsan_internal_chain_origin+0x136/0x240 [ 328.122476] __msan_chain_origin+0x6d/0xb0 [ 328.126708] __save_stack_trace+0x8be/0xc60 [ 328.131022] save_stack_trace+0xc6/0x110 [ 328.135092] kmsan_internal_chain_origin+0x136/0x240 [ 328.140239] kmsan_memcpy_origins+0x13d/0x190 [ 328.144745] __msan_memcpy+0x6f/0x80 [ 328.148478] pskb_expand_head+0x436/0x1d20 [ 328.152707] tcp_fragment+0x378/0x21d0 [ 328.156685] tcp_sacktag_walk+0xe88/0x29d0 [ 328.161123] tcp_sacktag_write_queue+0x2805/0x4630 [ 328.166052] tcp_ack+0x2888/0xa010 [ 328.169587] tcp_rcv_established+0xf7e/0x2940 [ 328.174075] tcp_v4_do_rcv+0x686/0xd80 [ 328.177955] __release_sock+0x32d/0x750 [ 328.181923] release_sock+0x99/0x2a0 [ 328.185634] tcp_sendmsg+0xd6/0x100 [ 328.189256] inet_sendmsg+0x4e9/0x800 [ 328.193069] sock_write_iter+0x3f4/0x4f0 [ 328.197150] __vfs_write+0x888/0xb80 [ 328.200861] vfs_write+0x4a3/0x8f0 [ 328.204493] __se_sys_write+0x17a/0x370 [ 328.208539] __x64_sys_write+0x4a/0x70 [ 328.212434] do_syscall_64+0xcf/0x110 [ 328.216257] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.221439] [ 328.223053] Uninit was stored to memory at: [ 328.227372] kmsan_internal_chain_origin+0x136/0x240 [ 328.232472] __msan_chain_origin+0x6d/0xb0 [ 328.236715] __save_stack_trace+0x8be/0xc60 [ 328.241045] save_stack_trace+0xc6/0x110 [ 328.245112] kmsan_internal_chain_origin+0x136/0x240 [ 328.250236] kmsan_memcpy_origins+0x13d/0x190 [ 328.254739] __msan_memcpy+0x6f/0x80 [ 328.258485] pskb_expand_head+0x436/0x1d20 [ 328.262729] tcp_fragment+0x378/0x21d0 [ 328.266612] tcp_sacktag_walk+0xe88/0x29d0 [ 328.270854] tcp_sacktag_write_queue+0x2805/0x4630 [ 328.275781] tcp_ack+0x2888/0xa010 [ 328.279318] tcp_rcv_established+0xf7e/0x2940 [ 328.283918] tcp_v4_do_rcv+0x686/0xd80 [ 328.287817] __release_sock+0x32d/0x750 [ 328.291788] release_sock+0x99/0x2a0 [ 328.295498] tcp_sendmsg+0xd6/0x100 [ 328.299119] inet_sendmsg+0x4e9/0x800 [ 328.302922] sock_write_iter+0x3f4/0x4f0 [ 328.306980] __vfs_write+0x888/0xb80 [ 328.310689] vfs_write+0x4a3/0x8f0 [ 328.314224] __se_sys_write+0x17a/0x370 [ 328.318194] __x64_sys_write+0x4a/0x70 [ 328.322079] do_syscall_64+0xcf/0x110 [ 328.325886] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.331066] [ 328.332688] Local variable description: ----_tcph@tcp_packet [ 328.338479] Variable was created at: [ 328.342207] tcp_packet+0xe1/0x73c0 [ 328.345841] nf_conntrack_in+0x9f0/0x1edd [ 328.399856] not chained 70000 origins [ 328.403706] CPU: 0 PID: 8467 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 328.410881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.420226] Call Trace: [ 328.422804] [ 328.424979] dump_stack+0x32d/0x480 [ 328.428649] kmsan_internal_chain_origin+0x222/0x240 [ 328.433759] ? _raw_spin_lock_irqsave+0x320/0x490 [ 328.438614] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.443975] ? __module_address+0x6a/0x5f0 [ 328.448206] ? is_bpf_text_address+0x3e5/0x4d0 [ 328.452831] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 328.458211] ? is_bpf_text_address+0x49e/0x4d0 [ 328.462792] ? kmsan_internal_chain_origin+0x90/0x240 [ 328.468020] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 328.473486] ? in_task_stack+0x12c/0x210 [ 328.478068] ? get_stack_info+0x206/0x220 [ 328.482272] __msan_chain_origin+0x6d/0xb0 [ 328.486537] ? __local_bh_enable_ip+0x228/0x260 [ 328.491217] __save_stack_trace+0x8be/0xc60 [ 328.495555] ? __local_bh_enable_ip+0x228/0x260 [ 328.500248] save_stack_trace+0xc6/0x110 [ 328.504337] kmsan_internal_chain_origin+0x136/0x240 [ 328.509436] ? ip_finish_output+0xd93/0x10f0 [ 328.513852] ? sk_wait_data+0x2c3/0x920 [ 328.517825] ? tcp_recvmsg+0x1d10/0x4aa0 [ 328.521889] ? inet_recvmsg+0x5b8/0x6c0 [ 328.525875] ? kmsan_internal_chain_origin+0x136/0x240 [ 328.531152] ? kmsan_memcpy_origins+0x13d/0x190 [ 328.535816] ? __msan_memcpy+0x6f/0x80 [ 328.539697] ? pskb_expand_head+0x436/0x1d20 [ 328.544105] ? ___pskb_trim+0x3c9/0x1bf0 [ 328.548179] ? sk_filter_trim_cap+0x5ac/0xa60 [ 328.552671] ? tcp_v4_rcv+0x4a1b/0x6520 [ 328.556814] ? ip_local_deliver_finish+0x8d8/0xff0 [ 328.561754] ? ip_local_deliver+0x44b/0x510 [ 328.566073] ? ip_rcv+0x6b6/0x740 [ 328.569521] ? process_backlog+0x82b/0x11e0 [ 328.573839] ? net_rx_action+0x98f/0x1d50 [ 328.577986] ? __do_softirq+0x721/0xc7f [ 328.581959] ? do_softirq_own_stack+0x49/0x80 [ 328.586453] ? __msan_poison_alloca+0x1e0/0x270 [ 328.591118] ? ip_finish_output2+0x1430/0x1560 [ 328.595710] ? memcg_kmem_put_cache+0x73/0x460 [ 328.600304] ? __msan_get_context_state+0x9/0x20 [ 328.605053] ? INIT_INT+0xc/0x30 [ 328.608419] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 328.613806] kmsan_memcpy_origins+0x13d/0x190 [ 328.618355] __msan_memcpy+0x6f/0x80 [ 328.622098] pskb_expand_head+0x436/0x1d20 [ 328.626374] ___pskb_trim+0x3c9/0x1bf0 [ 328.630285] sk_filter_trim_cap+0x5ac/0xa60 [ 328.634640] tcp_v4_rcv+0x4a1b/0x6520 [ 328.638525] ? tcp_filter+0x260/0x260 [ 328.642355] ip_local_deliver_finish+0x8d8/0xff0 [ 328.647126] ? nf_hook_slow+0x36f/0x3d0 [ 328.651126] ip_local_deliver+0x44b/0x510 [ 328.655337] ? ip_local_deliver+0x510/0x510 [ 328.659657] ? ip_call_ra_chain+0x7a0/0x7a0 [ 328.663976] ip_rcv+0x6b6/0x740 [ 328.667277] ? ip_rcv_core+0x1370/0x1370 [ 328.671339] process_backlog+0x82b/0x11e0 [ 328.675488] ? ip_local_deliver_finish+0xff0/0xff0 [ 328.680427] ? rps_trigger_softirq+0x2e0/0x2e0 [ 328.685014] net_rx_action+0x98f/0x1d50 [ 328.689011] ? net_tx_action+0xf20/0xf20 [ 328.693067] __do_softirq+0x721/0xc7f [ 328.696880] do_softirq_own_stack+0x49/0x80 [ 328.701188] [ 328.703424] __local_bh_enable_ip+0x228/0x260 [ 328.707917] local_bh_enable+0x36/0x40 [ 328.711803] ip_finish_output2+0x1430/0x1560 [ 328.716240] ip_finish_output+0xd93/0x10f0 [ 328.720491] ip_output+0x55c/0x630 [ 328.724035] ? ip_mc_finish_output+0x440/0x440 [ 328.728644] ? ip_finish_output+0x10f0/0x10f0 [ 328.733157] __ip_queue_xmit+0x1bb5/0x2170 [ 328.737421] ? kmsan_set_origin+0x7f/0x100 [ 328.741728] ip_queue_xmit+0xcc/0xf0 [ 328.745465] ? dst_hold_safe+0x5d0/0x5d0 [ 328.749538] __tcp_transmit_skb+0x425c/0x5e00 [ 328.754082] tcp_write_xmit+0x389a/0xacc0 [ 328.758296] __tcp_push_pending_frames+0x124/0x4e0 [ 328.763235] tcp_data_snd_check+0x1ec/0x1080 [ 328.767684] tcp_rcv_established+0x1bb2/0x2940 [ 328.772299] ? __msan_get_context_state+0x9/0x20 [ 328.777066] tcp_v4_do_rcv+0x686/0xd80 [ 328.780967] ? inet_sk_rx_dst_set+0x200/0x200 [ 328.785491] __release_sock+0x32d/0x750 [ 328.789478] sk_wait_data+0x2c3/0x920 [ 328.793278] ? tcp_send_ack+0x68/0x90 [ 328.797125] ? tcp_cleanup_rbuf+0x57b/0x8e0 [ 328.801519] ? wait_woken+0x5b0/0x5b0 [ 328.805336] tcp_recvmsg+0x1d10/0x4aa0 [ 328.809316] ? inet_recvmsg+0xaf/0x6c0 [ 328.813223] ? tcp_mmap+0x150/0x150 [ 328.816848] inet_recvmsg+0x5b8/0x6c0 [ 328.820661] sock_recvmsg+0x1d1/0x230 [ 328.824458] ? inet_sendpage+0x990/0x990 [ 328.828543] ___sys_recvmsg+0x444/0xae0 [ 328.832562] ? __fdget+0x329/0x440 [ 328.836105] __se_sys_recvmsg+0x2fa/0x450 [ 328.840273] __x64_sys_recvmsg+0x4a/0x70 [ 328.844356] do_syscall_64+0xcf/0x110 [ 328.848182] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.853369] RIP: 0033:0x457569 [ 328.856564] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.875462] RSP: 002b:00007fe20f4d6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 328.883179] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 328.890456] RDX: 0000000000000100 RSI: 0000000020000240 RDI: 0000000000000003 [ 328.897718] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 328.904995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f4d76d4 [ 328.912285] R13: 00000000004c399f R14: 00000000004d5f38 R15: 00000000ffffffff [ 328.919597] Uninit was stored to memory at: [ 328.923934] kmsan_internal_chain_origin+0x136/0x240 [ 328.929028] __msan_chain_origin+0x6d/0xb0 [ 328.933257] __save_stack_trace+0x8be/0xc60 [ 328.937581] save_stack_trace+0xc6/0x110 [ 328.941648] kmsan_internal_chain_origin+0x136/0x240 [ 328.946742] kmsan_memcpy_origins+0x13d/0x190 [ 328.951234] __msan_memcpy+0x6f/0x80 [ 328.954946] pskb_expand_head+0x436/0x1d20 [ 328.959177] ___pskb_trim+0x3c9/0x1bf0 [ 328.963071] sk_filter_trim_cap+0x5ac/0xa60 [ 328.967404] tcp_v4_rcv+0x4a1b/0x6520 [ 328.971201] ip_local_deliver_finish+0x8d8/0xff0 [ 328.975949] ip_local_deliver+0x44b/0x510 [ 328.980104] ip_rcv+0x6b6/0x740 [ 328.983397] process_backlog+0x82b/0x11e0 [ 328.987541] net_rx_action+0x98f/0x1d50 [ 328.991526] __do_softirq+0x721/0xc7f [ 328.995324] [ 328.996941] Uninit was stored to memory at: [ 329.001269] kmsan_internal_chain_origin+0x136/0x240 [ 329.006370] __msan_chain_origin+0x6d/0xb0 [ 329.010618] __save_stack_trace+0x8be/0xc60 [ 329.014931] save_stack_trace+0xc6/0x110 [ 329.019003] kmsan_internal_chain_origin+0x136/0x240 [ 329.024100] kmsan_memcpy_origins+0x13d/0x190 [ 329.028594] __msan_memcpy+0x6f/0x80 [ 329.032318] pskb_expand_head+0x436/0x1d20 [ 329.036553] ___pskb_trim+0x3c9/0x1bf0 [ 329.040436] sk_filter_trim_cap+0x5ac/0xa60 [ 329.044753] tcp_v4_rcv+0x4a1b/0x6520 [ 329.048549] ip_local_deliver_finish+0x8d8/0xff0 [ 329.053304] ip_local_deliver+0x44b/0x510 [ 329.057455] ip_rcv+0x6b6/0x740 [ 329.060746] process_backlog+0x82b/0x11e0 [ 329.064906] net_rx_action+0x98f/0x1d50 [ 329.068909] __do_softirq+0x721/0xc7f [ 329.072695] [ 329.074314] Uninit was stored to memory at: [ 329.078629] kmsan_internal_chain_origin+0x136/0x240 [ 329.083773] __msan_chain_origin+0x6d/0xb0 [ 329.088032] __save_stack_trace+0x8be/0xc60 [ 329.092350] save_stack_trace+0xc6/0x110 [ 329.096418] kmsan_internal_chain_origin+0x136/0x240 [ 329.101528] kmsan_memcpy_origins+0x13d/0x190 [ 329.106034] __msan_memcpy+0x6f/0x80 [ 329.109775] pskb_expand_head+0x436/0x1d20 [ 329.114008] ___pskb_trim+0x3c9/0x1bf0 [ 329.117888] sk_filter_trim_cap+0x5ac/0xa60 [ 329.122224] tcp_v4_rcv+0x4a1b/0x6520 [ 329.126048] ip_local_deliver_finish+0x8d8/0xff0 [ 329.130797] ip_local_deliver+0x44b/0x510 [ 329.134937] ip_rcv+0x6b6/0x740 [ 329.138211] process_backlog+0x82b/0x11e0 [ 329.142367] net_rx_action+0x98f/0x1d50 [ 329.146373] __do_softirq+0x721/0xc7f [ 329.150165] [ 329.151784] Uninit was stored to memory at: [ 329.156100] kmsan_internal_chain_origin+0x136/0x240 [ 329.161199] __msan_chain_origin+0x6d/0xb0 [ 329.165435] __save_stack_trace+0x8be/0xc60 [ 329.169764] save_stack_trace+0xc6/0x110 [ 329.173818] kmsan_internal_chain_origin+0x136/0x240 [ 329.178933] kmsan_memcpy_origins+0x13d/0x190 [ 329.183469] __msan_memcpy+0x6f/0x80 [ 329.187181] pskb_expand_head+0x436/0x1d20 [ 329.191411] ___pskb_trim+0x3c9/0x1bf0 [ 329.195297] sk_filter_trim_cap+0x5ac/0xa60 [ 329.199628] tcp_v4_rcv+0x4a1b/0x6520 [ 329.203438] ip_local_deliver_finish+0x8d8/0xff0 [ 329.208186] ip_local_deliver+0x44b/0x510 [ 329.212327] ip_rcv+0x6b6/0x740 [ 329.215602] process_backlog+0x82b/0x11e0 [ 329.219741] net_rx_action+0x98f/0x1d50 [ 329.223729] __do_softirq+0x721/0xc7f [ 329.227531] [ 329.229153] Uninit was stored to memory at: [ 329.233481] kmsan_internal_chain_origin+0x136/0x240 [ 329.238592] __msan_chain_origin+0x6d/0xb0 [ 329.242819] __save_stack_trace+0x8be/0xc60 [ 329.247135] save_stack_trace+0xc6/0x110 [ 329.251197] kmsan_internal_chain_origin+0x136/0x240 [ 329.256312] kmsan_memcpy_origins+0x13d/0x190 [ 329.260815] __msan_memcpy+0x6f/0x80 [ 329.264524] pskb_expand_head+0x436/0x1d20 [ 329.268751] ___pskb_trim+0x3c9/0x1bf0 [ 329.272633] sk_filter_trim_cap+0x5ac/0xa60 [ 329.276965] tcp_v4_rcv+0x4a1b/0x6520 [ 329.280775] ip_local_deliver_finish+0x8d8/0xff0 [ 329.285536] ip_local_deliver+0x44b/0x510 [ 329.289707] ip_rcv+0x6b6/0x740 [ 329.292978] process_backlog+0x82b/0x11e0 [ 329.297117] net_rx_action+0x98f/0x1d50 [ 329.301090] __do_softirq+0x721/0xc7f [ 329.304881] [ 329.306513] Uninit was stored to memory at: [ 329.310837] kmsan_internal_chain_origin+0x136/0x240 [ 329.315962] __msan_chain_origin+0x6d/0xb0 [ 329.320195] __save_stack_trace+0x8be/0xc60 [ 329.324513] save_stack_trace+0xc6/0x110 [ 329.328593] kmsan_internal_chain_origin+0x136/0x240 [ 329.333687] kmsan_memcpy_origins+0x13d/0x190 [ 329.338202] __msan_memcpy+0x6f/0x80 [ 329.341911] pskb_expand_head+0x436/0x1d20 [ 329.346160] ___pskb_trim+0x3c9/0x1bf0 [ 329.350060] sk_filter_trim_cap+0x5ac/0xa60 [ 329.354380] tcp_v4_rcv+0x4a1b/0x6520 [ 329.358178] ip_local_deliver_finish+0x8d8/0xff0 [ 329.362925] ip_local_deliver+0x44b/0x510 [ 329.367087] ip_rcv+0x6b6/0x740 [ 329.370358] process_backlog+0x82b/0x11e0 [ 329.374496] net_rx_action+0x98f/0x1d50 [ 329.378497] __do_softirq+0x721/0xc7f [ 329.382321] [ 329.383958] Uninit was stored to memory at: [ 329.388288] kmsan_internal_chain_origin+0x136/0x240 [ 329.393384] __msan_chain_origin+0x6d/0xb0 [ 329.397630] __save_stack_trace+0x8be/0xc60 [ 329.401959] save_stack_trace+0xc6/0x110 [ 329.406026] kmsan_internal_chain_origin+0x136/0x240 [ 329.411147] kmsan_memcpy_origins+0x13d/0x190 [ 329.415635] __msan_memcpy+0x6f/0x80 [ 329.419345] pskb_expand_head+0x436/0x1d20 [ 329.423589] ___pskb_trim+0x3c9/0x1bf0 [ 329.427475] sk_filter_trim_cap+0x5ac/0xa60 [ 329.431793] tcp_v4_rcv+0x4a1b/0x6520 [ 329.435586] ip_local_deliver_finish+0x8d8/0xff0 [ 329.440335] ip_local_deliver+0x44b/0x510 [ 329.444489] ip_rcv+0x6b6/0x740 [ 329.447807] process_backlog+0x82b/0x11e0 [ 329.451945] net_rx_action+0x98f/0x1d50 [ 329.455940] __do_softirq+0x721/0xc7f [ 329.459738] [ 329.461359] Local variable description: ----opt@ip6_tnl_xmit [ 329.467148] Variable was created at: [ 329.470855] ip6_tnl_xmit+0x163/0x4530 [ 329.474749] ip6_tnl_start_xmit+0x218c/0x24a0 08:08:04 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) 08:08:04 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) dup2(r1, r0) 08:08:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) 08:08:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008d00)=""/130, &(0x7f0000008dc0)=0x82) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000000100)}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005340)={{{@in6, @in6=@remote, 0x0, 0x3ff, 0x0, 0xc7b, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5713bb6f, 0xf2d500000}, {0x0, 0x0, 0x7, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in=@local, 0x0, 0x7f}, 0x0, @in6=@dev, 0x0, 0x0, 0x1, 0xfff, 0xfe}}, 0xe8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) write(0xffffffffffffffff, &(0x7f0000000080), 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f00000012c0)=@nl=@unspec, 0x80) 08:08:04 executing program 5: syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c997584240d9fc66420fe2e33e0f111042e31cd319c44129658f0e000000") r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000200)={@ipv4={[], [], @loopback}}, 0x14) [ 329.645124] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 08:08:04 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000500)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x91, &(0x7f0000000180)=""/145}, &(0x7f0000000400)="047e5ace3c21", &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000300)}) 08:08:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000d80), 0x0) 08:08:04 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001640)=""/169, 0xa9}], 0x1}}], 0x1, 0x0, &(0x7f0000008bc0)={0x77359400}) 08:08:05 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file1\x00', 0x0) 08:08:05 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000157, 0x0) 08:08:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x8002a0ffffffff, 0x22, 0xd7, &(0x7f0000000080)="3c08000000f08b41637c2fee86ddfb495a2c3a5bb68432c030f4a4cf72b2172f23ec", &(0x7f0000000240)=""/215, 0x400}, 0x28) 08:08:05 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)=@ethtool_regs={0x4, 0x0, 0x35, "06ec3d39c9cff9cb15b78ebefd85a3fed10af5f8367a2d315263e79ad1ca8adc13baa176218d6ef796d9ecf8a3250b5ec60a4769f4"}}) 08:08:05 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:05 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000000)) 08:08:06 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:06 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x21, &(0x7f0000001680)={'security\x00'}, &(0x7f0000000580)=0x54) 08:08:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1000000000000279, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000157, 0x0) 08:08:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 08:08:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000180)) 08:08:06 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:06 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3f) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10012, r1, 0x0) fstat(r1, &(0x7f00000003c0)) 08:08:06 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) 08:08:06 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000240), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) set_thread_area(&(0x7f0000000180)={0x0, 0x100000, 0x0, 0x0, 0x2, 0x8a, 0x38a7ba40, 0x3, 0x6, 0x2ab000000000000}) sendto$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000022c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000012c0), &(0x7f0000001300)=0xc) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) 08:08:07 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='\\'], 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x2000}]) 08:08:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00') 08:08:07 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:07 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) dup2(r0, r1) 08:08:07 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:07 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) dup2(r0, r1) 08:08:07 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 08:08:07 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='\\'], 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x2000}]) [ 333.155418] netlink: 'syz-executor0': attribute type 2 has an invalid length. 08:08:08 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x15, 0x5, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 08:08:08 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) dup2(r0, r1) 08:08:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) pause() 08:08:08 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, r1) fcntl$getownex(r2, 0x10, &(0x7f00000006c0)={0x0, 0x0}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) [ 333.698974] ptrace attach of "/root/syz-executor0"[6693] was attempted by "/root/syz-executor0"[8676] 08:08:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={"0000000000000000000000000200", 0x20000005005}) write$tun(r0, &(0x7f0000000080)={@void, @val={0x89ffffff}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0xfcb3) 08:08:08 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) [ 333.741166] ptrace attach of "/root/syz-executor0"[6693] was attempted by "/root/syz-executor0"[8676] 08:08:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) dup2(r0, r1) 08:08:09 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e26}, 0x1c) 08:08:09 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:09 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:09 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0xc) 08:08:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 08:08:09 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:09 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:09 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:10 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)) 08:08:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:10 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:10 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {}, r1}}, 0x48) 08:08:10 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:10 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:10 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001640)=""/169, 0xa9}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, &(0x7f0000008bc0)={0x77359400}) 08:08:10 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) 08:08:10 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:11 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:11 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:11 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:11 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:11 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:11 executing program 3: 08:08:11 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:11 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001640)=""/169, 0xa9}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, &(0x7f0000008bc0)={0x77359400}) 08:08:12 executing program 3: 08:08:12 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:12 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:12 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:12 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:12 executing program 3: 08:08:12 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:12 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) 08:08:12 executing program 3: 08:08:12 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:12 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:13 executing program 0: 08:08:13 executing program 3: 08:08:13 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:13 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:13 executing program 4: socket$inet6(0xa, 0x803, 0x3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:13 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:13 executing program 3: 08:08:13 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:13 executing program 4: socket$inet6(0xa, 0x803, 0x3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:13 executing program 0: 08:08:13 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:14 executing program 3: 08:08:14 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:14 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:08:14 executing program 0: 08:08:14 executing program 3: 08:08:14 executing program 4: socket$inet6(0xa, 0x803, 0x3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:14 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:14 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:14 executing program 3: 08:08:14 executing program 2: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000340)='gre0\x00', 0x4}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) ioctl$KDSETMODE(r0, 0x4b3a, 0x4) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r4) ioctl$int_in(r5, 0x0, &(0x7f00000001c0)=0x2) sendmmsg$unix(r5, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r7]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r6, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000680)={0x7}, 0xffffff50) execveat(r3, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='/dev/loop-control\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000700)={'syz', 0x2}, &(0x7f0000000740)="e52600", 0xfffffffffffffffc) open(&(0x7f0000000540)='./file0/file0\x00', 0x200000, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x0, @local}, &(0x7f0000000440)=0x10, 0x0) write$P9_RSTATu(r3, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES32], 0x8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@local}, &(0x7f00000003c0)=0xd) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) getpgrp(0xffffffffffffffff) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000b97000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) r9 = dup2(r8, r8) write$apparmor_exec(r9, &(0x7f0000000000)={'exec ', ')em1eth0security\x00'}, 0x16) getsockopt$sock_buf(r8, 0x1, 0x3f, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xfffffffffffffe50) 08:08:14 executing program 0: 08:08:14 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:15 executing program 3: 08:08:15 executing program 0: 08:08:15 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:15 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:15 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:15 executing program 3: 08:08:15 executing program 0: 08:08:15 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:15 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:16 executing program 2: 08:08:16 executing program 3: 08:08:16 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:16 executing program 0: 08:08:16 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:16 executing program 0: 08:08:16 executing program 2: 08:08:16 executing program 3: 08:08:16 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:17 executing program 2: 08:08:17 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:17 executing program 0: 08:08:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:17 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:17 executing program 3: 08:08:17 executing program 0: 08:08:17 executing program 2: 08:08:17 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:17 executing program 0: 08:08:17 executing program 3: 08:08:17 executing program 2: 08:08:17 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:18 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:18 executing program 0: 08:08:18 executing program 2: 08:08:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:18 executing program 3: 08:08:18 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:18 executing program 0: 08:08:18 executing program 2: 08:08:18 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:18 executing program 3: 08:08:19 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:19 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:19 executing program 3: 08:08:19 executing program 2: 08:08:19 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:19 executing program 0: 08:08:19 executing program 2: 08:08:19 executing program 3: 08:08:19 executing program 0: 08:08:19 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:19 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:19 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:20 executing program 2: 08:08:20 executing program 3: 08:08:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:20 executing program 0: 08:08:20 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:20 executing program 2: 08:08:20 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:20 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) 08:08:20 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:20 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)) 08:08:21 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000001ff0)={0x77359400}, &(0x7f0000000000), 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xe) 08:08:21 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:21 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='vboxnet0GPL.