[ 51.458264] audit: type=1800 audit(1545349809.484:26): pid=6324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.016747] kauditd_printk_skb: 2 callbacks suppressed [ 53.016776] audit: type=1800 audit(1545349811.064:29): pid=6324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 53.041549] audit: type=1800 audit(1545349811.074:30): pid=6324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.86' (ECDSA) to the list of known hosts. 2018/12/20 23:50:24 fuzzer started syzkaller login: [ 69.312754] as (6481) used greatest stack depth: 53728 bytes left 2018/12/20 23:50:28 dialing manager at 10.128.0.26:46613 2018/12/20 23:50:28 syscalls: 1 2018/12/20 23:50:28 code coverage: enabled 2018/12/20 23:50:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 23:50:28 setuid sandbox: enabled 2018/12/20 23:50:28 namespace sandbox: enabled 2018/12/20 23:50:28 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 23:50:28 fault injection: enabled 2018/12/20 23:50:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 23:50:28 net packet injection: enabled 2018/12/20 23:50:28 net device setup: enabled 23:53:10 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20007ffe, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000140), 0x0) [ 233.098006] IPVS: ftp: loaded support on port[0] = 21 [ 234.442225] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.448814] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.457142] device bridge_slave_0 entered promiscuous mode [ 234.535815] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.542419] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.550679] device bridge_slave_1 entered promiscuous mode [ 234.630051] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 234.707648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 234.954593] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.039265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.121314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 235.128334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.208124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 235.215192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.462588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.471260] team0: Port device team_slave_0 added [ 235.551206] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.559753] team0: Port device team_slave_1 added [ 235.639005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.725328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.806840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.814518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.823846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.905443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.913116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.922523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 23:53:14 executing program 1: r0 = socket$nl_xfrm(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 236.372343] IPVS: ftp: loaded support on port[0] = 21 [ 237.711405] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.718188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.725391] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.732009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.741193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.747752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.582985] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.589546] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.597851] device bridge_slave_0 entered promiscuous mode [ 238.770831] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.777466] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.785629] device bridge_slave_1 entered promiscuous mode [ 238.884813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.027826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.334991] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.421127] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.025509] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.034185] team0: Port device team_slave_0 added [ 240.117956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.126661] team0: Port device team_slave_1 added [ 240.275714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 240.284651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.294098] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.471275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.582835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.590462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.599755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.734000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.742195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.751257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 23:53:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 241.625426] IPVS: ftp: loaded support on port[0] = 21 [ 242.571021] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.577717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.585032] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.591619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.600864] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.607441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.441505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.004197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.333718] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.340269] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.348733] device bridge_slave_0 entered promiscuous mode [ 244.556319] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.562930] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.571079] device bridge_slave_1 entered promiscuous mode [ 244.589999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.596384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.604474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.740750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 244.897932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 245.304082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.327107] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.519178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.690843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.697911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.889881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.896979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.306567] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.315163] team0: Port device team_slave_0 added [ 246.463220] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.471957] team0: Port device team_slave_1 added [ 246.650241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.657394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.666356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.829313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.836423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.845475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.950053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.957799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.966947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.068499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.076192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.085322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.883197] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.889786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.897019] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.903622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.913057] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.919575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:53:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x7, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) [ 249.153688] 8021q: adding VLAN 0 to HW filter on device bond0 23:53:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0x1d, 0x3, 0x0, "616052eabcab615670171e305f4522b0d2cae32de2031dbe6cde243bbf3da078"}) 23:53:27 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x3, 0x0, 0xfffffdfd, 0xfdfdffff}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") dup3(r1, r2, 0x0) dup3(r1, r0, 0x0) [ 249.833499] IPVS: ftp: loaded support on port[0] = 21 23:53:27 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x32400) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) [ 250.000233] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 23:53:28 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000140)={0x0, 0xa, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c4448e44"}, 0x0, 0x0, @fd, 0x4}) 23:53:28 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7, 0x200000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x41, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000002c0)={0xf000, &(0x7f0000000240), 0x4, r1, 0x1}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x230000, 0x1) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @broadcast}, {0x306, @random="62943c39c948"}, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 'syzkaller1\x00'}) sendto$inet6(r2, &(0x7f0000000100)="9bba97ebbf407865aae8f6460f3c716fb5244486212560cd46fd16c50dbeb21088fb05ce83b9b0561f140a16442f989be3bd67", 0x33, 0x10, &(0x7f0000000140)={0xa, 0x4e24, 0x401, @remote, 0x1f}, 0x1c) r3 = socket$inet6(0xa, 0x0, 0x2000001) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x400, 0x4) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000001c0)=0x2, 0xffffffffffffffc6) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 23:53:28 executing program 0: getgroups(0x20b, &(0x7f0000000280)) keyctl$chown(0x4, 0x0, 0x0, 0x0) 23:53:28 executing program 0: r0 = inotify_init1(