-\x00') 08:08:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:21 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:21 executing program 0: 08:08:21 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:21 executing program 2: 08:08:21 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xffffff94) ioctl$SG_GET_REQUEST_TABLE(r1, 0x227c, &(0x7f0000000700)) 08:08:21 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:21 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:22 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffd54, &(0x7f00000000c0)=0x9) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 08:08:22 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:22 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000001c0)="99acf474000000007f") 08:08:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) [ 347.456750] autofs4:pid:9159:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1962192025.0), cmd(0x0000937e) [ 347.470389] autofs4:pid:9159:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 08:08:22 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:22 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:22 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227e, &(0x7f0000000700)) 08:08:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r0}}, 0x18) 08:08:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:23 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) lremovexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00') 08:08:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:23 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:23 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x14a, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$unix(r0, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 08:08:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:23 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) [ 348.445766] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! 08:08:23 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 08:08:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:23 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x8) 08:08:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:24 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:24 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:24 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:24 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:25 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:25 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:25 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = memfd_create(&(0x7f0000000240)="00000600000000000000", 0x3) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:08:25 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:25 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:26 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:26 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000080), 0x100000010a000201) 08:08:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:26 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:26 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2275, &(0x7f0000000700)) 08:08:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) 08:08:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:27 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000500)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x0, 0x91, &(0x7f0000000180)=""/145}, &(0x7f0000000400)="047e5ace3c21", &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000300)}) 08:08:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080), 0x0) 08:08:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:28 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, "", 0x30}]}, 0x2) 08:08:28 executing program 3: r0 = memfd_create(&(0x7f0000000380)="656d3076626f786e657430a900", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600f0ffffffffffffff00000003004d7b"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) clock_gettime(0x0, &(0x7f0000000180)) 08:08:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:28 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 353.461364] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 353.469107] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:28 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 353.708734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x5452, &(0x7f0000000500)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:28 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:29 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 354.050883] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 354.058522] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 354.186811] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:29 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:29 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 354.624166] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 354.631634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:29 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) [ 354.932921] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:30 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 355.198692] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 355.340381] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 355.348247] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x5452, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000400), &(0x7f0000000000)=""/56, 0x0, 0x0, 0x0, &(0x7f0000000240)}) 08:08:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:30 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[]}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:30 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='highspeed\x00', 0xa) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) 08:08:31 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 356.239567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:31 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:31 executing program 3: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:31 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 356.684628] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 356.692087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b000102000000"], 0x8}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:31 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:32 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:32 executing program 3: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 357.167811] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_getres(0x0, &(0x7f0000000080)) 08:08:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:32 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b00010200000000004000"], 0xc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:32 executing program 3: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:32 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 357.759350] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 08:08:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:33 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b000102000000000040000000"], 0xe}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:33 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 358.240296] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:33 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 358.529869] __nla_parse: 7 callbacks suppressed [ 358.529898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:33 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40286608, 0x20000001) 08:08:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b00010200000000004000000000"], 0xf}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:08:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 358.784452] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 358.791931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) [ 359.030841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:34 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') readv(r0, &(0x7f00000f9000)=[{&(0x7f0000242000)=""/2560, 0xa00}], 0x1) 08:08:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:34 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 359.432561] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 359.440066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREAD(r1, &(0x7f0000000240)={0x82, 0x75, 0x0, {0x77, "5557a73228215840b61d1bcbd515b4edfcc5e63b23ec709c1d67e037ad1ecfb3042206ccaa91a5757077cebec12e1da4bb147317d3afd3c11f2f3cd738a5472e5d1d32f5901680ffa6b6c0a594b1a33681b55889c68ac0bfdefd19d98db88758adf709bb22eb3f56def4d9b57afce0423942806539b5e0"}}, 0x82) read(r0, &(0x7f00000000c0)=""/18, 0x12) sendto$inet(r1, &(0x7f0000000300)='*', 0x1, 0x0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) [ 359.607392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:35 executing program 1: 08:08:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREAD(r1, &(0x7f0000000240)={0x82, 0x75, 0x0, {0x77, "5557a73228215840b61d1bcbd515b4edfcc5e63b23ec709c1d67e037ad1ecfb3042206ccaa91a5757077cebec12e1da4bb147317d3afd3c11f2f3cd738a5472e5d1d32f5901680ffa6b6c0a594b1a33681b55889c68ac0bfdefd19d98db88758adf709bb22eb3f56def4d9b57afce0423942806539b5e0"}}, 0x82) read(r0, &(0x7f00000000c0)=""/18, 0x12) sendto$inet(r1, &(0x7f0000000300)='*', 0x1, 0x0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) [ 360.340042] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 360.347735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:35 executing program 1: [ 360.424898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:08:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:35 executing program 1: 08:08:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 361.069494] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 361.116558] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 361.124448] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREAD(r1, &(0x7f0000000240)={0x82, 0x75, 0x0, {0x77, "5557a73228215840b61d1bcbd515b4edfcc5e63b23ec709c1d67e037ad1ecfb3042206ccaa91a5757077cebec12e1da4bb147317d3afd3c11f2f3cd738a5472e5d1d32f5901680ffa6b6c0a594b1a33681b55889c68ac0bfdefd19d98db88758adf709bb22eb3f56def4d9b57afce0423942806539b5e0"}}, 0x82) read(r0, &(0x7f00000000c0)=""/18, 0x12) sendto$inet(r1, &(0x7f0000000300)='*', 0x1, 0x0, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) 08:08:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:36 executing program 1: 08:08:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 361.674314] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 361.681946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 361.790919] not chained 80000 origins [ 361.794800] CPU: 1 PID: 9664 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 361.802007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.811376] Call Trace: [ 361.813975] [ 361.816175] dump_stack+0x32d/0x480 [ 361.819851] kmsan_internal_chain_origin+0x222/0x240 [ 361.825015] ? save_stack_trace+0xc6/0x110 [ 361.829278] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 361.834415] ? kmsan_internal_chain_origin+0x90/0x240 [ 361.839647] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 361.845122] ? in_task_stack+0x12c/0x210 [ 361.849233] ? get_stack_info+0x206/0x220 [ 361.853418] __msan_chain_origin+0x6d/0xb0 [ 361.857690] ? do_syscall_64+0xcf/0x110 [ 361.861694] __save_stack_trace+0x8be/0xc60 [ 361.866072] ? do_syscall_64+0xcf/0x110 [ 361.870078] save_stack_trace+0xc6/0x110 [ 361.874186] kmsan_internal_chain_origin+0x136/0x240 [ 361.879322] ? ip_finish_output+0xd93/0x10f0 [ 361.883769] ? vfs_write+0x4a3/0x8f0 08:08:36 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 361.887512] ? kmsan_internal_chain_origin+0x136/0x240 [ 361.892816] ? kmsan_memcpy_origins+0x13d/0x190 [ 361.897506] ? __msan_memcpy+0x6f/0x80 [ 361.901416] ? pskb_expand_head+0x436/0x1d20 [ 361.905849] ? ___pskb_trim+0x3c9/0x1bf0 [ 361.909943] ? sk_filter_trim_cap+0x5ac/0xa60 [ 361.914471] ? tcp_v4_rcv+0x4a1b/0x6520 [ 361.918471] ? ip_local_deliver_finish+0x8d8/0xff0 [ 361.923430] ? ip_local_deliver+0x44b/0x510 [ 361.927776] ? ip_rcv+0x6b6/0x740 [ 361.931262] ? process_backlog+0x82b/0x11e0 [ 361.935607] ? net_rx_action+0x98f/0x1d50 [ 361.939778] ? __do_softirq+0x721/0xc7f [ 361.943801] ? do_softirq_own_stack+0x49/0x80 [ 361.948320] ? __local_bh_enable_ip+0x228/0x260 [ 361.953012] ? local_bh_enable+0x36/0x40 [ 361.957098] ? ip_finish_output2+0x1430/0x1560 [ 361.961703] ? ip_finish_output+0xd93/0x10f0 [ 361.966133] ? ip_output+0x55c/0x630 [ 361.969876] ? __ip_queue_xmit+0x1bb5/0x2170 [ 361.974305] ? ip_queue_xmit+0xcc/0xf0 [ 361.978223] ? __tcp_transmit_skb+0x425c/0x5e00 [ 361.982921] ? tcp_write_xmit+0x389a/0xacc0 08:08:37 executing program 1: [ 361.987276] ? __tcp_push_pending_frames+0x124/0x4e0 [ 361.992399] ? tcp_push+0x989/0xa60 [ 361.996048] ? tcp_sendmsg_locked+0x5f37/0x6c30 [ 362.000746] ? tcp_sendmsg+0xb2/0x100 [ 362.004583] ? inet_sendmsg+0x4e9/0x800 [ 362.008584] ? sock_write_iter+0x3f4/0x4f0 [ 362.012843] ? __vfs_write+0x888/0xb80 [ 362.016755] ? vfs_write+0x4a3/0x8f0 [ 362.020501] ? __se_sys_write+0x17a/0x370 [ 362.024674] ? __x64_sys_write+0x4a/0x70 [ 362.028767] ? do_syscall_64+0xcf/0x110 [ 362.032774] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.038199] ? __msan_get_context_state+0x9/0x20 [ 362.042983] ? INIT_INT+0xc/0x30 [ 362.046376] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 362.051789] kmsan_memcpy_origins+0x13d/0x190 [ 362.056326] __msan_memcpy+0x6f/0x80 [ 362.060081] pskb_expand_head+0x436/0x1d20 [ 362.064393] ___pskb_trim+0x3c9/0x1bf0 [ 362.068347] sk_filter_trim_cap+0x5ac/0xa60 [ 362.072724] tcp_v4_rcv+0x4a1b/0x6520 [ 362.076632] ? tcp_filter+0x260/0x260 [ 362.079476] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 362.080461] ip_local_deliver_finish+0x8d8/0xff0 [ 362.080512] ? nf_hook_slow+0x36f/0x3d0 [ 362.080552] ip_local_deliver+0x44b/0x510 [ 362.080591] ? ip_local_deliver+0x510/0x510 [ 362.080613] ? ip_call_ra_chain+0x7a0/0x7a0 [ 362.080639] ip_rcv+0x6b6/0x740 [ 362.080674] ? ip_rcv_core+0x1370/0x1370 [ 362.080712] process_backlog+0x82b/0x11e0 [ 362.121040] ? ip_local_deliver_finish+0xff0/0xff0 [ 362.126026] ? rps_trigger_softirq+0x2e0/0x2e0 [ 362.130639] net_rx_action+0x98f/0x1d50 [ 362.134670] ? net_tx_action+0xf20/0xf20 [ 362.138753] __do_softirq+0x721/0xc7f 08:08:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 362.142608] do_softirq_own_stack+0x49/0x80 [ 362.146956] [ 362.149231] __local_bh_enable_ip+0x228/0x260 [ 362.153757] local_bh_enable+0x36/0x40 [ 362.157678] ip_finish_output2+0x1430/0x1560 [ 362.162138] ip_finish_output+0xd93/0x10f0 [ 362.166430] ip_output+0x55c/0x630 [ 362.170015] ? ip_mc_finish_output+0x440/0x440 [ 362.174626] ? ip_finish_output+0x10f0/0x10f0 [ 362.179146] __ip_queue_xmit+0x1bb5/0x2170 [ 362.183426] ? kmsan_set_origin+0x7f/0x100 [ 362.187751] ip_queue_xmit+0xcc/0xf0 08:08:37 executing program 1: [ 362.191511] ? dst_hold_safe+0x5d0/0x5d0 [ 362.195604] __tcp_transmit_skb+0x425c/0x5e00 [ 362.200198] tcp_write_xmit+0x389a/0xacc0 [ 362.204436] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 362.209963] __tcp_push_pending_frames+0x124/0x4e0 [ 362.214936] tcp_push+0x989/0xa60 [ 362.218444] tcp_sendmsg_locked+0x5f37/0x6c30 [ 362.223073] tcp_sendmsg+0xb2/0x100 [ 362.226743] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 362.231466] inet_sendmsg+0x4e9/0x800 [ 362.235295] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 362.240677] ? security_socket_sendmsg+0x1bd/0x200 [ 362.245639] ? inet_getname+0x490/0x490 [ 362.249632] sock_write_iter+0x3f4/0x4f0 [ 362.253731] ? sock_read_iter+0x4e0/0x4e0 [ 362.257898] __vfs_write+0x888/0xb80 [ 362.261662] vfs_write+0x4a3/0x8f0 [ 362.265242] __se_sys_write+0x17a/0x370 [ 362.269256] __x64_sys_write+0x4a/0x70 [ 362.273172] do_syscall_64+0xcf/0x110 [ 362.276998] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.282207] RIP: 0033:0x457569 [ 362.285419] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.304336] RSP: 002b:00007f6989c4ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.312062] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 362.319347] RDX: 0000000000000082 RSI: 0000000020000240 RDI: 0000000000000004 [ 362.326629] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 362.333914] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c4b6d4 [ 362.341198] R13: 00000000004c5a08 R14: 00000000004d9b98 R15: 00000000ffffffff [ 362.348504] Uninit was stored to memory at: [ 362.352855] kmsan_internal_chain_origin+0x136/0x240 [ 362.357974] __msan_chain_origin+0x6d/0xb0 [ 362.362232] __save_stack_trace+0x8be/0xc60 [ 362.366565] save_stack_trace+0xc6/0x110 [ 362.370639] kmsan_internal_chain_origin+0x136/0x240 [ 362.375758] kmsan_memcpy_origins+0x13d/0x190 [ 362.380269] __msan_memcpy+0x6f/0x80 [ 362.383999] pskb_expand_head+0x436/0x1d20 [ 362.388248] ___pskb_trim+0x3c9/0x1bf0 [ 362.392153] sk_filter_trim_cap+0x5ac/0xa60 [ 362.396509] tcp_v4_rcv+0x4a1b/0x6520 [ 362.400325] ip_local_deliver_finish+0x8d8/0xff0 [ 362.405093] ip_local_deliver+0x44b/0x510 [ 362.409252] ip_rcv+0x6b6/0x740 [ 362.412548] process_backlog+0x82b/0x11e0 [ 362.416711] net_rx_action+0x98f/0x1d50 [ 362.420697] __do_softirq+0x721/0xc7f [ 362.424497] [ 362.426128] Uninit was stored to memory at: [ 362.430475] kmsan_internal_chain_origin+0x136/0x240 [ 362.435803] __msan_chain_origin+0x6d/0xb0 [ 362.440069] __save_stack_trace+0x8be/0xc60 [ 362.444408] save_stack_trace+0xc6/0x110 [ 362.448483] kmsan_internal_chain_origin+0x136/0x240 [ 362.453602] kmsan_memcpy_origins+0x13d/0x190 [ 362.458114] __msan_memcpy+0x6f/0x80 [ 362.461847] pskb_expand_head+0x436/0x1d20 [ 362.466097] ___pskb_trim+0x3c9/0x1bf0 [ 362.470000] sk_filter_trim_cap+0x5ac/0xa60 [ 362.474348] tcp_v4_rcv+0x4a1b/0x6520 [ 362.478172] ip_local_deliver_finish+0x8d8/0xff0 [ 362.482938] ip_local_deliver+0x44b/0x510 [ 362.487094] ip_rcv+0x6b6/0x740 [ 362.490393] process_backlog+0x82b/0x11e0 [ 362.494557] net_rx_action+0x98f/0x1d50 [ 362.498543] __do_softirq+0x721/0xc7f [ 362.502346] [ 362.503982] Uninit was stored to memory at: [ 362.508325] kmsan_internal_chain_origin+0x136/0x240 [ 362.513442] __msan_chain_origin+0x6d/0xb0 [ 362.517690] __save_stack_trace+0x8be/0xc60 [ 362.522025] save_stack_trace+0xc6/0x110 [ 362.526102] kmsan_internal_chain_origin+0x136/0x240 [ 362.531217] kmsan_memcpy_origins+0x13d/0x190 [ 362.535730] __msan_memcpy+0x6f/0x80 [ 362.539458] pskb_expand_head+0x436/0x1d20 [ 362.543708] ___pskb_trim+0x3c9/0x1bf0 [ 362.547610] sk_filter_trim_cap+0x5ac/0xa60 [ 362.551941] tcp_v4_rcv+0x4a1b/0x6520 [ 362.555758] ip_local_deliver_finish+0x8d8/0xff0 [ 362.560532] ip_local_deliver+0x44b/0x510 [ 362.564694] ip_rcv+0x6b6/0x740 [ 362.567989] process_backlog+0x82b/0x11e0 [ 362.572165] net_rx_action+0x98f/0x1d50 [ 362.576169] __do_softirq+0x721/0xc7f [ 362.579972] [ 362.581794] Uninit was stored to memory at: [ 362.586140] kmsan_internal_chain_origin+0x136/0x240 [ 362.591269] __msan_chain_origin+0x6d/0xb0 [ 362.595517] __save_stack_trace+0x8be/0xc60 [ 362.599853] save_stack_trace+0xc6/0x110 [ 362.603929] kmsan_internal_chain_origin+0x136/0x240 [ 362.609047] kmsan_memcpy_origins+0x13d/0x190 [ 362.613557] __msan_memcpy+0x6f/0x80 [ 362.617287] pskb_expand_head+0x436/0x1d20 [ 362.621538] ___pskb_trim+0x3c9/0x1bf0 [ 362.625439] sk_filter_trim_cap+0x5ac/0xa60 [ 362.629773] tcp_v4_rcv+0x4a1b/0x6520 [ 362.633592] ip_local_deliver_finish+0x8d8/0xff0 [ 362.638359] ip_local_deliver+0x44b/0x510 [ 362.642515] ip_rcv+0x6b6/0x740 [ 362.645813] process_backlog+0x82b/0x11e0 [ 362.649973] net_rx_action+0x98f/0x1d50 [ 362.653961] __do_softirq+0x721/0xc7f [ 362.657767] [ 362.659403] Uninit was stored to memory at: [ 362.663744] kmsan_internal_chain_origin+0x136/0x240 [ 362.668868] __msan_chain_origin+0x6d/0xb0 [ 362.673119] __save_stack_trace+0x8be/0xc60 [ 362.677462] save_stack_trace+0xc6/0x110 [ 362.681536] kmsan_internal_chain_origin+0x136/0x240 [ 362.686650] kmsan_memcpy_origins+0x13d/0x190 [ 362.691170] __msan_memcpy+0x6f/0x80 [ 362.694905] pskb_expand_head+0x436/0x1d20 [ 362.699153] ___pskb_trim+0x3c9/0x1bf0 [ 362.703067] sk_filter_trim_cap+0x5ac/0xa60 [ 362.707399] tcp_v4_rcv+0x4a1b/0x6520 [ 362.711212] ip_local_deliver_finish+0x8d8/0xff0 [ 362.715981] ip_local_deliver+0x44b/0x510 [ 362.720138] ip_rcv+0x6b6/0x740 [ 362.723442] process_backlog+0x82b/0x11e0 [ 362.727604] net_rx_action+0x98f/0x1d50 [ 362.731589] __do_softirq+0x721/0xc7f [ 362.735389] [ 362.737024] Uninit was stored to memory at: [ 362.741365] kmsan_internal_chain_origin+0x136/0x240 [ 362.746486] __msan_chain_origin+0x6d/0xb0 [ 362.750735] __save_stack_trace+0x8be/0xc60 [ 362.755074] save_stack_trace+0xc6/0x110 [ 362.759150] kmsan_internal_chain_origin+0x136/0x240 [ 362.764277] kmsan_memcpy_origins+0x13d/0x190 [ 362.768791] __msan_memcpy+0x6f/0x80 [ 362.772520] pskb_expand_head+0x436/0x1d20 [ 362.776773] ___pskb_trim+0x3c9/0x1bf0 [ 362.780682] sk_filter_trim_cap+0x5ac/0xa60 [ 362.785016] tcp_v4_rcv+0x4a1b/0x6520 [ 362.788829] ip_local_deliver_finish+0x8d8/0xff0 [ 362.793597] ip_local_deliver+0x44b/0x510 [ 362.797752] ip_rcv+0x6b6/0x740 [ 362.801052] process_backlog+0x82b/0x11e0 [ 362.805218] net_rx_action+0x98f/0x1d50 [ 362.809205] __do_softirq+0x721/0xc7f [ 362.813011] [ 362.814641] Uninit was stored to memory at: [ 362.818978] kmsan_internal_chain_origin+0x136/0x240 [ 362.824095] __msan_chain_origin+0x6d/0xb0 [ 362.828348] __save_stack_trace+0x8be/0xc60 [ 362.832687] save_stack_trace+0xc6/0x110 [ 362.836762] kmsan_internal_chain_origin+0x136/0x240 [ 362.841882] kmsan_memcpy_origins+0x13d/0x190 [ 362.846393] __msan_memcpy+0x6f/0x80 [ 362.850126] pskb_expand_head+0x436/0x1d20 [ 362.854381] ___pskb_trim+0x3c9/0x1bf0 [ 362.858281] sk_filter_trim_cap+0x5ac/0xa60 [ 362.862619] tcp_v4_rcv+0x4a1b/0x6520 [ 362.866431] ip_local_deliver_finish+0x8d8/0xff0 [ 362.871222] ip_local_deliver+0x44b/0x510 [ 362.875379] ip_rcv+0x6b6/0x740 [ 362.878671] process_backlog+0x82b/0x11e0 [ 362.882837] net_rx_action+0x98f/0x1d50 [ 362.886827] __do_softirq+0x721/0xc7f [ 362.890632] [ 362.892274] Local variable description: ----v.addr.i.i.i.i.i.i.i.i.i@validate_xmit_skb [ 362.900328] Variable was created at: [ 362.904052] validate_xmit_skb+0xb1/0x1780 [ 362.908306] validate_xmit_skb_list+0x17b/0x380 08:08:38 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:38 executing program 4: 08:08:38 executing program 0: 08:08:38 executing program 1: 08:08:38 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:38 executing program 4: 08:08:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 363.713511] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 363.721233] __nla_parse: 3 callbacks suppressed [ 363.721258] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:38 executing program 4: 08:08:38 executing program 1: 08:08:38 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = memfd_create(&(0x7f0000000240)="00000600000000000000", 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:08:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="7026f2c5", 0x4) sendmmsg(r1, &(0x7f0000000080)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x0, 0x0, @loopback}, 0x259, &(0x7f00008e3fb8)}}, {{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000632000), 0x222}}], 0x2, 0x0) [ 364.160529] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:39 executing program 0: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) 08:08:39 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:39 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 08:08:39 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 364.621435] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 364.629112] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 364.743322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') readv(r0, &(0x7f00000f9000)=[{&(0x7f0000242000)=""/2560, 0xa00}], 0x1) readv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/176, 0xb0}], 0x1) 08:08:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:40 executing program 4: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', "e91f7189591e9233614b"}, 0xe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 08:08:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000e9d96659000000000003003e000039a594349c1fd83d00000840000000000000000000000000000000000000000000380053"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:08:40 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:40 executing program 3: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 365.245259] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:40 executing program 0: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000e9d96659000000000003003e000039a594349c1fd83d00000840000000000000000000000000000000000000000000380053"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 365.286733] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 365.294578] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:40 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, &(0x7f0000000000), 0x8) 08:08:40 executing program 3: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 365.678719] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 365.746490] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 365.754306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x2000}]) 08:08:41 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:41 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000004, 0x700, 0xa000000, 0xc0fe, 0x1000000fe800000, 0x0, 0x0, 0x100000000000000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000"], 0x18}, 0x0) 08:08:41 executing program 3: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:08:41 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 366.153505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 366.334743] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 366.342393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:41 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb34f68c6487f", 0xb2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:08:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:41 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:41 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 366.733765] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:41 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) dup3(r1, r0, 0x0) [ 366.955569] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:42 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:42 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb34f68c6487f", 0xb2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 367.359921] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 367.410016] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:42 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 367.801882] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 367.848260] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x10, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) 08:08:43 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:43 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:43 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 368.213197] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 368.346537] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:43 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:43 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:43 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffd54, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 368.731843] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 368.739651] __nla_parse: 9 callbacks suppressed [ 368.739677] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 368.755839] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 368.915443] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:08:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:45 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:45 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 370.163844] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 370.175901] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 370.183530] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:45 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 370.702797] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 370.710428] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 370.814180] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.857908] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:46 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:46 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:46 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 371.217864] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:46 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:46 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 371.411642] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 371.419427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 371.436974] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:46 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:46 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 371.676678] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 371.760345] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 371.768214] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 371.817519] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 08:08:46 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:46 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 372.030156] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:08:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 372.095970] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 372.134703] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:47 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:47 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:47 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 372.645226] vhci_hcd: default hub control req: 0800 v0000 i0000 l0 08:08:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:47 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 372.815245] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:48 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 373.033812] vhci_hcd: default hub control req: 0800 v0000 i0000 l0 [ 373.099905] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.153873] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) 08:08:48 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:48 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 373.533772] vhci_hcd: default hub control req: 0800 v0000 i0000 l0 [ 373.615433] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:48 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:48 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:48 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:48 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:49 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 374.060105] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 374.067856] __nla_parse: 7 callbacks suppressed [ 374.067881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:49 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 374.508725] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 374.516476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 08:08:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:49 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:49 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 374.835426] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 374.903244] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:08:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) 08:08:50 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:08:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:50 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:50 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 375.409782] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 375.478852] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:08:50 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) 08:08:50 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:51 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) [ 376.022084] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:08:51 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:51 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xab11, 0x0) [ 376.323691] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:51 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 08:08:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 08:08:51 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) 08:08:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:51 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:51 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) [ 376.989146] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:52 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:52 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) 08:08:52 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 08:08:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 377.584416] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:54 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 08:08:54 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:54 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:54 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{}], 0x1}, 0x0) 08:08:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:54 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 379.878057] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:55 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:55 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 08:08:55 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) [ 380.160502] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 380.189038] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:55 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 08:08:55 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 08:08:55 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 380.557040] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 380.582006] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:55 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 08:08:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:08:57 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 08:08:57 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:08:57 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:08:57 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) [ 383.048229] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 383.063588] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:08:58 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 08:08:58 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 08:08:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:08:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 383.462873] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 383.543272] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:08:58 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:08:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 383.849329] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:01 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 08:09:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:09:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:01 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 386.103907] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:01 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 08:09:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:09:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 386.455634] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 386.574042] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:01 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 08:09:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) [ 386.800686] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 08:09:04 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 08:09:04 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:04 executing program 0: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 389.261113] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 389.273234] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 389.287139] not chained 90000 origins [ 389.291000] CPU: 1 PID: 10355 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 389.298298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.307673] Call Trace: [ 389.310304] dump_stack+0x32d/0x480 [ 389.313993] kmsan_internal_chain_origin+0x222/0x240 [ 389.319282] ? save_stack_trace+0xc6/0x110 [ 389.323596] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 389.328735] ? kmsan_internal_chain_origin+0x90/0x240 [ 389.333976] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 389.339387] ? is_bpf_text_address+0x49e/0x4d0 [ 389.344024] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 389.349506] ? in_task_stack+0x12c/0x210 [ 389.353609] __msan_chain_origin+0x6d/0xb0 08:09:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) [ 389.357888] ? tcp_sendmsg_locked+0x6655/0x6c30 [ 389.362586] __save_stack_trace+0x8be/0xc60 [ 389.366969] ? tcp_sendmsg_locked+0x6655/0x6c30 [ 389.371679] save_stack_trace+0xc6/0x110 [ 389.375782] kmsan_internal_chain_origin+0x136/0x240 [ 389.380925] ? do_syscall_64+0xcf/0x110 [ 389.385059] ? kmsan_internal_chain_origin+0x136/0x240 [ 389.390372] ? kmsan_memcpy_origins+0x13d/0x190 [ 389.395076] ? __msan_memcpy+0x6f/0x80 [ 389.399004] ? skb_copy_bits+0x1d2/0xc90 [ 389.403105] ? skb_copy+0x56c/0xba0 [ 389.406764] ? tcp_send_synack+0x7a3/0x18f0 [ 389.411133] ? tcp_rcv_state_process+0x275d/0x6c60 [ 389.416120] ? tcp_v6_do_rcv+0x112b/0x21b0 [ 389.420387] ? __release_sock+0x32d/0x750 [ 389.424570] ? release_sock+0x99/0x2a0 [ 389.428495] ? __inet_stream_connect+0xdff/0x15d0 [ 389.433369] ? tcp_sendmsg_locked+0x6655/0x6c30 [ 389.438078] ? tcp_sendmsg+0xb2/0x100 [ 389.441932] ? inet_sendmsg+0x4e9/0x800 [ 389.445936] ? __sys_sendto+0x940/0xb80 [ 389.449940] ? __se_sys_sendto+0x107/0x130 [ 389.454224] ? __x64_sys_sendto+0x6e/0x90 [ 389.458517] ? do_syscall_64+0xcf/0x110 [ 389.462527] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 389.467934] ? memcg_kmem_put_cache+0x73/0x460 [ 389.472581] ? __msan_get_context_state+0x9/0x20 [ 389.477368] ? INIT_INT+0xc/0x30 [ 389.480773] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 389.486206] ? __msan_get_context_state+0x9/0x20 [ 389.491013] kmsan_memcpy_origins+0x13d/0x190 [ 389.495558] __msan_memcpy+0x6f/0x80 [ 389.499325] skb_copy_bits+0x1d2/0xc90 [ 389.503278] skb_copy+0x56c/0xba0 [ 389.506809] tcp_send_synack+0x7a3/0x18f0 [ 389.510997] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 389.516511] tcp_rcv_state_process+0x275d/0x6c60 [ 389.521315] ? tcp_connect+0x544e/0x6220 [ 389.525456] tcp_v6_do_rcv+0x112b/0x21b0 [ 389.529578] ? tcp_v6_destroy_sock+0x60/0x60 [ 389.534018] __release_sock+0x32d/0x750 [ 389.538050] release_sock+0x99/0x2a0 [ 389.541828] __inet_stream_connect+0xdff/0x15d0 [ 389.546576] ? wait_woken+0x5b0/0x5b0 [ 389.550432] tcp_sendmsg_locked+0x6655/0x6c30 [ 389.554975] ? aa_label_sk_perm+0xda/0x960 08:09:04 executing program 0: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 389.559260] ? kmsan_set_origin+0x7f/0x100 [ 389.564042] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 389.569447] ? __msan_poison_alloca+0x1e0/0x270 [ 389.574181] ? __local_bh_enable_ip+0x46/0x260 [ 389.578856] ? __msan_poison_alloca+0x1e0/0x270 [ 389.583570] tcp_sendmsg+0xb2/0x100 [ 389.587249] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 389.591960] inet_sendmsg+0x4e9/0x800 [ 389.595807] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 389.601217] ? security_socket_sendmsg+0x1bd/0x200 [ 389.606203] ? inet_getname+0x490/0x490 [ 389.610238] __sys_sendto+0x940/0xb80 [ 389.614110] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 389.619601] ? prepare_exit_to_usermode+0x182/0x4c0 [ 389.624664] __se_sys_sendto+0x107/0x130 [ 389.628779] __x64_sys_sendto+0x6e/0x90 [ 389.632814] do_syscall_64+0xcf/0x110 [ 389.636666] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 389.641875] RIP: 0033:0x457569 [ 389.645095] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.664021] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 389.671760] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 389.679058] RDX: fffffffffffffffa RSI: 0000000020000100 RDI: 0000000000000005 [ 389.686352] RBP: 000000000072bf00 R08: 0000000020b63fe4 R09: 000000000000001c [ 389.693648] R10: 0000000020000001 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 389.700938] R13: 00000000004c407b R14: 00000000004d6910 R15: 00000000ffffffff [ 389.708242] Uninit was stored to memory at: 08:09:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 389.712589] kmsan_internal_chain_origin+0x136/0x240 [ 389.717713] __msan_chain_origin+0x6d/0xb0 [ 389.721978] __save_stack_trace+0x8be/0xc60 [ 389.726323] save_stack_trace+0xc6/0x110 [ 389.730558] kmsan_internal_chain_origin+0x136/0x240 [ 389.735686] kmsan_memcpy_origins+0x13d/0x190 [ 389.740375] __msan_memcpy+0x6f/0x80 [ 389.744128] skb_copy_bits+0x1d2/0xc90 [ 389.748051] skb_copy+0x56c/0xba0 [ 389.751533] tcp_send_synack+0x7a3/0x18f0 [ 389.755723] tcp_rcv_state_process+0x275d/0x6c60 [ 389.760510] tcp_v6_do_rcv+0x112b/0x21b0 [ 389.764597] __release_sock+0x32d/0x750 [ 389.768597] release_sock+0x99/0x2a0 [ 389.772469] __inet_stream_connect+0xdff/0x15d0 [ 389.777165] tcp_sendmsg_locked+0x6655/0x6c30 [ 389.781693] tcp_sendmsg+0xb2/0x100 [ 389.785342] inet_sendmsg+0x4e9/0x800 [ 389.789168] __sys_sendto+0x940/0xb80 [ 389.793005] __se_sys_sendto+0x107/0x130 [ 389.797093] __x64_sys_sendto+0x6e/0x90 [ 389.801092] do_syscall_64+0xcf/0x110 [ 389.804920] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 389.810116] [ 389.811760] Uninit was stored to memory at: [ 389.816114] kmsan_internal_chain_origin+0x136/0x240 [ 389.821246] __msan_chain_origin+0x6d/0xb0 [ 389.825507] __save_stack_trace+0x8be/0xc60 [ 389.829855] save_stack_trace+0xc6/0x110 [ 389.833947] kmsan_internal_chain_origin+0x136/0x240 [ 389.839077] kmsan_memcpy_origins+0x13d/0x190 [ 389.843602] __msan_memcpy+0x6f/0x80 [ 389.847343] skb_copy_bits+0x1d2/0xc90 [ 389.851256] skb_copy+0x56c/0xba0 [ 389.854736] tcp_send_synack+0x7a3/0x18f0 [ 389.858921] tcp_rcv_state_process+0x275d/0x6c60 [ 389.863706] tcp_v6_do_rcv+0x112b/0x21b0 [ 389.867793] __release_sock+0x32d/0x750 [ 389.871794] release_sock+0x99/0x2a0 [ 389.875539] __inet_stream_connect+0xdff/0x15d0 [ 389.880231] tcp_sendmsg_locked+0x6655/0x6c30 [ 389.884755] tcp_sendmsg+0xb2/0x100 [ 389.888422] inet_sendmsg+0x4e9/0x800 [ 389.892246] __sys_sendto+0x940/0xb80 [ 389.896074] __se_sys_sendto+0x107/0x130 [ 389.900159] __x64_sys_sendto+0x6e/0x90 [ 389.904169] do_syscall_64+0xcf/0x110 [ 389.908007] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 389.913209] [ 389.914852] Uninit was stored to memory at: [ 389.916650] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 389.919208] kmsan_internal_chain_origin+0x136/0x240 [ 389.919245] __msan_chain_origin+0x6d/0xb0 [ 389.934914] __save_stack_trace+0x8be/0xc60 [ 389.939265] save_stack_trace+0xc6/0x110 [ 389.943352] kmsan_internal_chain_origin+0x136/0x240 [ 389.948479] kmsan_memcpy_origins+0x13d/0x190 [ 389.952994] __msan_memcpy+0x6f/0x80 [ 389.956739] skb_copy_bits+0x1d2/0xc90 [ 389.960650] skb_copy+0x56c/0xba0 [ 389.964124] tcp_send_synack+0x7a3/0x18f0 [ 389.968403] tcp_rcv_state_process+0x275d/0x6c60 [ 389.973194] tcp_v6_do_rcv+0x112b/0x21b0 [ 389.977282] __release_sock+0x32d/0x750 [ 389.981277] release_sock+0x99/0x2a0 [ 389.985021] __inet_stream_connect+0xdff/0x15d0 [ 389.989716] tcp_sendmsg_locked+0x6655/0x6c30 [ 389.994581] tcp_sendmsg+0xb2/0x100 [ 389.998231] inet_sendmsg+0x4e9/0x800 [ 390.002061] __sys_sendto+0x940/0xb80 [ 390.005884] __se_sys_sendto+0x107/0x130 [ 390.009997] __x64_sys_sendto+0x6e/0x90 08:09:05 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) [ 390.013995] do_syscall_64+0xcf/0x110 [ 390.017831] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 390.023027] [ 390.024666] Uninit was stored to memory at: [ 390.029017] kmsan_internal_chain_origin+0x136/0x240 [ 390.034147] __msan_chain_origin+0x6d/0xb0 [ 390.038416] __save_stack_trace+0x8be/0xc60 [ 390.042759] save_stack_trace+0xc6/0x110 [ 390.046845] kmsan_internal_chain_origin+0x136/0x240 [ 390.051973] kmsan_memcpy_origins+0x13d/0x190 [ 390.056495] __msan_memcpy+0x6f/0x80 [ 390.060236] skb_copy_bits+0x1d2/0xc90 [ 390.064146] skb_copy+0x56c/0xba0 [ 390.067637] tcp_send_synack+0x7a3/0x18f0 [ 390.071815] tcp_rcv_state_process+0x275d/0x6c60 [ 390.076601] tcp_v6_do_rcv+0x112b/0x21b0 [ 390.080693] __release_sock+0x32d/0x750 [ 390.084687] release_sock+0x99/0x2a0 [ 390.088424] __inet_stream_connect+0xdff/0x15d0 [ 390.093117] tcp_sendmsg_locked+0x6655/0x6c30 [ 390.097639] tcp_sendmsg+0xb2/0x100 [ 390.101288] inet_sendmsg+0x4e9/0x800 [ 390.105116] __sys_sendto+0x940/0xb80 [ 390.108945] __se_sys_sendto+0x107/0x130 08:09:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 390.113031] __x64_sys_sendto+0x6e/0x90 [ 390.117028] do_syscall_64+0xcf/0x110 [ 390.120851] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 390.126051] [ 390.127686] Uninit was stored to memory at: [ 390.132029] kmsan_internal_chain_origin+0x136/0x240 [ 390.137156] __msan_chain_origin+0x6d/0xb0 [ 390.141429] __save_stack_trace+0x8be/0xc60 [ 390.145772] save_stack_trace+0xc6/0x110 [ 390.149861] kmsan_internal_chain_origin+0x136/0x240 [ 390.154980] kmsan_memcpy_origins+0x13d/0x190 [ 390.159500] __msan_memcpy+0x6f/0x80 [ 390.163239] skb_copy_bits+0x1d2/0xc90 [ 390.167148] skb_copy+0x56c/0xba0 [ 390.170636] tcp_send_synack+0x7a3/0x18f0 [ 390.174817] tcp_rcv_state_process+0x275d/0x6c60 [ 390.179601] tcp_v6_do_rcv+0x112b/0x21b0 [ 390.183685] __release_sock+0x32d/0x750 [ 390.187687] release_sock+0x99/0x2a0 [ 390.191425] __inet_stream_connect+0xdff/0x15d0 [ 390.196123] tcp_sendmsg_locked+0x6655/0x6c30 [ 390.200644] tcp_sendmsg+0xb2/0x100 [ 390.204309] inet_sendmsg+0x4e9/0x800 [ 390.208151] __sys_sendto+0x940/0xb80 [ 390.211986] __se_sys_sendto+0x107/0x130 [ 390.216076] __x64_sys_sendto+0x6e/0x90 [ 390.220078] do_syscall_64+0xcf/0x110 [ 390.223907] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 390.229107] [ 390.230751] Uninit was stored to memory at: [ 390.235099] kmsan_internal_chain_origin+0x136/0x240 [ 390.236244] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 390.240224] __msan_chain_origin+0x6d/0xb0 [ 390.240248] __save_stack_trace+0x8be/0xc60 [ 390.240269] save_stack_trace+0xc6/0x110 [ 390.240292] kmsan_internal_chain_origin+0x136/0x240 [ 390.240313] kmsan_memcpy_origins+0x13d/0x190 [ 390.240334] __msan_memcpy+0x6f/0x80 [ 390.240355] skb_copy_bits+0x1d2/0xc90 [ 390.240395] skb_copy+0x56c/0xba0 [ 390.280918] tcp_send_synack+0x7a3/0x18f0 [ 390.285097] tcp_rcv_state_process+0x275d/0x6c60 [ 390.289884] tcp_v6_do_rcv+0x112b/0x21b0 [ 390.293966] __release_sock+0x32d/0x750 [ 390.297964] release_sock+0x99/0x2a0 [ 390.301701] __inet_stream_connect+0xdff/0x15d0 [ 390.306421] tcp_sendmsg_locked+0x6655/0x6c30 [ 390.310947] tcp_sendmsg+0xb2/0x100 [ 390.314626] inet_sendmsg+0x4e9/0x800 [ 390.318456] __sys_sendto+0x940/0xb80 [ 390.322290] __se_sys_sendto+0x107/0x130 [ 390.326376] __x64_sys_sendto+0x6e/0x90 [ 390.330376] do_syscall_64+0xcf/0x110 [ 390.334304] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 390.339575] [ 390.341214] Uninit was stored to memory at: [ 390.345559] kmsan_internal_chain_origin+0x136/0x240 [ 390.350684] __msan_chain_origin+0x6d/0xb0 [ 390.354942] __save_stack_trace+0x8be/0xc60 [ 390.359284] save_stack_trace+0xc6/0x110 [ 390.363367] kmsan_internal_chain_origin+0x136/0x240 [ 390.368495] kmsan_memcpy_origins+0x13d/0x190 [ 390.373008] __msan_memcpy+0x6f/0x80 [ 390.376741] skb_copy_bits+0x1d2/0xc90 [ 390.380656] skb_copy+0x56c/0xba0 [ 390.384133] tcp_send_synack+0x7a3/0x18f0 [ 390.388314] tcp_rcv_state_process+0x275d/0x6c60 [ 390.393092] tcp_v6_do_rcv+0x112b/0x21b0 [ 390.397190] __release_sock+0x32d/0x750 [ 390.401198] release_sock+0x99/0x2a0 [ 390.404938] __inet_stream_connect+0xdff/0x15d0 [ 390.409627] tcp_sendmsg_locked+0x6655/0x6c30 08:09:05 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) [ 390.414148] tcp_sendmsg+0xb2/0x100 [ 390.417813] inet_sendmsg+0x4e9/0x800 [ 390.421635] __sys_sendto+0x940/0xb80 [ 390.425464] __se_sys_sendto+0x107/0x130 [ 390.429547] __x64_sys_sendto+0x6e/0x90 [ 390.433723] do_syscall_64+0xcf/0x110 [ 390.437552] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 390.442748] [ 390.444392] Local variable description: ----state.i.i@ip6_finish_output2 [ 390.451241] Variable was created at: [ 390.454983] ip6_finish_output2+0x87/0x22d0 [ 390.459336] ip6_finish_output+0xc13/0xca0 [ 390.523299] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:07 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:09:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:07 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:07 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 08:09:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xab11, 0x0) [ 392.422067] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:07 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 392.513442] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:07 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 08:09:07 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 392.727903] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:07 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:09:08 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x700}) [ 393.046903] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 393.068240] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #0 08:09:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:10 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:10 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000080)) 08:09:10 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 08:09:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) [ 395.591679] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #0 [ 395.608425] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 395.619767] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) connect$can_bcm(r0, &(0x7f0000000140), 0x10) 08:09:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:10 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) [ 395.961076] vhci_hcd: default hub control req: c000 v2000 i0000 l0 [ 395.984954] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x21, &(0x7f0000001680)={'security\x00'}, &(0x7f0000000580)=0x54) 08:09:11 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 08:09:11 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 396.273521] netlink: 'syz-executor3': attribute type 2 has an invalid length. [ 396.366942] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:09:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:13 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 08:09:13 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000000)) 08:09:13 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:13 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 398.664353] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:13 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 08:09:13 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x5, 0x12) [ 399.027428] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:14 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 08:09:14 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 399.334632] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:16 executing program 5: r0 = socket$inet6(0xa, 0x803, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000340)={0x0, 0x8d}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000580)={0x400, 0x0, 0x0, 0x9, 0x3, 0x22, 0xdbd4, 0x2}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x6c, "905c8bdbb312294a81ebd9c4179ff869a4df6e11bb664f84347ba897ed6f695161709189872f7e2160ededec320b5c4f7b8f0227f3b00f24bb6336ef4c5b72b43d37be5cf817dc422672e84c143318580fde375ff245a1dd59e0b4ed1b49c87fd5cd39237ba15280bc9ee72c"}, &(0x7f0000000400)=0x74) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r3, &(0x7f0000000300)=[{{&(0x7f0000000840)=@rc, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f00000008c0)=""/4096, 0x11e5}], 0x1}}], 0x31a, 0x0, 0x0) setsockopt$packet_int(r3, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) socket$inet6(0xa, 0x1000000000002, 0x0) 08:09:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:16 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007041dfffd946fa2830020200a000a000200001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 08:09:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:16 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 401.762944] netlink: 'syz-executor3': attribute type 2 has an invalid length. 08:09:16 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xffffffffffffffc3, 0x2000800d, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x14, 0x7000028, 0x4, 0xf401, 0x14280000000000]}, 0x10) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x389756b1353686c0, 0x120, 0x0, 0x19c) 08:09:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) [ 402.066997] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:09:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:17 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:19 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:19 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:19 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:09:19 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xffffffffffffffc3, 0x2000800d, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x14, 0x7000028, 0x4, 0xf401, 0x14280000000000]}, 0x10) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x389756b1353686c0, 0x120, 0x0, 0x19c) 08:09:19 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:20 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 405.102083] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x730068, 0x700}) 08:09:20 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:20 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 405.550374] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x730068, 0x700}) 08:09:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:21 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x10) readv(r1, &(0x7f00000026c0)=[{&(0x7f0000000080)=""/171, 0xab}], 0x1) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0x14, 0x20, 0xaff, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 08:09:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 405.934256] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x730068, 0x700}) 08:09:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(0xffffffffffffffff, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:21 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x24, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0), 0x8) 08:09:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:21 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x0, 0x700}) [ 406.619131] cgroup: fork rejected by pids controller in /syz0 08:09:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:22 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x0, 0x700}) 08:09:22 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:22 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x0, 0x700}) 08:09:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:22 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1, 0x0, 0xf}, 0x20) 08:09:24 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068}) 08:09:24 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:24 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 409.077064] not chained 100000 origins [ 409.081020] CPU: 0 PID: 10690 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 409.088332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.097732] Call Trace: [ 409.100365] dump_stack+0x32d/0x480 [ 409.104069] kmsan_internal_chain_origin+0x222/0x240 [ 409.109271] ? save_stack_trace+0xc6/0x110 [ 409.113544] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 409.118694] ? kmsan_internal_chain_origin+0x90/0x240 [ 409.123926] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 409.129322] ? is_bpf_text_address+0x49e/0x4d0 [ 409.133947] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 409.139436] ? in_task_stack+0x12c/0x210 [ 409.143550] __msan_chain_origin+0x6d/0xb0 [ 409.147820] ? kmsan_internal_chain_origin+0x136/0x240 [ 409.153131] __save_stack_trace+0x8be/0xc60 [ 409.157515] ? kmsan_internal_chain_origin+0x136/0x240 [ 409.162829] save_stack_trace+0xc6/0x110 [ 409.166946] kmsan_internal_chain_origin+0x136/0x240 [ 409.172077] ? do_syscall_64+0xcf/0x110 [ 409.176087] ? kmsan_internal_chain_origin+0x136/0x240 [ 409.181390] ? kmsan_memcpy_origins+0x13d/0x190 [ 409.186085] ? __msan_memcpy+0x6f/0x80 [ 409.190003] ? skb_copy_bits+0x1d2/0xc90 [ 409.194098] ? skb_copy+0x56c/0xba0 [ 409.197757] ? tcp_send_synack+0x7a3/0x18f0 [ 409.202109] ? tcp_rcv_state_process+0x275d/0x6c60 [ 409.207084] ? tcp_v6_do_rcv+0x112b/0x21b0 [ 409.211343] ? __release_sock+0x32d/0x750 [ 409.215511] ? release_sock+0x99/0x2a0 [ 409.219429] ? __inet_stream_connect+0xdff/0x15d0 [ 409.224301] ? tcp_sendmsg_locked+0x6655/0x6c30 [ 409.229011] ? tcp_sendmsg+0xb2/0x100 [ 409.232836] ? inet_sendmsg+0x4e9/0x800 [ 409.236856] ? __sys_sendto+0x940/0xb80 [ 409.240867] ? __se_sys_sendto+0x107/0x130 [ 409.245145] ? __x64_sys_sendto+0x6e/0x90 [ 409.249337] ? do_syscall_64+0xcf/0x110 [ 409.253363] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.258770] ? memcg_kmem_put_cache+0x73/0x460 [ 409.263406] ? __msan_get_context_state+0x9/0x20 [ 409.268236] ? INIT_INT+0xc/0x30 [ 409.271650] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 409.277044] ? __msan_get_context_state+0x9/0x20 [ 409.281890] kmsan_memcpy_origins+0x13d/0x190 [ 409.286430] __msan_memcpy+0x6f/0x80 [ 409.290225] skb_copy_bits+0x1d2/0xc90 [ 409.294179] skb_copy+0x56c/0xba0 [ 409.297708] tcp_send_synack+0x7a3/0x18f0 [ 409.301896] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 409.307411] tcp_rcv_state_process+0x275d/0x6c60 [ 409.312209] ? tcp_connect+0x544e/0x6220 [ 409.316366] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.320487] ? tcp_v6_destroy_sock+0x60/0x60 [ 409.324948] __release_sock+0x32d/0x750 [ 409.328995] release_sock+0x99/0x2a0 [ 409.332788] __inet_stream_connect+0xdff/0x15d0 [ 409.337522] ? wait_woken+0x5b0/0x5b0 [ 409.341398] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.345932] ? aa_label_sk_perm+0xda/0x960 [ 409.350225] ? kmsan_set_origin+0x7f/0x100 [ 409.354502] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 409.359901] ? __msan_poison_alloca+0x1e0/0x270 [ 409.364874] ? __local_bh_enable_ip+0x46/0x260 [ 409.369538] ? __msan_poison_alloca+0x1e0/0x270 [ 409.374254] tcp_sendmsg+0xb2/0x100 [ 409.377924] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 409.382634] inet_sendmsg+0x4e9/0x800 [ 409.386488] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 409.391889] ? security_socket_sendmsg+0x1bd/0x200 [ 409.396860] ? inet_getname+0x490/0x490 [ 409.400871] __sys_sendto+0x940/0xb80 [ 409.404755] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 409.410246] ? prepare_exit_to_usermode+0x182/0x4c0 [ 409.415318] __se_sys_sendto+0x107/0x130 [ 409.419432] __x64_sys_sendto+0x6e/0x90 [ 409.423441] do_syscall_64+0xcf/0x110 [ 409.427283] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.432894] RIP: 0033:0x457569 [ 409.436111] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.455030] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 409.462778] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 409.470093] RDX: fffffffffffffffa RSI: 0000000020000100 RDI: 0000000000000007 [ 409.477379] RBP: 000000000072bf00 R08: 0000000020b63fe4 R09: 000000000000001c [ 409.484672] R10: 0000000020000001 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 409.491978] R13: 00000000004c407b R14: 00000000004d6910 R15: 00000000ffffffff [ 409.499291] Uninit was stored to memory at: [ 409.503642] kmsan_internal_chain_origin+0x136/0x240 [ 409.508786] __msan_chain_origin+0x6d/0xb0 [ 409.513039] __save_stack_trace+0x8be/0xc60 [ 409.517414] save_stack_trace+0xc6/0x110 [ 409.521502] kmsan_internal_chain_origin+0x136/0x240 [ 409.527086] kmsan_memcpy_origins+0x13d/0x190 [ 409.531612] __msan_memcpy+0x6f/0x80 [ 409.535370] skb_copy_bits+0x1d2/0xc90 [ 409.539320] skb_copy+0x56c/0xba0 [ 409.542800] tcp_send_synack+0x7a3/0x18f0 [ 409.546976] tcp_rcv_state_process+0x275d/0x6c60 [ 409.551816] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.555899] __release_sock+0x32d/0x750 [ 409.559891] release_sock+0x99/0x2a0 [ 409.563773] __inet_stream_connect+0xdff/0x15d0 [ 409.568451] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.572991] tcp_sendmsg+0xb2/0x100 [ 409.576643] inet_sendmsg+0x4e9/0x800 [ 409.580468] __sys_sendto+0x940/0xb80 [ 409.584316] __se_sys_sendto+0x107/0x130 [ 409.588422] __x64_sys_sendto+0x6e/0x90 [ 409.592422] do_syscall_64+0xcf/0x110 [ 409.596249] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.601448] [ 409.603088] Uninit was stored to memory at: [ 409.607477] kmsan_internal_chain_origin+0x136/0x240 [ 409.612601] __msan_chain_origin+0x6d/0xb0 [ 409.616892] __save_stack_trace+0x8be/0xc60 [ 409.621244] save_stack_trace+0xc6/0x110 [ 409.625338] kmsan_internal_chain_origin+0x136/0x240 [ 409.630467] kmsan_memcpy_origins+0x13d/0x190 [ 409.634981] __msan_memcpy+0x6f/0x80 [ 409.638732] skb_copy_bits+0x1d2/0xc90 [ 409.642655] skb_copy+0x56c/0xba0 [ 409.646122] tcp_send_synack+0x7a3/0x18f0 [ 409.650292] tcp_rcv_state_process+0x275d/0x6c60 [ 409.655077] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.659173] __release_sock+0x32d/0x750 [ 409.663177] release_sock+0x99/0x2a0 [ 409.666923] __inet_stream_connect+0xdff/0x15d0 [ 409.671614] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.676131] tcp_sendmsg+0xb2/0x100 08:09:24 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:24 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 409.679777] inet_sendmsg+0x4e9/0x800 [ 409.683605] __sys_sendto+0x940/0xb80 [ 409.687436] __se_sys_sendto+0x107/0x130 [ 409.691527] __x64_sys_sendto+0x6e/0x90 [ 409.695529] do_syscall_64+0xcf/0x110 [ 409.699357] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.704550] [ 409.706200] Uninit was stored to memory at: [ 409.710545] kmsan_internal_chain_origin+0x136/0x240 [ 409.715671] __msan_chain_origin+0x6d/0xb0 [ 409.719930] __save_stack_trace+0x8be/0xc60 [ 409.724282] save_stack_trace+0xc6/0x110 08:09:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068}) [ 409.728378] kmsan_internal_chain_origin+0x136/0x240 [ 409.733508] kmsan_memcpy_origins+0x13d/0x190 [ 409.738044] __msan_memcpy+0x6f/0x80 [ 409.741772] skb_copy_bits+0x1d2/0xc90 [ 409.745679] skb_copy+0x56c/0xba0 [ 409.749157] tcp_send_synack+0x7a3/0x18f0 [ 409.753346] tcp_rcv_state_process+0x275d/0x6c60 [ 409.758132] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.762221] __release_sock+0x32d/0x750 [ 409.766232] release_sock+0x99/0x2a0 [ 409.769972] __inet_stream_connect+0xdff/0x15d0 [ 409.774662] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.779181] tcp_sendmsg+0xb2/0x100 [ 409.782857] inet_sendmsg+0x4e9/0x800 [ 409.786681] __sys_sendto+0x940/0xb80 [ 409.790504] __se_sys_sendto+0x107/0x130 [ 409.794589] __x64_sys_sendto+0x6e/0x90 [ 409.798589] do_syscall_64+0xcf/0x110 [ 409.802433] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.807628] [ 409.809282] Uninit was stored to memory at: [ 409.813631] kmsan_internal_chain_origin+0x136/0x240 [ 409.818755] __msan_chain_origin+0x6d/0xb0 [ 409.823011] __save_stack_trace+0x8be/0xc60 [ 409.827362] save_stack_trace+0xc6/0x110 [ 409.831451] kmsan_internal_chain_origin+0x136/0x240 [ 409.836573] kmsan_memcpy_origins+0x13d/0x190 [ 409.841091] __msan_memcpy+0x6f/0x80 [ 409.844823] skb_copy_bits+0x1d2/0xc90 [ 409.848729] skb_copy+0x56c/0xba0 [ 409.852225] tcp_send_synack+0x7a3/0x18f0 [ 409.856396] tcp_rcv_state_process+0x275d/0x6c60 [ 409.861211] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.865295] __release_sock+0x32d/0x750 [ 409.869292] release_sock+0x99/0x2a0 [ 409.873077] __inet_stream_connect+0xdff/0x15d0 [ 409.877798] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.882335] tcp_sendmsg+0xb2/0x100 [ 409.885985] inet_sendmsg+0x4e9/0x800 [ 409.889821] __sys_sendto+0x940/0xb80 [ 409.893684] __se_sys_sendto+0x107/0x130 [ 409.897768] __x64_sys_sendto+0x6e/0x90 [ 409.901761] do_syscall_64+0xcf/0x110 [ 409.905585] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 409.910785] [ 409.912438] Uninit was stored to memory at: [ 409.916826] kmsan_internal_chain_origin+0x136/0x240 [ 409.921951] __msan_chain_origin+0x6d/0xb0 [ 409.926221] __save_stack_trace+0x8be/0xc60 08:09:25 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[]}}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[]}) [ 409.930570] save_stack_trace+0xc6/0x110 [ 409.934656] kmsan_internal_chain_origin+0x136/0x240 [ 409.939807] kmsan_memcpy_origins+0x13d/0x190 [ 409.944332] __msan_memcpy+0x6f/0x80 [ 409.948097] skb_copy_bits+0x1d2/0xc90 [ 409.952003] skb_copy+0x56c/0xba0 [ 409.955475] tcp_send_synack+0x7a3/0x18f0 [ 409.959651] tcp_rcv_state_process+0x275d/0x6c60 [ 409.964430] tcp_v6_do_rcv+0x112b/0x21b0 [ 409.968512] __release_sock+0x32d/0x750 [ 409.972513] release_sock+0x99/0x2a0 [ 409.976253] __inet_stream_connect+0xdff/0x15d0 [ 409.980948] tcp_sendmsg_locked+0x6655/0x6c30 [ 409.985466] tcp_sendmsg+0xb2/0x100 [ 409.989138] inet_sendmsg+0x4e9/0x800 [ 409.992971] __sys_sendto+0x940/0xb80 [ 409.996792] __se_sys_sendto+0x107/0x130 [ 410.000920] __x64_sys_sendto+0x6e/0x90 [ 410.004959] do_syscall_64+0xcf/0x110 [ 410.008788] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 410.013989] [ 410.015627] Uninit was stored to memory at: [ 410.019974] kmsan_internal_chain_origin+0x136/0x240 [ 410.025101] __msan_chain_origin+0x6d/0xb0 [ 410.029374] __save_stack_trace+0x8be/0xc60 [ 410.033715] save_stack_trace+0xc6/0x110 [ 410.037801] kmsan_internal_chain_origin+0x136/0x240 [ 410.042928] kmsan_memcpy_origins+0x13d/0x190 [ 410.047444] __msan_memcpy+0x6f/0x80 [ 410.051208] skb_copy_bits+0x1d2/0xc90 [ 410.055132] skb_copy+0x56c/0xba0 [ 410.058613] tcp_send_synack+0x7a3/0x18f0 [ 410.062786] tcp_rcv_state_process+0x275d/0x6c60 [ 410.067565] tcp_v6_do_rcv+0x112b/0x21b0 [ 410.071655] __release_sock+0x32d/0x750 [ 410.075653] release_sock+0x99/0x2a0 [ 410.079390] __inet_stream_connect+0xdff/0x15d0 [ 410.084092] tcp_sendmsg_locked+0x6655/0x6c30 [ 410.088627] tcp_sendmsg+0xb2/0x100 [ 410.092318] inet_sendmsg+0x4e9/0x800 [ 410.096160] __sys_sendto+0x940/0xb80 [ 410.099990] __se_sys_sendto+0x107/0x130 [ 410.104088] __x64_sys_sendto+0x6e/0x90 [ 410.108099] do_syscall_64+0xcf/0x110 [ 410.111929] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 410.117126] [ 410.118761] Uninit was stored to memory at: [ 410.123101] kmsan_internal_chain_origin+0x136/0x240 [ 410.128234] __msan_chain_origin+0x6d/0xb0 [ 410.132494] __save_stack_trace+0x8be/0xc60 [ 410.136840] save_stack_trace+0xc6/0x110 [ 410.140924] kmsan_internal_chain_origin+0x136/0x240 [ 410.146067] kmsan_memcpy_origins+0x13d/0x190 [ 410.150590] __msan_memcpy+0x6f/0x80 [ 410.154338] skb_copy_bits+0x1d2/0xc90 [ 410.158249] skb_copy+0x56c/0xba0 [ 410.161723] tcp_send_synack+0x7a3/0x18f0 [ 410.165896] tcp_rcv_state_process+0x275d/0x6c60 [ 410.170675] tcp_v6_do_rcv+0x112b/0x21b0 [ 410.174761] __release_sock+0x32d/0x750 [ 410.178767] release_sock+0x99/0x2a0 [ 410.182509] __inet_stream_connect+0xdff/0x15d0 [ 410.187217] tcp_sendmsg_locked+0x6655/0x6c30 [ 410.191733] tcp_sendmsg+0xb2/0x100 [ 410.195381] inet_sendmsg+0x4e9/0x800 [ 410.199214] __sys_sendto+0x940/0xb80 [ 410.203036] __se_sys_sendto+0x107/0x130 [ 410.207119] __x64_sys_sendto+0x6e/0x90 [ 410.211110] do_syscall_64+0xcf/0x110 [ 410.214951] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 410.220152] [ 410.221818] Local variable description: ----state.i.i@ip6_finish_output2 [ 410.228663] Variable was created at: [ 410.232403] ip6_finish_output2+0x87/0x22d0 [ 410.236749] ip6_finish_output+0xc13/0xca0 08:09:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068}) 08:09:25 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[]}}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[]}) 08:09:25 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:25 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000def69a98a600"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:09:26 executing program 3: 08:09:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000def69a98a600"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:09:27 executing program 3: 08:09:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) 08:09:27 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000), 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) 08:09:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000def69a98a600"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 08:09:28 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:28 executing program 3: [ 413.233357] device bridge_slave_1 left promiscuous mode [ 413.239346] bridge0: port 2(bridge_slave_1) entered disabled state 08:09:28 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) [ 413.295860] device bridge_slave_0 left promiscuous mode [ 413.301576] bridge0: port 1(bridge_slave_0) entered disabled state 08:09:28 executing program 3: 08:09:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000000def69a98a600"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) [ 413.590345] team0 (unregistering): Port device team_slave_1 removed [ 413.634277] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 413.711834] team0 (unregistering): Port device team_slave_0 removed [ 413.802904] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 413.876508] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 413.984720] bond0 (unregistering): Released all slaves [ 414.148999] IPVS: ftp: loaded support on port[0] = 21 [ 415.930617] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.937243] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.945398] device bridge_slave_0 entered promiscuous mode [ 416.023128] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.029519] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.037592] device bridge_slave_1 entered promiscuous mode [ 416.113402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 416.188120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 416.411825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 416.489407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.635361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 416.642383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 416.869863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 416.877485] team0: Port device team_slave_0 added [ 416.951603] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 416.959226] team0: Port device team_slave_1 added [ 417.032449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.108669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.182913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 417.190265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.199494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.269783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 417.277176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.286278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.138166] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.144665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.151372] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.157907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.165513] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 418.583691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.235574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.525288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 421.860178] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 421.866521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 421.874466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.165932] 8021q: adding VLAN 0 to HW filter on device team0 08:09:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:39 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:39 executing program 3: 08:09:39 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:39 executing program 2: 08:09:39 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) [ 424.176704] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:09:39 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 08:09:39 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='ip6tnl0\x00', 0x10) sendto$inet(r0, &(0x7f0000001280), 0x0, 0x0, &(0x7f0000002c40)={0x2, 0x0, @dev}, 0x10) 08:09:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:39 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:39 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) capget(&(0x7f0000000080)={0x20080522}, &(0x7f0000000000)) 08:09:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "18bf6fe9ca0270a8b6b45a5152cca8368a6ae61155e502e42fc7c0de624ae4ea"}}) [ 424.952035] audit: type=1326 audit(1542701379.991:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11087 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 08:09:40 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:40 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x54014cb}) 08:09:40 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:40 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4), 0x1c) splice(r2, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:40 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0c0583b, &(0x7f0000000140)) [ 425.675548] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.695183] audit: type=1326 audit(1542701380.741:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11087 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 08:09:40 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:40 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./bus\x00'}, 0x10) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 08:09:40 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:41 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d00000040000000000000000000000000000000000000000000380003"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r2+30000000}, &(0x7f0000000140)) 08:09:41 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xab11, 0x0) 08:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(r0, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000010000000000000000000000000000055"], 0x14}}, 0x0) 08:09:41 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:41 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5207, &(0x7f0000000080)) [ 426.410349] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:41 executing program 0: 08:09:41 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:41 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:41 executing program 3: 08:09:42 executing program 0: [ 427.884008] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) 08:09:43 executing program 0: 08:09:43 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:43 executing program 1: pipe(&(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xab11, 0x0) 08:09:43 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:43 executing program 3: [ 428.157871] not chained 110000 origins [ 428.161844] CPU: 1 PID: 11183 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 428.169180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.178621] Call Trace: [ 428.181251] dump_stack+0x32d/0x480 [ 428.184951] kmsan_internal_chain_origin+0x222/0x240 [ 428.190126] ? save_stack_trace+0xc6/0x110 [ 428.194390] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 428.199529] ? kmsan_internal_chain_origin+0x90/0x240 [ 428.204778] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 428.210175] ? is_bpf_text_address+0x49e/0x4d0 [ 428.214984] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 428.220461] ? in_task_stack+0x12c/0x210 [ 428.224707] __msan_chain_origin+0x6d/0xb0 [ 428.228977] ? release_sock+0x99/0x2a0 [ 428.232899] __save_stack_trace+0x8be/0xc60 [ 428.237297] ? release_sock+0x99/0x2a0 [ 428.241239] save_stack_trace+0xc6/0x110 [ 428.245348] kmsan_internal_chain_origin+0x136/0x240 [ 428.250497] ? do_syscall_64+0xcf/0x110 [ 428.254516] ? kmsan_internal_chain_origin+0x136/0x240 [ 428.259849] ? kmsan_memcpy_origins+0x13d/0x190 [ 428.264547] ? __msan_memcpy+0x6f/0x80 [ 428.268467] ? skb_copy_bits+0x1d2/0xc90 [ 428.272558] ? skb_copy+0x56c/0xba0 [ 428.276221] ? tcp_send_synack+0x7a3/0x18f0 [ 428.280578] ? tcp_rcv_state_process+0x275d/0x6c60 [ 428.285544] ? tcp_v6_do_rcv+0x112b/0x21b0 [ 428.289804] ? __release_sock+0x32d/0x750 [ 428.293982] ? release_sock+0x99/0x2a0 [ 428.297903] ? __inet_stream_connect+0xdff/0x15d0 [ 428.302782] ? tcp_sendmsg_locked+0x6655/0x6c30 [ 428.307488] ? tcp_sendmsg+0xb2/0x100 [ 428.311327] ? inet_sendmsg+0x4e9/0x800 [ 428.315339] ? __sys_sendto+0x940/0xb80 [ 428.319349] ? __se_sys_sendto+0x107/0x130 [ 428.323618] ? __x64_sys_sendto+0x6e/0x90 [ 428.327972] ? do_syscall_64+0xcf/0x110 [ 428.331986] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 428.337396] ? memcg_kmem_put_cache+0x73/0x460 [ 428.342037] ? __msan_get_context_state+0x9/0x20 [ 428.346834] ? INIT_INT+0xc/0x30 [ 428.350250] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 428.355650] ? __msan_get_context_state+0x9/0x20 [ 428.360461] kmsan_memcpy_origins+0x13d/0x190 [ 428.365012] __msan_memcpy+0x6f/0x80 [ 428.368859] skb_copy_bits+0x1d2/0xc90 [ 428.372856] skb_copy+0x56c/0xba0 [ 428.376376] tcp_send_synack+0x7a3/0x18f0 [ 428.380561] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 428.386091] tcp_rcv_state_process+0x275d/0x6c60 [ 428.390889] ? tcp_connect+0x544e/0x6220 [ 428.395027] tcp_v6_do_rcv+0x112b/0x21b0 [ 428.399168] ? tcp_v6_destroy_sock+0x60/0x60 [ 428.403639] __release_sock+0x32d/0x750 [ 428.408169] release_sock+0x99/0x2a0 [ 428.411940] __inet_stream_connect+0xdff/0x15d0 [ 428.416669] ? wait_woken+0x5b0/0x5b0 [ 428.421331] tcp_sendmsg_locked+0x6655/0x6c30 [ 428.425874] ? aa_label_sk_perm+0xda/0x960 [ 428.430169] ? kmsan_set_origin+0x7f/0x100 [ 428.434673] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 428.440411] ? __msan_poison_alloca+0x1e0/0x270 [ 428.445115] ? __local_bh_enable_ip+0x46/0x260 [ 428.449977] ? __msan_poison_alloca+0x1e0/0x270 [ 428.455561] tcp_sendmsg+0xb2/0x100 [ 428.459248] ? tcp_sendmsg_locked+0x6c30/0x6c30 [ 428.464133] inet_sendmsg+0x4e9/0x800 [ 428.468324] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 428.473724] ? security_socket_sendmsg+0x1bd/0x200 [ 428.479160] ? inet_getname+0x490/0x490 [ 428.483689] __sys_sendto+0x940/0xb80 [ 428.487946] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 428.493429] ? prepare_exit_to_usermode+0x182/0x4c0 [ 428.498489] __se_sys_sendto+0x107/0x130 [ 428.502855] __x64_sys_sendto+0x6e/0x90 [ 428.506864] do_syscall_64+0xcf/0x110 [ 428.510693] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 428.515911] RIP: 0033:0x457569 [ 428.519128] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.538047] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 428.545782] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 428.553074] RDX: fffffffffffffffa RSI: 0000000020000100 RDI: 0000000000000007 [ 428.560363] RBP: 000000000072bf00 R08: 0000000020b63fe4 R09: 000000000000001c [ 428.567657] R10: 0000000020000001 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 428.574946] R13: 00000000004c407b R14: 00000000004d6910 R15: 00000000ffffffff [ 428.582776] Uninit was stored to memory at: [ 428.587132] kmsan_internal_chain_origin+0x136/0x240 [ 428.592306] __msan_chain_origin+0x6d/0xb0 [ 428.596565] __save_stack_trace+0x8be/0xc60 [ 428.600904] save_stack_trace+0xc6/0x110 [ 428.604984] kmsan_internal_chain_origin+0x136/0x240 [ 428.610111] kmsan_memcpy_origins+0x13d/0x190 [ 428.614629] __msan_memcpy+0x6f/0x80 [ 428.618365] skb_copy_bits+0x1d2/0xc90 [ 428.622278] skb_copy+0x56c/0xba0 [ 428.625748] tcp_send_synack+0x7a3/0x18f0 [ 428.629925] tcp_rcv_state_process+0x275d/0x6c60 [ 428.634709] tcp_v6_do_rcv+0x112b/0x21b0 [ 428.638799] __release_sock+0x32d/0x750 [ 428.642825] release_sock+0x99/0x2a0 [ 428.646564] __inet_stream_connect+0xdff/0x15d0 [ 428.651275] tcp_sendmsg_locked+0x6655/0x6c30 [ 428.655791] tcp_sendmsg+0xb2/0x100 [ 428.659462] inet_sendmsg+0x4e9/0x800 [ 428.663287] __sys_sendto+0x940/0xb80 [ 428.667115] __se_sys_sendto+0x107/0x130 [ 428.671214] __x64_sys_sendto+0x6e/0x90 [ 428.675251] do_syscall_64+0xcf/0x110 [ 428.679079] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 428.684277] [ 428.685920] Uninit was stored to memory at: [ 428.690269] kmsan_internal_chain_origin+0x136/0x240 [ 428.695398] __msan_chain_origin+0x6d/0xb0 [ 428.699655] __save_stack_trace+0x8be/0xc60 [ 428.704000] save_stack_trace+0xc6/0x110 [ 428.708084] kmsan_internal_chain_origin+0x136/0x240 [ 428.713259] kmsan_memcpy_origins+0x13d/0x190 [ 428.717773] __msan_memcpy+0x6f/0x80 [ 428.721517] skb_copy_bits+0x1d2/0xc90 [ 428.725432] skb_copy+0x56c/0xba0 [ 428.728902] tcp_send_synack+0x7a3/0x18f0 [ 428.733076] tcp_rcv_state_process+0x275d/0x6c60 [ 428.737864] tcp_v6_do_rcv+0x112b/0x21b0 [ 428.741964] __release_sock+0x32d/0x750 [ 428.745959] release_sock+0x99/0x2a0 [ 428.749699] __inet_stream_connect+0xdff/0x15d0 [ 428.754395] tcp_sendmsg_locked+0x6655/0x6c30 [ 428.758915] tcp_sendmsg+0xb2/0x100 [ 428.762567] inet_sendmsg+0x4e9/0x800 [ 428.766394] __sys_sendto+0x940/0xb80 [ 428.770229] __se_sys_sendto+0x107/0x130 [ 428.774312] __x64_sys_sendto+0x6e/0x90 [ 428.778308] do_syscall_64+0xcf/0x110 [ 428.782137] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 428.787334] [ 428.788988] Uninit was stored to memory at: [ 428.793665] kmsan_internal_chain_origin+0x136/0x240 [ 428.796276] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 428.799291] __msan_chain_origin+0x6d/0xb0 [ 428.799343] __save_stack_trace+0x8be/0xc60 [ 428.814238] save_stack_trace+0xc6/0x110 [ 428.818353] kmsan_internal_chain_origin+0x136/0x240 [ 428.823505] kmsan_memcpy_origins+0x13d/0x190 [ 428.828019] __msan_memcpy+0x6f/0x80 [ 428.831754] skb_copy_bits+0x1d2/0xc90 [ 428.835662] skb_copy+0x56c/0xba0 [ 428.838556] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 428.839133] tcp_send_synack+0x7a3/0x18f0 [ 428.839186] tcp_rcv_state_process+0x275d/0x6c60 [ 428.854440] tcp_v6_do_rcv+0x112b/0x21b0 [ 428.858523] __release_sock+0x32d/0x750 [ 428.862520] release_sock+0x99/0x2a0 [ 428.866260] __inet_stream_connect+0xdff/0x15d0 [ 428.870954] tcp_sendmsg_locked+0x6655/0x6c30 [ 428.875474] tcp_sendmsg+0xb2/0x100 [ 428.879121] inet_sendmsg+0x4e9/0x800 [ 428.882942] __sys_sendto+0x940/0xb80 [ 428.886766] __se_sys_sendto+0x107/0x130 [ 428.890852] __x64_sys_sendto+0x6e/0x90 [ 428.894865] do_syscall_64+0xcf/0x110 [ 428.898731] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 428.903926] [ 428.905567] Uninit was stored to memory at: [ 428.909912] kmsan_internal_chain_origin+0x136/0x240 [ 428.915041] __msan_chain_origin+0x6d/0xb0 [ 428.919300] __save_stack_trace+0x8be/0xc60 [ 428.923646] save_stack_trace+0xc6/0x110 [ 428.927731] kmsan_internal_chain_origin+0x136/0x240 [ 428.932899] kmsan_memcpy_origins+0x13d/0x190 [ 428.937435] __msan_memcpy+0x6f/0x80 [ 428.941175] skb_copy_bits+0x1d2/0xc90 [ 428.945097] skb_copy+0x56c/0xba0 [ 428.948578] tcp_send_synack+0x7a3/0x18f0 [ 428.952755] tcp_rcv_state_process+0x275d/0x6c60 [ 428.957628] tcp_v6_do_rcv+0x112b/0x21b0 [ 428.961720] __release_sock+0x32d/0x750 [ 428.965717] release_sock+0x99/0x2a0 [ 428.969524] __inet_stream_connect+0xdff/0x15d0 [ 428.974242] tcp_sendmsg_locked+0x6655/0x6c30 [ 428.978768] tcp_sendmsg+0xb2/0x100 [ 428.982424] inet_sendmsg+0x4e9/0x800 [ 428.986258] __sys_sendto+0x940/0xb80 [ 428.990106] __se_sys_sendto+0x107/0x130 [ 428.994207] __x64_sys_sendto+0x6e/0x90 [ 428.998226] do_syscall_64+0xcf/0x110 [ 429.002057] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 429.007258] [ 429.008902] Uninit was stored to memory at: [ 429.013264] kmsan_internal_chain_origin+0x136/0x240 [ 429.018401] __msan_chain_origin+0x6d/0xb0 [ 429.022665] __save_stack_trace+0x8be/0xc60 [ 429.027015] save_stack_trace+0xc6/0x110 [ 429.031109] kmsan_internal_chain_origin+0x136/0x240 [ 429.036257] kmsan_memcpy_origins+0x13d/0x190 [ 429.040787] __msan_memcpy+0x6f/0x80 [ 429.044546] skb_copy_bits+0x1d2/0xc90 [ 429.048471] skb_copy+0x56c/0xba0 [ 429.051957] tcp_send_synack+0x7a3/0x18f0 [ 429.056141] tcp_rcv_state_process+0x275d/0x6c60 [ 429.060935] tcp_v6_do_rcv+0x112b/0x21b0 [ 429.065026] __release_sock+0x32d/0x750 [ 429.069027] release_sock+0x99/0x2a0 [ 429.072775] __inet_stream_connect+0xdff/0x15d0 [ 429.077479] tcp_sendmsg_locked+0x6655/0x6c30 [ 429.082006] tcp_sendmsg+0xb2/0x100 [ 429.085663] inet_sendmsg+0x4e9/0x800 [ 429.089499] __sys_sendto+0x940/0xb80 [ 429.093335] __se_sys_sendto+0x107/0x130 [ 429.097428] __x64_sys_sendto+0x6e/0x90 [ 429.101432] do_syscall_64+0xcf/0x110 [ 429.105267] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 429.110470] [ 429.112120] Uninit was stored to memory at: [ 429.116479] kmsan_internal_chain_origin+0x136/0x240 [ 429.121611] __msan_chain_origin+0x6d/0xb0 [ 429.125882] __save_stack_trace+0x8be/0xc60 [ 429.130259] save_stack_trace+0xc6/0x110 [ 429.134354] kmsan_internal_chain_origin+0x136/0x240 [ 429.139493] kmsan_memcpy_origins+0x13d/0x190 [ 429.144021] __msan_memcpy+0x6f/0x80 [ 429.147774] skb_copy_bits+0x1d2/0xc90 [ 429.151695] skb_copy+0x56c/0xba0 [ 429.155184] tcp_send_synack+0x7a3/0x18f0 [ 429.159392] tcp_rcv_state_process+0x275d/0x6c60 [ 429.164191] tcp_v6_do_rcv+0x112b/0x21b0 [ 429.168315] __release_sock+0x32d/0x750 [ 429.172317] release_sock+0x99/0x2a0 [ 429.176063] __inet_stream_connect+0xdff/0x15d0 [ 429.180771] tcp_sendmsg_locked+0x6655/0x6c30 [ 429.185299] tcp_sendmsg+0xb2/0x100 [ 429.188956] inet_sendmsg+0x4e9/0x800 [ 429.192787] __sys_sendto+0x940/0xb80 [ 429.196627] __se_sys_sendto+0x107/0x130 [ 429.200725] __x64_sys_sendto+0x6e/0x90 [ 429.204738] do_syscall_64+0xcf/0x110 [ 429.208576] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 429.213786] [ 429.215441] Uninit was stored to memory at: [ 429.219800] kmsan_internal_chain_origin+0x136/0x240 [ 429.224943] __msan_chain_origin+0x6d/0xb0 [ 429.229227] __save_stack_trace+0x8be/0xc60 [ 429.233579] save_stack_trace+0xc6/0x110 [ 429.237677] kmsan_internal_chain_origin+0x136/0x240 [ 429.242817] kmsan_memcpy_origins+0x13d/0x190 [ 429.247354] __msan_memcpy+0x6f/0x80 [ 429.251096] skb_copy_bits+0x1d2/0xc90 [ 429.255016] skb_copy+0x56c/0xba0 [ 429.258497] tcp_send_synack+0x7a3/0x18f0 [ 429.262679] tcp_rcv_state_process+0x275d/0x6c60 [ 429.267467] tcp_v6_do_rcv+0x112b/0x21b0 [ 429.271559] __release_sock+0x32d/0x750 [ 429.275566] release_sock+0x99/0x2a0 [ 429.279313] __inet_stream_connect+0xdff/0x15d0 [ 429.284011] tcp_sendmsg_locked+0x6655/0x6c30 [ 429.288538] tcp_sendmsg+0xb2/0x100 [ 429.292191] inet_sendmsg+0x4e9/0x800 [ 429.296045] __sys_sendto+0x940/0xb80 [ 429.299876] __se_sys_sendto+0x107/0x130 [ 429.303968] __x64_sys_sendto+0x6e/0x90 [ 429.307979] do_syscall_64+0xcf/0x110 08:09:43 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, r0, 0x0, 0x4, &(0x7f0000000340)='GPL\x00'}, 0x30) 08:09:43 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000240)={0x800}) 08:09:43 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000003, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720b00, 0xffffffff7ff0bdbe}) 08:09:43 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) times(&(0x7f0000000000)) 08:09:44 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x7) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2284, &(0x7f0000000700)) 08:09:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000001d80)='/dev/bus/usb/00#/00#\x00', 0x80000000004, 0x0) dup3(r1, r2, 0x0) 08:09:44 executing program 3: r0 = socket$inet6(0xa, 0x1600000000000002, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1200000000000000110000006700000080e7"], 0x12}, 0x8045) [ 429.311809] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 429.317017] [ 429.318663] Local variable description: ----state.i.i@ip6_finish_output2 [ 429.325518] Variable was created at: [ 429.329267] ip6_finish_output2+0x87/0x22d0 [ 429.333618] ip6_finish_output+0xc13/0xca0 08:09:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000280)={0x0, 0x8000}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet6(0xa, 0x3, 0x4) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="0f20e06635040000000f22e0baf80c66b894b1618466efbafc0c66b8c700c0fe66ef0f0866b8204783760f23d00f21f866352000000d0f23f80f235a0f210c673e0f236a650f1b8bf9f7baf80c66b82cce0c8466efbafc0cec0f20e06635002000000f22e0", 0x65}], 0x1, 0x0, &(0x7f0000000480), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:09:44 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f0000000540)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1, &(0x7f00000003c0)=[{&(0x7f0000001880)=""/204, 0xcc}], 0x1, 0x0) [ 429.765714] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:45 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0x0, 0x0) 08:09:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x0, 0x0, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000080)=""/94}, 0x18) 08:09:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000240)) 08:09:45 executing program 0: socketpair$unix(0x1, 0x1000000000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x40000000005, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)="c0", 0x1}], 0x1, &(0x7f0000000100)=[@prinfo={0x18}, @init={0x18, 0x84, 0x0, {0xe1, 0x6, 0x40, 0x8}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @rand_addr=0x2000000}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4}, @init={0x18, 0x84, 0x0, {0x1000100000000, 0x100000000, 0xffffffffffffffff, 0x180000000}}], 0x88}, 0x0) 08:09:45 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc//net/ipv4/vs/pmtu_disc\x00\x00\x00\x00', 0x2, 0x0) [ 430.517618] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:45 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@gettfilter={0x2c, 0x2e, 0x0, 0x0, 0x0, {}, [{0x8, 0xb, 0x4}]}, 0x2c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 08:09:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000000)) 08:09:45 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000000080)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f00000000c0)="7369743000f5f77fe681d7a5ec0231c77a1846") 08:09:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:46 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0x0, 0x0) 08:09:46 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:46 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000003, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x60, 0x720000, 0xffffffff7ff0bdbe}) [ 431.220555] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7e, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180), 0x4) 08:09:46 executing program 2: [ 431.429274] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 431.436305] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 08:09:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:46 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r0 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r0, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) 08:09:46 executing program 0: 08:09:46 executing program 2: 08:09:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:47 executing program 0: 08:09:47 executing program 2: 08:09:47 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r0, 0x0, 0x0, 0x0) 08:09:47 executing program 0: 08:09:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:47 executing program 3: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") mknod(&(0x7f00000015c0)='./file0\x00', 0x8, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18}, 0x18) 08:09:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x264) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000440)={@loopback}, 0x14) [ 432.560556] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:47 executing program 2: r0 = creat(&(0x7f0000000140)='./file1\x00', 0x5) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) close(r0) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f8a) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x304) 08:09:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:48 executing program 3: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000001c0)=ANY=[]) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000600), &(0x7f0000000640)) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000340)=""/127) 08:09:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000340)=""/137) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}], 0x18) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 08:09:48 executing program 0: clone(0x200, &(0x7f0000000600), &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000000500)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000bc0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000280), &(0x7f0000000080)) r1 = dup(r0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 433.529478] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:48 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x10) readv(r1, &(0x7f00000026c0)=[{&(0x7f0000000080)=""/171, 0xab}], 0x1) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[]}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0x14, 0x20, 0xaff, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 08:09:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x20401, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"76657400000000bd6800", 0x43732e5398616f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000400)={'ip6gretap0\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'erspan0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000200)="766574000000000000000000bd6200") 08:09:49 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000f40)=ANY=[], 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) socketpair(0x7, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r1, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="626f6e641000") socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000003c0)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)={0x1, 0x3, [@random="6437b8631404", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/net/tun\x00', 0x0, 0x0) 08:09:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000240)=@in6={0xa, 0x4e22, 0x0, @local, 0x7ff}, 0x80, &(0x7f0000000740)}, 0x0) 08:09:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 434.224673] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:49 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:09:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(r1, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x802}) write$cgroup_int(r0, &(0x7f0000000340)=0x1c9, 0x14) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 08:09:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 08:09:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x2, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000340), 0x4) 08:09:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 08:09:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000640)='vlan0\x00') close(r0) 08:09:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:50 executing program 3: dup(0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r2, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000000)) tkill(r0, 0x401004000000016) 08:09:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 08:09:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:50 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r0 = socket$inet6(0xa, 0x803, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)=@ethtool_regs}) [ 435.566365] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:50 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="04000000000000003602959300b2ad7e6a5e3aa7cc384878d200000006ed3d39c98ff9cb15b78ebefd85a3fed10af5f8367a2d315263e79ad1ca0b04ce3b8c719d"]}) 08:09:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 08:09:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 08:09:51 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000100)=""/220, &(0x7f0000000200)=0xdc) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, "", 0x30}]}, 0x2) socket(0xa, 0x807, 0x4a1939c0) [ 436.194164] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf7a156a4d6ab740de1cdd8b55b062950b86abc8464d4f8a9061", 0x25) 08:09:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf7a156a4d6ab740de1cdd8b55b062950b86abc8464d4f", 0x22) 08:09:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000100)={0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) 08:09:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) 08:09:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:52 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005a0007051dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 08:09:52 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 08:09:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:52 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:52 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000002c0)='./file0\x00', 0x10000a0) [ 437.586499] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 437.609734] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:52 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:53 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:53 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) [ 438.159494] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 438.320246] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:53 executing program 0: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:09:53 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x0, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:53 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) 08:09:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 438.658174] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000002c0)='./file0\x00', 0x10000a0) 08:09:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) 08:09:54 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x0, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:54 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180), 0x20) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) poll(&(0x7f0000000140)=[{r2, 0x1000}, {r0}], 0x2, 0x800) [ 439.247185] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:54 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x0, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:54 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:54 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = memfd_create(&(0x7f0000000380)="656d3076626f786e657430a900", 0x0) write(r1, &(0x7f0000000180)='Yt', 0x2) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=';', 0x1}], 0x1) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 08:09:54 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:56 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x0, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:56 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:56 executing program 0: 08:09:56 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) 08:09:57 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:57 executing program 0: [ 442.040332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:09:57 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x0, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:57 executing program 0: 08:09:57 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 442.631665] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:57 executing program 3: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4), 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:58 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x0, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:58 executing program 0: 08:09:58 executing program 1: 08:09:58 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:58 executing program 3: socket$packet(0x11, 0x3, 0x300) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:58 executing program 0: 08:09:58 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0x0, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 443.294041] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:58 executing program 0: 08:09:58 executing program 2: socket$inet6(0xa, 0x803, 0x3) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:09:58 executing program 3: socket$packet(0x11, 0x3, 0x300) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:58 executing program 1: [ 443.809771] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:09:59 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0x0, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:59 executing program 0: 08:09:59 executing program 1: 08:09:59 executing program 3: socket$packet(0x11, 0x3, 0x300) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:59 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 444.259299] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:09:59 executing program 0: 08:09:59 executing program 1: 08:09:59 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0x0, 0x32, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:09:59 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:09:59 executing program 1: 08:09:59 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 444.935942] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:00 executing program 0: 08:10:00 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:10:00 executing program 1: 08:10:00 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:00 executing program 3: socket$packet(0x11, 0x0, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:10:00 executing program 3: socket$packet(0x11, 0x0, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:10:00 executing program 1: 08:10:00 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 445.381473] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:00 executing program 0: 08:10:00 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:00 executing program 3: socket$packet(0x11, 0x0, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) [ 445.693095] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:01 executing program 0: 08:10:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:10:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0x1, 0x1) [ 446.020155] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:01 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ff8000/0x4000)=nil}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, {0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "18bf6fe9ca0270a8b6b45a5152cca8368a6ae61155e502e42fc7c0de624ae4ea"}}) 08:10:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:10:01 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x1, 0x0, 0x0, "1d"}) [ 446.552406] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:01 executing program 1: syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 08:10:01 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2271, &(0x7f0000000700)) 08:10:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) 08:10:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 447.067378] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x2, 0x0, "8b630700000000000000151c36e8b962adbf0600c43ad51bb903c50c99f6923e646c1d3eaad49bc3c0a86bd1683c510400b5d2daa8a220e04e0b20637e2b5a8dd3403b0000cf681d083e2307d3f5597b"}, 0x307) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:04 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x4, 0x4000000000004, 0x8}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r1, &(0x7f0000000000), &(0x7f000089b000)}, 0x18) 08:10:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) 08:10:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x400, 0x10000]}) 08:10:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 449.465224] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 08:10:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x2, 0x0, "8b630700000000000000151c36e8b962adbf0600c43ad51bb903c50c99f6923e646c1d3eaad49bc3c0a86bd1683c510400b5d2daa8a220e04e0b20637e2b5a8dd3403b0000cf681d083e2307d3f5597b"}, 0x307) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) 08:10:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREAD(r1, &(0x7f0000000240)={0x82, 0x75, 0x0, {0x77, "5557a73228215840b61d1bcbd515b4edfcc5e63b23ec709c1d67e037ad1ecfb3042206ccaa91a5757077cebec12e1da4bb147317d3afd3c11f2f3cd738a5472e5d1d32f5901680ffa6b6c0a594b1a33681b55889c68ac0bfdefd19d98db88758adf709bb22eb3f56def4d9b57afce0423942806539b5e0"}}, 0x82) read(r0, &(0x7f00000000c0)=""/18, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000003b80)}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000001400)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000001200)) r3 = gettid() tkill(r3, 0x14) [ 450.010314] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)="6e7300f0288c04fb1585494b630c07c2fc4250227b7c") unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 08:10:07 executing program 3: 08:10:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) getitimer(0x0, &(0x7f0000000240)) 08:10:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:07 executing program 1: 08:10:07 executing program 0: [ 452.516918] audit: type=1326 audit(1542701407.561:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11912 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 08:10:07 executing program 1: [ 452.689503] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:07 executing program 3: 08:10:07 executing program 0: 08:10:08 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:08 executing program 1: 08:10:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x8, &(0x7f0000ce9000)) mlockall(0x3) [ 453.185632] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000001380)=""/4096, 0x1000) [ 453.311496] audit: type=1326 audit(1542701408.351:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11912 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 08:10:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x0}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:10 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 08:10:10 executing program 3: clone(0x1080000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 08:10:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:10 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:10 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) [ 455.833271] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 455.843882] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:11 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:10:11 executing program 2: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:11 executing program 5: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) [ 456.205323] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:11 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x805, 0x0) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x10, 0xffffffffffffffff, 0x0) connect(r1, &(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x68) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)) 08:10:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:11 executing program 1: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) [ 456.671919] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x0}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(0xffffffffffffffff, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:13 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0xab11, 0x0) 08:10:13 executing program 1: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) 08:10:13 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0x700}) 08:10:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 458.893829] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 458.973653] vhci_hcd: default hub control req: c000 v2000 i0000 l0 08:10:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:14 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:14 executing program 1: socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f0000000180), 0x8}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) keyctl$join(0x1, &(0x7f0000000680)={'syz'}) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000280)="f000", 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000580)='dctcp\x00', 0xfffffffffffffffc) [ 459.272967] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:14 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 459.675373] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x0}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:16 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:10:16 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 462.040583] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:17 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:10:17 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:17 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:17 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 462.557130] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:20 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 08:10:20 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:20 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 465.185894] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 465.293868] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:20 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:20 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) [ 465.557331] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:20 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:20 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) [ 465.848007] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:21 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) 08:10:21 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) 08:10:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:21 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:21 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) 08:10:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(0x0, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:21 executing program 0: socket$inet6(0xa, 0x803, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 466.897368] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 466.940247] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:22 executing program 0: socket$inet6(0xa, 0x803, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x0) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:22 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) 08:10:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:22 executing program 0: socket$inet6(0xa, 0x803, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 467.404982] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 467.443611] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:22 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) 08:10:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:23 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:23 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x0) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:23 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:23 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 468.270265] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x0) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:23 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 468.394353] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:23 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:23 executing program 1 (fault-call:1 fault-nth:0): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 468.732807] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 468.901466] FAULT_INJECTION: forcing a failure. [ 468.901466] name failslab, interval 1, probability 0, space 0, times 1 [ 468.913273] CPU: 1 PID: 12219 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 468.920609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.930040] Call Trace: [ 468.932757] dump_stack+0x32d/0x480 [ 468.936512] should_fail+0x11e5/0x13c0 [ 468.940510] __should_failslab+0x278/0x2a0 [ 468.944882] should_failslab+0x29/0x70 [ 468.948863] kmem_cache_alloc+0x146/0xe20 [ 468.953124] ? vm_area_dup+0x65/0x1a0 [ 468.957064] ? __msan_poison_alloca+0x1e0/0x270 [ 468.961809] vm_area_dup+0x65/0x1a0 [ 468.965530] __split_vma+0x1ec/0xc10 [ 468.969319] ? vmacache_find+0x452/0x710 [ 468.973507] __do_munmap+0xa60/0x2720 [ 468.977458] mmap_region+0x176e/0x4910 [ 468.981447] ? kmsan_set_origin+0x7f/0x100 [ 468.985837] do_mmap+0x182d/0x1e60 [ 468.989537] vm_mmap_pgoff+0x328/0x450 [ 468.993530] ksys_mmap_pgoff+0x27e/0xaf0 [ 468.997749] __se_sys_mmap+0x172/0x1a0 [ 469.001730] __x64_sys_mmap+0x69/0x90 [ 469.005604] do_syscall_64+0xcf/0x110 [ 469.009490] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 469.014754] RIP: 0033:0x457569 [ 469.018021] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.036988] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 469.044771] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 08:10:24 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 469.052101] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 469.059438] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 469.066774] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 469.074102] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:24 executing program 0: socket$inet6(0xa, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:24 executing program 1 (fault-call:1 fault-nth:1): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:24 executing program 0: socket$inet6(0xa, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r3+10000000}}, &(0x7f0000000080)) tkill(r2, 0x1004000000016) connect$inet6(0xffffffffffffffff, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c12628571") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 469.794177] FAULT_INJECTION: forcing a failure. [ 469.794177] name failslab, interval 1, probability 0, space 0, times 0 [ 469.805750] CPU: 0 PID: 12241 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 469.813109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.822516] Call Trace: [ 469.825238] dump_stack+0x32d/0x480 [ 469.828965] should_fail+0x11e5/0x13c0 [ 469.832989] __should_failslab+0x278/0x2a0 [ 469.837320] should_failslab+0x29/0x70 [ 469.841295] kmem_cache_alloc+0x146/0xe20 [ 469.845560] ? vm_area_alloc+0x72/0x260 [ 469.849662] vm_area_alloc+0x72/0x260 [ 469.853590] mmap_region+0x1dea/0x4910 [ 469.857583] ? kmsan_set_origin+0x7f/0x100 [ 469.862040] do_mmap+0x182d/0x1e60 [ 469.865760] vm_mmap_pgoff+0x328/0x450 [ 469.869767] ksys_mmap_pgoff+0x27e/0xaf0 [ 469.873927] __se_sys_mmap+0x172/0x1a0 [ 469.877906] __x64_sys_mmap+0x69/0x90 [ 469.881775] do_syscall_64+0xcf/0x110 [ 469.885661] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 469.890931] RIP: 0033:0x457569 [ 469.894234] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.913210] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 469.921009] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 [ 469.928526] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 469.935855] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 469.943181] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 469.947712] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 469.950527] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:25 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:25 executing program 1 (fault-call:1 fault-nth:2): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 470.447213] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:25 executing program 0: socket$inet6(0xa, 0x803, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 470.644985] FAULT_INJECTION: forcing a failure. [ 470.644985] name failslab, interval 1, probability 0, space 0, times 0 [ 470.656528] CPU: 1 PID: 12272 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 470.663869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.673271] Call Trace: [ 470.675951] dump_stack+0x32d/0x480 [ 470.679673] should_fail+0x11e5/0x13c0 [ 470.683664] __should_failslab+0x278/0x2a0 [ 470.688031] should_failslab+0x29/0x70 [ 470.692026] kmem_cache_alloc+0x146/0xe20 [ 470.696310] ? shmem_alloc_inode+0x5b/0xe0 [ 470.700629] ? __msan_get_context_state+0x9/0x20 [ 470.705472] ? _raw_spin_lock_irqsave+0x320/0x490 [ 470.710404] ? shmem_write_end+0xac0/0xac0 [ 470.714754] shmem_alloc_inode+0x5b/0xe0 [ 470.718937] ? shmem_write_end+0xac0/0xac0 [ 470.723266] new_inode_pseudo+0x95/0x460 [ 470.727405] new_inode+0x6a/0x3e0 [ 470.730931] ? shmem_get_inode+0xb1/0xf20 [ 470.735150] ? __shmem_file_setup+0x286/0x5d0 [ 470.739737] shmem_get_inode+0x1ff/0xf20 [ 470.743947] __shmem_file_setup+0x286/0x5d0 [ 470.748398] shmem_zero_setup+0x12a/0x610 [ 470.752709] mmap_region+0x2e4d/0x4910 [ 470.756886] do_mmap+0x182d/0x1e60 [ 470.760588] vm_mmap_pgoff+0x328/0x450 [ 470.764582] ksys_mmap_pgoff+0x27e/0xaf0 [ 470.768749] __se_sys_mmap+0x172/0x1a0 [ 470.772730] __x64_sys_mmap+0x69/0x90 [ 470.776607] do_syscall_64+0xcf/0x110 [ 470.780497] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 470.785752] RIP: 0033:0x457569 [ 470.789022] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.807996] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 470.815788] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 [ 470.823127] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 470.830464] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 470.837793] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 470.845120] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:26 executing program 1 (fault-call:1 fault-nth:3): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 471.315626] FAULT_INJECTION: forcing a failure. [ 471.315626] name failslab, interval 1, probability 0, space 0, times 0 [ 471.327365] CPU: 1 PID: 12287 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 471.334708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.344126] Call Trace: [ 471.346797] dump_stack+0x32d/0x480 [ 471.350518] ? __should_failslab+0x278/0x2a0 [ 471.355031] should_fail+0x11e5/0x13c0 [ 471.359030] __should_failslab+0x278/0x2a0 [ 471.363380] should_failslab+0x29/0x70 [ 471.367389] kmem_cache_alloc+0x146/0xe20 [ 471.371640] ? __d_alloc+0xd2/0xdd0 [ 471.375424] ? __msan_poison_alloca+0x1e0/0x270 [ 471.380212] __d_alloc+0xd2/0xdd0 [ 471.383790] d_alloc_pseudo+0x68/0x80 [ 471.387677] alloc_file_pseudo+0x19f/0x4e0 [ 471.392033] ? clear_nlink+0x163/0x220 [ 471.396034] __shmem_file_setup+0x3ef/0x5d0 [ 471.400483] shmem_zero_setup+0x12a/0x610 [ 471.404760] mmap_region+0x2e4d/0x4910 [ 471.408811] do_mmap+0x182d/0x1e60 [ 471.412528] vm_mmap_pgoff+0x328/0x450 [ 471.416514] ksys_mmap_pgoff+0x27e/0xaf0 [ 471.420670] __se_sys_mmap+0x172/0x1a0 [ 471.424647] __x64_sys_mmap+0x69/0x90 [ 471.428515] do_syscall_64+0xcf/0x110 [ 471.432396] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 471.437661] RIP: 0033:0x457569 [ 471.440993] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:10:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 471.459968] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 471.467746] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 [ 471.475084] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 471.482437] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 471.489760] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 471.497085] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:26 executing program 0: socket$inet6(0xa, 0x803, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0xfba) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:26 executing program 3: dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 471.743287] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 08:10:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1262857180") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:27 executing program 1 (fault-call:1 fault-nth:4): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:27 executing program 4 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 472.186162] vhci_hcd: default hub control req: 0280 v0000 i0000 l0 [ 472.275662] FAULT_INJECTION: forcing a failure. [ 472.275662] name failslab, interval 1, probability 0, space 0, times 0 [ 472.287273] CPU: 1 PID: 12315 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 472.294609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.304011] Call Trace: [ 472.306721] dump_stack+0x32d/0x480 [ 472.310443] should_fail+0x11e5/0x13c0 [ 472.314472] __should_failslab+0x278/0x2a0 [ 472.318796] should_failslab+0x29/0x70 [ 472.322761] kmem_cache_alloc+0x146/0xe20 [ 472.327006] ? __alloc_file+0xd2/0x7b0 [ 472.331011] ? __msan_poison_alloca+0x1e0/0x270 [ 472.335804] __alloc_file+0xd2/0x7b0 [ 472.339640] alloc_empty_file+0x1f5/0x4b0 [ 472.343877] alloc_file+0xdb/0x8c0 [ 472.347536] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 472.353095] ? d_instantiate+0x11e/0x190 [ 472.357255] alloc_file_pseudo+0x3ff/0x4e0 [ 472.361631] __shmem_file_setup+0x3ef/0x5d0 [ 472.366090] shmem_zero_setup+0x12a/0x610 [ 472.370370] mmap_region+0x2e4d/0x4910 08:10:27 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 472.374423] do_mmap+0x182d/0x1e60 [ 472.378123] vm_mmap_pgoff+0x328/0x450 [ 472.382181] ksys_mmap_pgoff+0x27e/0xaf0 [ 472.386386] __se_sys_mmap+0x172/0x1a0 [ 472.390370] __x64_sys_mmap+0x69/0x90 [ 472.394257] do_syscall_64+0xcf/0x110 [ 472.398155] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 472.403423] RIP: 0033:0x457569 [ 472.406684] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:10:27 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) [ 472.425688] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 472.433754] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 [ 472.441080] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 472.448407] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 472.455743] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 [ 472.463100] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 472.495701] FAULT_INJECTION: forcing a failure. [ 472.495701] name failslab, interval 1, probability 0, space 0, times 0 [ 472.507418] CPU: 1 PID: 12316 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 472.514780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.524207] Call Trace: [ 472.526900] dump_stack+0x32d/0x480 [ 472.530621] should_fail+0x11e5/0x13c0 [ 472.534621] __should_failslab+0x278/0x2a0 [ 472.538943] should_failslab+0x29/0x70 [ 472.542909] kmem_cache_alloc+0x146/0xe20 [ 472.547164] ? sock_alloc_inode+0x61/0x300 [ 472.551522] ? sockfs_mount+0xa0/0xa0 [ 472.555427] sock_alloc_inode+0x61/0x300 [ 472.559608] ? sockfs_mount+0xa0/0xa0 [ 472.563490] new_inode_pseudo+0x95/0x460 [ 472.567671] __sys_accept4+0x2df/0x12a0 [ 472.571791] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 472.577360] ? prepare_exit_to_usermode+0x182/0x4c0 [ 472.582469] __se_sys_accept4+0xb7/0xe0 [ 472.586524] __x64_sys_accept4+0x56/0x70 [ 472.590663] do_syscall_64+0xcf/0x110 [ 472.594594] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 472.599854] RIP: 0033:0x457569 [ 472.603124] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.622089] RSP: 002b:00007f6989c4ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 472.629883] RAX: ffffffffffffffda RBX: 00007f6989c4ac90 RCX: 0000000000457569 [ 472.637207] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 472.644599] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 472.651927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c4b6d4 [ 472.659284] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 08:10:27 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:27 executing program 1 (fault-call:1 fault-nth:5): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 472.914111] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 472.965731] FAULT_INJECTION: forcing a failure. [ 472.965731] name failslab, interval 1, probability 0, space 0, times 0 [ 472.977245] CPU: 0 PID: 12335 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #89 [ 472.984580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.993978] Call Trace: [ 472.996687] dump_stack+0x32d/0x480 [ 473.000431] should_fail+0x11e5/0x13c0 [ 473.004472] __should_failslab+0x278/0x2a0 [ 473.008790] should_failslab+0x29/0x70 [ 473.012783] __kmalloc+0xcf/0x4d0 [ 473.016316] ? apparmor_file_alloc_security+0x240/0x700 [ 473.021763] apparmor_file_alloc_security+0x240/0x700 [ 473.027063] ? apparmor_file_permission+0x4d0/0x4d0 [ 473.032233] security_file_alloc+0xcf/0x1a0 [ 473.036692] __alloc_file+0x22b/0x7b0 [ 473.040638] alloc_empty_file+0x1f5/0x4b0 [ 473.044868] alloc_file+0xdb/0x8c0 [ 473.048523] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 473.054077] ? d_instantiate+0x11e/0x190 [ 473.058217] alloc_file_pseudo+0x3ff/0x4e0 [ 473.062598] __shmem_file_setup+0x3ef/0x5d0 [ 473.067047] shmem_zero_setup+0x12a/0x610 [ 473.071330] mmap_region+0x2e4d/0x4910 [ 473.075420] do_mmap+0x182d/0x1e60 [ 473.079123] vm_mmap_pgoff+0x328/0x450 [ 473.083111] ksys_mmap_pgoff+0x27e/0xaf0 [ 473.087275] __se_sys_mmap+0x172/0x1a0 [ 473.091286] __x64_sys_mmap+0x69/0x90 [ 473.095200] do_syscall_64+0xcf/0x110 [ 473.099106] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 473.104364] RIP: 0033:0x457569 [ 473.107641] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.126612] RSP: 002b:00007f3f3ed26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 473.134395] RAX: ffffffffffffffda RBX: 00007f3f3ed26c90 RCX: 0000000000457569 [ 473.141738] RDX: 0000000000000000 RSI: 0000000000e7e000 RDI: 0000000020000000 [ 473.149069] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 473.156419] R10: 0000000000000031 R11: 0000000000000246 R12: 00007f3f3ed276d4 08:10:28 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 473.163758] R13: 00000000004c2b5d R14: 00000000004d4828 R15: 0000000000000003 08:10:28 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:28 executing program 4 (fault-call:6 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:28 executing program 1 (fault-call:1 fault-nth:6): prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 473.574694] FAULT_INJECTION: forcing a failure. [ 473.574694] name failslab, interval 1, probability 0, space 0, times 0 [ 473.586641] CPU: 1 PID: 12351 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 473.593988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.603393] Call Trace: [ 473.606085] dump_stack+0x32d/0x480 [ 473.609825] ? __should_failslab+0x278/0x2a0 [ 473.614344] should_fail+0x11e5/0x13c0 [ 473.618358] __should_failslab+0x278/0x2a0 [ 473.622721] should_failslab+0x29/0x70 [ 473.626682] __kmalloc+0xcf/0x4d0 [ 473.630291] ? sock_alloc_inode+0xda/0x300 [ 473.634659] sock_alloc_inode+0xda/0x300 [ 473.638816] ? sockfs_mount+0xa0/0xa0 [ 473.642697] new_inode_pseudo+0x95/0x460 [ 473.646912] __sys_accept4+0x2df/0x12a0 [ 473.651026] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 473.656597] ? prepare_exit_to_usermode+0x182/0x4c0 [ 473.661692] __se_sys_accept4+0xb7/0xe0 [ 473.665751] __x64_sys_accept4+0x56/0x70 [ 473.669899] do_syscall_64+0xcf/0x110 [ 473.673785] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 473.679110] RIP: 0033:0x457569 [ 473.682555] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.701518] RSP: 002b:00007f6989c29c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 473.709302] RAX: ffffffffffffffda RBX: 00007f6989c29c90 RCX: 0000000000457569 [ 473.716624] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 08:10:28 executing program 1: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffffffffff99, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={r2, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000300)={r2, 0x1000}, 0x8) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000040)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x4) [ 473.723983] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 473.731311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c2a6d4 [ 473.738688] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 [ 473.901714] FAULT_INJECTION: forcing a failure. [ 473.901714] name failslab, interval 1, probability 0, space 0, times 0 [ 473.913276] CPU: 1 PID: 12343 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #89 [ 473.920622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.930036] Call Trace: [ 473.932706] dump_stack+0x32d/0x480 [ 473.936459] ? __should_failslab+0x278/0x2a0 [ 473.940983] should_fail+0x11e5/0x13c0 [ 473.945018] __should_failslab+0x278/0x2a0 [ 473.949362] should_failslab+0x29/0x70 [ 473.953361] __kmalloc+0xcf/0x4d0 [ 473.956903] ? devinet_ioctl+0x14f1/0x2680 [ 473.961266] devinet_ioctl+0x14f1/0x2680 [ 473.965496] inet_ioctl+0x79d/0xa30 [ 473.969263] ? __msan_poison_alloca+0x1e0/0x270 [ 473.974061] ? inet_shutdown+0x600/0x600 [ 473.978364] sock_do_ioctl+0x16b/0x730 [ 473.982378] ? sock_ioctl+0xb0/0xe00 [ 473.986183] ? do_vfs_ioctl+0xfbc/0x2f70 [ 473.990360] sock_ioctl+0x81b/0xe00 [ 473.994094] ? do_vfs_ioctl+0x184/0x2f70 [ 473.998284] ? __se_sys_ioctl+0x1da/0x270 [ 474.002533] ? sock_poll+0x4c0/0x4c0 [ 474.006328] do_vfs_ioctl+0xfbc/0x2f70 [ 474.010364] ? security_file_ioctl+0x92/0x200 [ 474.014932] __se_sys_ioctl+0x1da/0x270 [ 474.018996] __x64_sys_ioctl+0x4a/0x70 [ 474.022978] do_syscall_64+0xcf/0x110 [ 474.026882] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 474.032128] RIP: 0033:0x457569 08:10:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 474.035394] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.054356] RSP: 002b:00007fe8ea3c4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 474.062136] RAX: ffffffffffffffda RBX: 00007fe8ea3c4c90 RCX: 0000000000457569 [ 474.069466] RDX: 0000000020000180 RSI: 0000000000008916 RDI: 0000000000000003 [ 474.076789] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 474.084147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe8ea3c56d4 [ 474.091478] R13: 00000000004c2548 R14: 00000000004d3e50 R15: 0000000000000004 08:10:29 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x400) write$9p(r0, &(0x7f0000000040)="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", 0x1000) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 474.325054] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:29 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 08:10:29 executing program 4 (fault-call:6 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:29 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:29 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) 08:10:30 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) nanosleep(&(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 474.968772] FAULT_INJECTION: forcing a failure. [ 474.968772] name failslab, interval 1, probability 0, space 0, times 0 [ 474.980290] CPU: 1 PID: 12394 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 474.987642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.997062] Call Trace: [ 474.999743] dump_stack+0x32d/0x480 [ 475.003495] ? __should_failslab+0x278/0x2a0 [ 475.008022] should_fail+0x11e5/0x13c0 [ 475.012062] __should_failslab+0x278/0x2a0 [ 475.016382] should_failslab+0x29/0x70 [ 475.020373] kmem_cache_alloc+0x146/0xe20 [ 475.024595] ? __d_alloc+0xd2/0xdd0 [ 475.028343] ? __msan_poison_alloca+0x1e0/0x270 [ 475.033111] __d_alloc+0xd2/0xdd0 [ 475.036685] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 475.042183] d_alloc_pseudo+0x68/0x80 [ 475.046122] alloc_file_pseudo+0x19f/0x4e0 [ 475.050468] sock_alloc_file+0x1b0/0x5f0 [ 475.054654] __sys_accept4+0x6ea/0x12a0 [ 475.058765] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 475.064367] ? prepare_exit_to_usermode+0x182/0x4c0 [ 475.069473] __se_sys_accept4+0xb7/0xe0 [ 475.073533] __x64_sys_accept4+0x56/0x70 [ 475.077656] do_syscall_64+0xcf/0x110 [ 475.081541] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 475.086792] RIP: 0033:0x457569 [ 475.090061] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.109035] RSP: 002b:00007f6989c29c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 08:10:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 475.116820] RAX: ffffffffffffffda RBX: 00007f6989c29c90 RCX: 0000000000457569 [ 475.124153] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 475.131479] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 475.138832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c2a6d4 [ 475.146172] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 08:10:30 executing program 0 (fault-call:5 fault-nth:0): socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 475.283211] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:30 executing program 1: socketpair(0x4, 0x5, 0x400, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x8, 0x72, 0x4, 0x0, 0x5, 0x7, 0xffffffffffffd200, 0x8001, 0x9, 0x8, 0xfffffffffffffffb, 0xff, 0x0, 0x6, 0x192, 0x8, 0x2, 0x4, 0x1}) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:30 executing program 4 (fault-call:6 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:30 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:31 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:31 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x1) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x16, 0x4c, &(0x7f0000000040)="3298f387361ba527531fdbb446bc87dc13cf76cea966cc0bb07ef00fd754fda121bc0100a3df0b7d9c70b169273745f081a9f892a0bbb77f13a6744430adb8bf77fe50d82d7d227bd3f0f837"}) fstatfs(r0, &(0x7f00000001c0)=""/116) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x2081fd) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 08:10:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 476.076208] FAULT_INJECTION: forcing a failure. [ 476.076208] name failslab, interval 1, probability 0, space 0, times 0 [ 476.081315] FAULT_INJECTION: forcing a failure. [ 476.081315] name failslab, interval 1, probability 0, space 0, times 0 [ 476.087934] CPU: 0 PID: 12427 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 476.106204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.115607] Call Trace: [ 476.118276] dump_stack+0x32d/0x480 [ 476.121992] ? __should_failslab+0x278/0x2a0 [ 476.126502] should_fail+0x11e5/0x13c0 [ 476.130574] __should_failslab+0x278/0x2a0 [ 476.134920] should_failslab+0x29/0x70 [ 476.138892] __kmalloc+0xcf/0x4d0 [ 476.142416] ? devinet_ioctl+0x14f1/0x2680 [ 476.146748] devinet_ioctl+0x14f1/0x2680 [ 476.150937] inet_ioctl+0x79d/0xa30 [ 476.154756] ? __msan_poison_alloca+0x1e0/0x270 [ 476.159528] ? inet_shutdown+0x600/0x600 [ 476.163694] sock_do_ioctl+0x16b/0x730 [ 476.167725] ? sock_ioctl+0xb0/0xe00 [ 476.171533] ? do_vfs_ioctl+0xfbc/0x2f70 [ 476.175683] sock_ioctl+0x81b/0xe00 [ 476.179401] ? do_vfs_ioctl+0x184/0x2f70 [ 476.183540] ? __se_sys_ioctl+0x1da/0x270 [ 476.187784] ? sock_poll+0x4c0/0x4c0 [ 476.191560] do_vfs_ioctl+0xfbc/0x2f70 [ 476.195566] ? security_file_ioctl+0x92/0x200 [ 476.200177] __se_sys_ioctl+0x1da/0x270 [ 476.204244] __x64_sys_ioctl+0x4a/0x70 [ 476.208195] do_syscall_64+0xcf/0x110 [ 476.212077] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 476.217357] RIP: 0033:0x457569 [ 476.220625] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.239578] RSP: 002b:00007fe20f518c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.247353] RAX: ffffffffffffffda RBX: 00007fe20f518c90 RCX: 0000000000457569 [ 476.254673] RDX: 0000000020000180 RSI: 0000000000008916 RDI: 0000000000000003 [ 476.261990] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.269326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f5196d4 [ 476.276689] R13: 00000000004c2548 R14: 00000000004d3e50 R15: 0000000000000005 [ 476.284046] CPU: 1 PID: 12419 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 476.291381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.300784] Call Trace: [ 476.303461] dump_stack+0x32d/0x480 [ 476.307177] should_fail+0x11e5/0x13c0 [ 476.311177] __should_failslab+0x278/0x2a0 [ 476.315539] should_failslab+0x29/0x70 [ 476.319503] kmem_cache_alloc+0x146/0xe20 [ 476.323759] ? __alloc_file+0xd2/0x7b0 [ 476.327775] ? __msan_poison_alloca+0x1e0/0x270 [ 476.332584] __alloc_file+0xd2/0x7b0 [ 476.336426] alloc_empty_file+0x1f5/0x4b0 [ 476.340671] alloc_file+0xdb/0x8c0 [ 476.344334] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 476.349879] ? d_instantiate+0x11e/0x190 [ 476.354064] alloc_file_pseudo+0x3ff/0x4e0 [ 476.358497] sock_alloc_file+0x1b0/0x5f0 [ 476.362697] __sys_accept4+0x6ea/0x12a0 [ 476.366822] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 476.372366] ? prepare_exit_to_usermode+0x182/0x4c0 [ 476.377475] __se_sys_accept4+0xb7/0xe0 [ 476.381530] __x64_sys_accept4+0x56/0x70 [ 476.385672] do_syscall_64+0xcf/0x110 [ 476.389547] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 476.394794] RIP: 0033:0x457569 [ 476.398061] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.417022] RSP: 002b:00007f6989c4ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 476.424796] RAX: ffffffffffffffda RBX: 00007f6989c4ac90 RCX: 0000000000457569 [ 476.432408] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 476.439729] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.447053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c4b6d4 [ 476.454378] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 [ 476.465053] FAULT_INJECTION: forcing a failure. [ 476.465053] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 476.477162] CPU: 1 PID: 12415 Comm: syz-executor0 Not tainted 4.20.0-rc3+ #89 [ 476.484495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.493899] Call Trace: [ 476.496558] dump_stack+0x32d/0x480 [ 476.500295] should_fail+0x11e5/0x13c0 [ 476.504281] __alloc_pages_nodemask+0x73f/0x63e0 [ 476.509104] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 476.514613] ? __save_stack_trace+0x9f2/0xc60 [ 476.519208] ? __msan_metadata_ptr_for_load_8+0x10/0x20 08:10:31 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 476.524661] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 476.529894] alloc_pages_current+0x55d/0x7d0 [ 476.534389] __get_free_pages+0x33/0xc0 [ 476.538452] __tlb_remove_page_size+0x341/0x560 [ 476.543203] unmap_page_range+0x23df/0x3950 [ 476.547728] unmap_single_vma+0x43f/0x5e0 [ 476.551970] unmap_vmas+0x251/0x380 [ 476.555860] exit_mmap+0x51e/0xa10 [ 476.559480] ? __khugepaged_exit+0x6e9/0x8b0 [ 476.564429] __mmput+0x17a/0x700 [ 476.567877] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 476.573348] mmput+0x190/0x210 [ 476.576665] exit_mm+0xa90/0xc70 [ 476.580122] do_exit+0x10f2/0x4070 [ 476.583802] do_group_exit+0x1a7/0x350 [ 476.587790] get_signal+0x11e2/0x2330 [ 476.591725] ? do_signal+0x1dd/0x2fc0 [ 476.595638] ? prepare_exit_to_usermode+0x2c9/0x4c0 [ 476.600751] do_signal+0x1f3/0x2fc0 [ 476.604512] ? kmsan_set_origin+0x7f/0x100 [ 476.608868] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 476.614315] prepare_exit_to_usermode+0x2c9/0x4c0 [ 476.619244] syscall_return_slowpath+0xed/0x730 [ 476.624018] do_syscall_64+0xf5/0x110 [ 476.627920] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 476.633276] RIP: 0033:0x457569 [ 476.636539] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.655497] RSP: 002b:00007fc53df9ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 476.663297] RAX: fffffffffffffdfe RBX: 00007fc53df9ec90 RCX: 0000000000457569 [ 476.670634] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 00000000200001c0 08:10:31 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x200280) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x0, 0x4}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x1) [ 476.677962] RBP: 000000000072bfa0 R08: 0000000000000008 R09: 0000000000000000 [ 476.685304] R10: 0000000020000240 R11: 0000000000000246 R12: 00007fc53df9f6d4 [ 476.692630] R13: 00000000004c33a8 R14: 00000000004d5668 R15: 0000000000000004 [ 476.799656] FAULT_INJECTION: forcing a failure. [ 476.799656] name failslab, interval 1, probability 0, space 0, times 0 [ 476.811338] CPU: 0 PID: 12434 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #89 [ 476.818675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.828077] Call Trace: [ 476.830750] dump_stack+0x32d/0x480 [ 476.834469] should_fail+0x11e5/0x13c0 [ 476.838525] __should_failslab+0x278/0x2a0 [ 476.842847] should_failslab+0x29/0x70 [ 476.846835] __kmalloc_node_track_caller+0x279/0x14e0 [ 476.852132] ? __msan_get_context_state+0x9/0x20 [ 476.856949] ? INIT_INT+0xc/0x30 [ 476.860386] ? kmem_cache_alloc_node+0x27b/0xec0 [ 476.865248] ? rtmsg_ifa+0x232/0x4e0 [ 476.869043] ? rtmsg_ifa+0x232/0x4e0 [ 476.872857] __alloc_skb+0x42b/0xeb0 [ 476.876662] ? __msan_poison_alloca+0x1e0/0x270 [ 476.881461] rtmsg_ifa+0x232/0x4e0 [ 476.885137] __inet_del_ifa+0x1329/0x1980 [ 476.889420] devinet_ioctl+0x166e/0x2680 [ 476.893613] inet_ioctl+0x79d/0xa30 [ 476.897375] ? __msan_poison_alloca+0x1e0/0x270 [ 476.902175] ? inet_shutdown+0x600/0x600 [ 476.906355] sock_do_ioctl+0x16b/0x730 [ 476.910377] ? sock_ioctl+0xb0/0xe00 [ 476.914182] ? do_vfs_ioctl+0xfbc/0x2f70 [ 476.918360] sock_ioctl+0x81b/0xe00 [ 476.922093] ? do_vfs_ioctl+0x184/0x2f70 [ 476.926259] ? __se_sys_ioctl+0x1da/0x270 [ 476.930512] ? sock_poll+0x4c0/0x4c0 [ 476.934301] do_vfs_ioctl+0xfbc/0x2f70 [ 476.938338] ? security_file_ioctl+0x92/0x200 [ 476.942921] __se_sys_ioctl+0x1da/0x270 [ 476.946976] __x64_sys_ioctl+0x4a/0x70 [ 476.950931] do_syscall_64+0xcf/0x110 [ 476.954820] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 476.960076] RIP: 0033:0x457569 [ 476.963346] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.982308] RSP: 002b:00007fe20f518c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.990110] RAX: ffffffffffffffda RBX: 00007fe20f518c90 RCX: 0000000000457569 08:10:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 476.997441] RDX: 0000000020000180 RSI: 0000000000008916 RDI: 0000000000000003 [ 477.004785] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.012140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe20f5196d4 [ 477.019464] R13: 00000000004c2548 R14: 00000000004d3e50 R15: 0000000000000005 [ 477.067549] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:32 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x10000200, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) clock_gettime(0x2, &(0x7f0000000040)={0x0, 0x0}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x80, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x1, 0x10000, 0x8}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) 08:10:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101200, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) 08:10:32 executing program 4 (fault-call:6 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:32 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x81) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 477.616743] FAULT_INJECTION: forcing a failure. [ 477.616743] name failslab, interval 1, probability 0, space 0, times 0 [ 477.628352] CPU: 1 PID: 12460 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 477.635684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.645116] Call Trace: [ 477.647878] dump_stack+0x32d/0x480 [ 477.651632] should_fail+0x11e5/0x13c0 [ 477.655700] __should_failslab+0x278/0x2a0 [ 477.660077] should_failslab+0x29/0x70 [ 477.664033] __kmalloc+0xcf/0x4d0 [ 477.667668] ? apparmor_file_alloc_security+0x240/0x700 [ 477.673158] apparmor_file_alloc_security+0x240/0x700 [ 477.678426] ? apparmor_file_permission+0x4d0/0x4d0 [ 477.683527] security_file_alloc+0xcf/0x1a0 [ 477.687972] __alloc_file+0x22b/0x7b0 [ 477.691860] alloc_empty_file+0x1f5/0x4b0 [ 477.696102] alloc_file+0xdb/0x8c0 [ 477.699725] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 477.705259] ? d_instantiate+0x11e/0x190 [ 477.709407] alloc_file_pseudo+0x3ff/0x4e0 [ 477.713776] sock_alloc_file+0x1b0/0x5f0 [ 477.718006] __sys_accept4+0x6ea/0x12a0 [ 477.722109] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 477.727660] ? prepare_exit_to_usermode+0x182/0x4c0 [ 477.732760] __se_sys_accept4+0xb7/0xe0 [ 477.736832] __x64_sys_accept4+0x56/0x70 [ 477.740974] do_syscall_64+0xcf/0x110 [ 477.744877] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 477.750121] RIP: 0033:0x457569 [ 477.753383] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.772346] RSP: 002b:00007f6989c29c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 477.780130] RAX: ffffffffffffffda RBX: 00007f6989c29c90 RCX: 0000000000457569 [ 477.787458] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 477.794790] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 477.802124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c2a6d4 [ 477.809462] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 08:10:32 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000080)=0x80, 0x80800) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 477.855243] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:33 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x808000fff, 0x80000) r1 = getegid() setfsgid(r1) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x1, 0xffffffffffffff9c, 0x1}) poll(&(0x7f0000000040)=[{r0, 0x40}, {r2}], 0x2, 0x4) 08:10:33 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43, 0x9, 0x2, {0xfff, 0x3, 0x7, 0x400, 0x3ff, 0x5, 0x8, 0x3, 0x6}}, 0x43) 08:10:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/182) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x7, 0x10001, 0x8}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x7}, 0x8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) socketpair(0x10, 0x6, 0x100000001, &(0x7f0000000000)) 08:10:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20000, 0x0) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:33 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:33 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0xd000, 0x4000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:34 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:34 executing program 4 (fault-call:6 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x200, 0x2) 08:10:34 executing program 1: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8, 0x8}, {0x7, 0x5e705bc5}]}, 0x14, 0x3) prctl$PR_SET_THP_DISABLE(0x29, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_FPEXC(0xc, 0x20000) 08:10:34 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x200000) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) 08:10:34 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x20000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/215) prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 479.735466] FAULT_INJECTION: forcing a failure. [ 479.735466] name failslab, interval 1, probability 0, space 0, times 0 [ 479.736573] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 479.747069] CPU: 0 PID: 12507 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 479.764401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.773820] Call Trace: [ 479.776573] dump_stack+0x32d/0x480 [ 479.780311] should_fail+0x11e5/0x13c0 [ 479.784364] __should_failslab+0x278/0x2a0 [ 479.788783] should_failslab+0x29/0x70 [ 479.792746] kmem_cache_alloc+0x146/0xe20 [ 479.796966] ? sock_alloc_inode+0x61/0x300 [ 479.801325] ? sockfs_mount+0xa0/0xa0 [ 479.805242] sock_alloc_inode+0x61/0x300 [ 479.809410] ? sockfs_mount+0xa0/0xa0 [ 479.813293] new_inode_pseudo+0x95/0x460 [ 479.817470] __sys_accept4+0x2df/0x12a0 [ 479.821524] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 479.827045] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 479.832856] ? prepare_exit_to_usermode+0x182/0x4c0 [ 479.837959] __se_sys_accept4+0xb7/0xe0 [ 479.842013] __x64_sys_accept4+0x56/0x70 [ 479.846141] do_syscall_64+0xcf/0x110 [ 479.850020] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 479.855274] RIP: 0033:0x457569 [ 479.858536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.877499] RSP: 002b:00007f6989c29c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 479.885316] RAX: ffffffffffffffda RBX: 00007f6989c29c90 RCX: 0000000000457569 [ 479.892645] RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 479.899983] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 479.907322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6989c2a6d4 [ 479.914668] R13: 00000000004bd59d R14: 00000000004cc650 R15: 0000000000000007 08:10:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x8002}) 08:10:35 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={0x5}, &(0x7f0000000040), 0x8) 08:10:35 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000c91000/0x2000)=nil, 0x2000, 0x1000002, 0x31, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x10, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001080)=r0, 0x4) 08:10:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:35 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) socketpair(0x15, 0x7, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="ff00b48000000000", @ANYRES32=r1, @ANYBLOB="0908000006000008010000800600000038b1838b4eba1cd293add600b0911251ebdfaed759d94efcf3fca472086ed7987528fc2dfc660529f515a4f82d82d92d146b432a4fe7ebae06cb584a871181e01a9c32e8126c7dc476d135bb03bbb0289085d6db453c65c6b87830fb240616ca5fe1725db02678edbbf9b17f9b445dda8c16bbc23b92cc9f85a0ced7c4126bf7b1f262c72a877f93e04fa212ff815dd8a7f50e820f0811b16497fbbab7e27b251083080172408c5a404cb15df954f0304a67857b65f794035d2d47a3bba3017adaafabb85368b054a24d6545d33ed7ad34b8f6b355e9e8460dada131dda810bd28bcab56a1292b1216"]) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000001c0)=0x4, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000580)={0x0, 0x0, 0x9, 0x0, [], [{0x9, 0x5, 0x9, 0xcf6, 0x7, 0x6}, {0x200, 0x1, 0xff, 0x3, 0x0, 0x6}], [[], [], [], [], [], [], [], [], []]}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x4ec23f0c}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r3, 0x80000000}, 0x8) socket$inet6_dccp(0xa, 0x6, 0x0) write$sndseq(r1, &(0x7f0000000300)=[{0x1, 0x10001, 0x4, 0x219e, @time={0x77359400}, {0x80, 0x1000}, {0x2, 0x5}, @control={0x2, 0xffff, 0x4}}, {0x514466cf, 0x4, 0x6, 0x6, @tick=0xd9, {0x6, 0x1a48}, {0x3f, 0x5}, @raw32={[0x1, 0x2, 0x9]}}, {0xff, 0x200, 0x9, 0x5, @time={0x0, 0x989680}, {0x3, 0x8000}, {0x4}, @raw32={[0x80, 0x8001, 0x100]}}], 0x90) 08:10:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x3f, &(0x7f0000000180)=0x101, 0x4) accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r4+10000000}}, &(0x7f0000000080)) tkill(r3, 0x1004000000016) connect$inet6(r2, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:35 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200, 0xa9) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000240)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x280600, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xd0, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x80000001, @empty, 0x9}, @in={0x2, 0x4e20, @rand_addr=0x3ff8000000000000}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0xb6, @loopback, 0x7}, @in={0x2, 0x3ff}, @in={0x2, 0x4e20, @rand_addr=0x8001}, @in6={0xa, 0x4e21, 0xea2, @mcast2, 0x6}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x9, @local, 0x8}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x5}, 0x8) 08:10:35 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)) 08:10:35 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2002, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x430, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0xfc6ae37671256782}, 0x20000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={"7665740300000000000000616d00"}) [ 480.927007] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 480.979873] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:10:36 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)) 08:10:36 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4, 0x40) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000000)=""/25) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x3, 0x200) sendmsg$alg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000004c0)="7c0a52d186bf3a6ac7e3692f251bc53d527621acb615c14ce955939f93e9b331d0a53f4ead404dba597f703e03b8348a199d5674be2819071bcd53430c20f1bb0d8c8913488329b83bfb0559e2fe08df44a3b76fb805b7e9a34bfb07e2bfe41a559a487af461f40d86df70cc115bbcb15675e511a8a4103bfbf2946c78eb5af9f12b71bf29b08f80f9779977e3e7e2fa37adca422afe552848824959c23a9632853d3e91e38637ccfa1f33e8c3a7912c1cde73c10cf42fdb0bc10550cae5f913183fc50533e897022907a4dfe436d23a72631c74261f6b9e631ce493245a9f4319044ecd90765b52c8ad35dea7bb1c26fd28633951578997eb0bd6", 0xfb}, {&(0x7f00000005c0)="04b26cffdc0d8a9ed927df7ce317c98ffa4a5e94e6c582aa683668047755275846548b1fc268bbe3d6c8fe6c034b546193a939549892a3343cfd1f4232544ec36fe33698cb1ab4fbb07247fae2afee1aaf14a7e13d3f648250a5403c346dbfb819406cf621019e1987c6cc915e63f2f710abe0e44a9307aea5dd89446e53e5874d3c780fd74cd5b01f540caeab9f0980322ba0b605ad5e72296b45f5f434c209fdced486bf8797f15c492a0265725c40a3ebb5101a54b264be0ed27c8c8c0d34cfe0922f19aeef150cbfbddf0a81208c0471f06a8332ba6c03110b60c6fc3f457b404867ee8e", 0xe6}, {&(0x7f00000006c0)="d099e5d7cc569de55ee9536fc9dbf5a837d83931f3bf409406d0f35cbda55acba75e79ef070ad96804729ae593ac140b84fb487719bd27745107665d08", 0x3d}, {&(0x7f0000000700)="884e05fa2807479c88ac4703b45fd25d672690c687c9be974f4de01e78018206a27b2b74b843fe056d516a156a22e31e07e1cb099ea600162c1ffab2c4fe9fec1788aa6b5a8885f66bb78da2d8166065711c60", 0x53}, {&(0x7f0000000780)="a528e0512032f8d35568fe5dfa83710b1a1166d9cf839675eeb83a225ff2b7bffa3c3fb729c94d30872b65674a4fd732cbe942728bf5788d4edb0094260a4831405af986fe8b0fb5a77245ee43", 0x4d}, {&(0x7f0000000800)="cae525557740c153005107b1514b836c7a86f69c6129ade249ecfc88a5d8aae4213fb2ed12aa198cf6458653e33e9907ecd06a9b28e5534f13c2a2570b22f49a506db1e444b569b1d436d66863c9b9ed04ed8143379f197b4417348ba0275b4f9062e6b423db8428c6acb7a433981f82a78bb68cfb14942abb2426145c6e6d43e5e59577b01a70cf8b1af1ad521d1a9e47b1716c2d789f09fb0bfd83c5e3d32ea04b75c006c0356f67d5551c00ff92b2cfd9818b7af65ebbec2864dd1fab8653e14f6235e9b2d62c10528841904fd1357bfe48fea5e938912660ff35050fe1d26f0fe421f5692ed0", 0xe8}, {&(0x7f0000000900)="a19cb80f8f4c0c5638938c94911415a792f389fc3f41ec3bddd09293bd5a84fc8a5c962e2535065e352dc4167172555db65df154049ea627ada10f871f0cb432f27cd99ab4e1f01338ad9a410be9406f89b9559ad9aad8857ab67c98b70d22951ee3982f296931ffe1fdf2", 0x6b}], 0x7, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x200, 0x20008800}, 0x24000010) [ 481.356014] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 08:10:36 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f00003ce000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) accept4$unix(r0, 0x0, &(0x7f0000000040), 0x80000) 08:10:36 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xafc6, 0x90080) fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00]) shmget(0x1, 0x3000, 0x54000000, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x12}, 0x60148ce1}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={r3, 0xf6c}, 0x8) write$P9_RGETATTR(r0, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x200, {0xa, 0x0, 0x5}, 0xc0, r1, r2, 0x5, 0x10001, 0x4, 0x3, 0x1c, 0x8, 0x7ff, 0x3, 0x8, 0x100, 0x8, 0x5000, 0xca, 0x7a6, 0x200}}, 0xa0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x10) 08:10:36 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x2) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x9e, 0x5, 0x6}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) clock_gettime(0x2, &(0x7f0000000000)) 08:10:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x5, 0x898c, 0x3, 0x0, 0x9, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x3ff, 0x7f, 0xc, 0xffff, 0x80000000, 0xffffffffffff3b1d, 0x100, 0xe68, 0x8, 0x23, 0x3, 0x0, 0x1f, 0xa22, 0x6, 0x4, 0x0, 0x20, 0x7, 0x9, 0x80000000, 0x3f, 0xe032, 0x7, 0x10000, 0x6, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000000), 0x8}, 0x20002, 0x1, 0x100000001, 0x3, 0x5, 0x7, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffff9c, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xff, 0xa0000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000001c0)=0x7, 0x8) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x5, 0x4]) socketpair(0xb, 0x4, 0x4f95, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000001840)={0x0, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f0000001900)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000001940)={0x0, @in6={{0xa, 0x4e23, 0x2, @local, 0x7fffffff}}, 0x5, 0xffffffff, 0x3370, 0xb44, 0xffff}, &(0x7f0000001a00)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000001a40)={0x0, 0x3, 0x5}, &(0x7f0000001a80)=0x8) write$P9_RSETATTR(r4, &(0x7f0000000100)={0x7, 0x1b, 0x2}, 0x7) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000001ac0)={0x0, 0x401, 0x7}, &(0x7f0000001b00)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000001c40)={&(0x7f00000005c0)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="35c3fa239e80180a1bf514c77a39a9da00369d32c344298163fafd4f86b2867de5d216e27415db016c43baa907600081cfedd0394edc36a546fac3309c08c441318398b7386a08c5a9c9f173aa7c021b954d90cc0bb701bb37d26a2339048b2584d18753a658609aaa2256f0e6f507049424abe8d4ca3e791a39482c75affd960ef7809c9fc5c4c0fa001ac7952a", 0x8e}, {&(0x7f00000016c0)="8243fbbe9ddd9d4e27f4ab06968b8887b9326d1eefd1e2155381c562bb2ffd23fdb25f95fb245c25ba647fd3214619b5d3d469f978c5a9326bed07d1e8f154f805b092f26b5c7b15ca47de263820a44977cd5f648ce2ffb52222f15d85c01e726ebf91d1e275f5a44f8dc56fab223a1ed316877853258ef10cceff74db943f97f5e9634557a52208378a6b1f1561f3", 0x8f}, {&(0x7f0000001780)="fe0ef194a29ee2f9fa255543a778b4e8516dc03990fc963c01d642ae5d09dfecfe1db5680d1e3f8dae6f93ca2268856fa76822d4d3cf7ed8f659c54aaa094bd39f6aa22e5a5e50cb52e53dbe72d21eac25df15bb441dde1b41e955fdc999c9d4e745ddf79efa91d931d39bd0b167f9f7e744f7ca89", 0x75}], 0x4, &(0x7f0000001b40)=[@init={0x18, 0x84, 0x0, {0x75, 0x7, 0x100000000, 0x9}}, @sndrcv={0x30, 0x84, 0x1, {0xff, 0x6, 0x8007, 0x0, 0x7, 0xfffffffffffffffe, 0x88, 0xffffffffffffffe7, r5}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x8, 0x4, 0x3, r6}}, @init={0x18, 0x84, 0x0, {0xc7bc, 0x5, 0x3, 0x100000001}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x3, 0x208, 0x1, 0x0, 0xbdd, 0x3ff, 0x69, r7}}, @authinfo={0x18, 0x84, 0x6, {0xff}}, @sndinfo={0x20, 0x84, 0x2, {0xd6, 0x0, 0x100000000, 0x10000, r8}}], 0xe8, 0x800}, 0x20000800) 08:10:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) dup(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 08:10:37 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, r0, 0x0) 08:10:37 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)) 08:10:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") keyctl$dh_compute(0x1b, &(0x7f0000000080), &(0x7f0000000140)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}, &(0x7f00000001c0)}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, r6+10000000}}, &(0x7f0000000080)) tkill(r5, 0x1004000000016) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000180)=0x3, 0x4) r7 = syz_open_procfs(r5, &(0x7f00000002c0)='net/hci\x00') ioctl$KDGETLED(r7, 0x4b31, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000200)=0x12) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r8, 0x8001}, &(0x7f0000000280)=0x8) connect$inet6(r3, &(0x7f0000002900)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 08:10:37 executing program 0: socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r0+30000000}, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0, 0x10000, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000001c0)={0x100, r2}) 08:10:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000001440)=0x1008) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000001480)={r3, 0x7ff, 0x20}, &(0x7f00000014c0)=0xc) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)=0x0) r6 = getegid() write$P9_RGETATTR(r0, &(0x7f00000015c0)={0xa0, 0x19, 0x1, {0x2125, {0x20, 0x0, 0x6}, 0x41, r5, r6, 0x2, 0x8, 0x7, 0x5, 0x401, 0x80, 0x1000, 0x10000, 0xfffffffffffffffc, 0x800, 0x4, 0x10001, 0x400, 0x4, 0x861b}}, 0xa0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x96}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r7, @in6={{0xa, 0x4e24, 0x3df3, @empty, 0x7}}, 0x4, 0x53}, &(0x7f0000000280)=0x90) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) syz_extract_tcp_res(&(0x7f0000000000), 0x7, 0x8) [ 482.629174] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 08:10:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={"09034eb3d6a500020800", {0x2, 0x0, @rand_addr}}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={{}, {r2, r3/1000+10000}}) r4 = accept(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) pipe(&(0x7f0000000340)) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f00000000c0)=0x7ff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x2, 0xfffffffffffffcca}, &(0x7f0000000140)=0x8) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x2) epoll_create1(0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000001c0)={r6, 0x2, 0x30}, &(0x7f0000000200)=0xc) 08:10:37 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0xfffffffffffffff9) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 08:10:37 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0x8002}) [ 483.087445] FAULT_INJECTION: forcing a failure. [ 483.087445] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.099595] CPU: 0 PID: 12636 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #89 [ 483.106951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.116359] Call Trace: [ 483.119033] dump_stack+0x32d/0x480 [ 483.122807] ? __alloc_pages_nodemask+0x73f/0x63e0 [ 483.127822] should_fail+0x11e5/0x13c0 [ 483.131812] __alloc_pages_nodemask+0x73f/0x63e0 [ 483.136660] ? kmsan_set_origin+0x7f/0x100 [ 483.141051] ? kmsan_internal_unpoison_shadow+0x83/0xd0 [ 483.146539] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 483.151972] ? process_measurement+0x252e/0x2830 [ 483.156810] ? __msan_poison_alloca+0x1e0/0x270 [ 483.161658] alloc_pages_current+0x55d/0x7d0 [ 483.166175] __get_free_pages+0x33/0xc0 [ 483.170247] proc_control+0x389/0x1d30 [ 483.174236] ? __msan_get_context_state+0x9/0x20 [ 483.179059] ? INIT_BOOL+0xc/0x30 [ 483.182584] ? mutex_lock+0x2f7/0x420 [ 483.186506] usbdev_do_ioctl+0x6c35/0xcfb0 [ 483.190836] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 483.196438] ? kstrtoull+0x6fe/0x7e0 [ 483.200315] ? kmsan_set_origin+0x7f/0x100 [ 483.204699] ? kmsan_set_origin+0x7f/0x100 [ 483.209060] ? __msan_poison_alloca+0x1e0/0x270 [ 483.213869] usbdev_ioctl+0x8c/0xb0 [ 483.217615] ? usbdev_poll+0x3f0/0x3f0 [ 483.221568] do_vfs_ioctl+0xfbc/0x2f70 [ 483.225585] ? security_file_ioctl+0x92/0x200 [ 483.230152] __se_sys_ioctl+0x1da/0x270 [ 483.234272] __x64_sys_ioctl+0x4a/0x70 [ 483.238287] do_syscall_64+0xcf/0x110 [ 483.242172] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 483.247435] RIP: 0033:0x457569 [ 483.250704] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.269661] RSP: 002b:00007ff710e97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.277444] RAX: ffffffffffffffda RBX: 00007ff710e97c90 RCX: 0000000000457569 08:10:38 executing program 1: prctl$PR_SET_THP_DISABLE(0x29, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) 08:10:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400200, 0x0) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 08:10:38 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+30000000}, &(0x7f0000000140)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000300)={0xffffffff00000001, {{0xa, 0x4e24, 0x100, @ipv4={[], [], @remote}, 0x9}}}, 0x88) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) [ 483.284817] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000004 [ 483.292158] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 483.299488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff710e986d4 [ 483.306825] R13: 00000000004bf9b9 R14: 00000000004d01d8 R15: 0000000000000005 [ 483.543406] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 483.712533] ================================================================== [ 483.719951] BUG: KMSAN: uninit-value in keyctl_pkey_params_get+0x29c/0x7d0 [ 483.726982] CPU: 0 PID: 12651 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #89 [ 483.734270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.743639] Call Trace: [ 483.746301] dump_stack+0x32d/0x480 [ 483.749959] ? keyctl_pkey_params_get+0x29c/0x7d0 [ 483.754852] kmsan_report+0x19f/0x300 [ 483.758697] __msan_warning+0x76/0xc0 [ 483.762542] keyctl_pkey_params_get+0x29c/0x7d0 [ 483.767311] keyctl_pkey_params_get_2+0x256/0x650 [ 483.772276] keyctl_pkey_e_d_s+0x122/0x700 [ 483.776573] __se_sys_keyctl+0xed6/0x1af0 [ 483.780782] ? prepare_exit_to_usermode+0x182/0x4c0 [ 483.785860] ? syscall_return_slowpath+0xed/0x730 [ 483.790760] ? __msan_get_context_state+0x9/0x20 [ 483.795567] __x64_sys_keyctl+0x62/0x80 [ 483.799573] do_syscall_64+0xcf/0x110 [ 483.803414] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 483.808631] RIP: 0033:0x457569 [ 483.811909] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.830844] RSP: 002b:00007f6989be7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 483.838584] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 483.845883] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 000000000000001b [ 483.853176] RBP: 000000000072c0e0 R08: 00000000200001c0 R09: 0000000000000000 [ 483.860464] R10: 0000000000000053 R11: 0000000000000246 R12: 00007f6989be86d4 [ 483.867747] R13: 00000000004c286f R14: 00000000004d4258 R15: 00000000ffffffff [ 483.875049] [ 483.876688] Local variable description: ----args.i@keyctl_pkey_params_get [ 483.883633] Variable was created at: [ 483.887370] keyctl_pkey_params_get+0xaa/0x7d0 [ 483.891967] keyctl_pkey_params_get_2+0x256/0x650 [ 483.896813] ================================================================== [ 483.904183] Disabling lock debugging due to kernel taint [ 483.909638] Kernel panic - not syncing: panic_on_warn set ... [ 483.915556] CPU: 0 PID: 12651 Comm: syz-executor4 Tainted: G B 4.20.0-rc3+ #89 [ 483.924233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.933601] Call Trace: [ 483.936214] dump_stack+0x32d/0x480 [ 483.939889] panic+0x624/0xc08 [ 483.943153] kmsan_report+0x300/0x300 [ 483.946989] __msan_warning+0x76/0xc0 [ 483.950821] keyctl_pkey_params_get+0x29c/0x7d0 [ 483.955549] keyctl_pkey_params_get_2+0x256/0x650 [ 483.960441] keyctl_pkey_e_d_s+0x122/0x700 [ 483.964718] __se_sys_keyctl+0xed6/0x1af0 [ 483.968902] ? prepare_exit_to_usermode+0x182/0x4c0 [ 483.973951] ? syscall_return_slowpath+0xed/0x730 [ 483.978830] ? __msan_get_context_state+0x9/0x20 [ 483.983607] __x64_sys_keyctl+0x62/0x80 [ 483.987605] do_syscall_64+0xcf/0x110 [ 483.991436] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 483.996640] RIP: 0033:0x457569 [ 483.999851] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.018762] RSP: 002b:00007f6989be7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 484.026488] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 484.033786] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 000000000000001b [ 484.041072] RBP: 000000000072c0e0 R08: 00000000200001c0 R09: 0000000000000000 [ 484.048361] R10: 0000000000000053 R11: 0000000000000246 R12: 00007f6989be86d4 [ 484.055647] R13: 00000000004c286f R14: 00000000004d4258 R15: 00000000ffffffff [ 484.063958] Kernel Offset: disabled [ 484.067597] Rebooting in 86400 seconds..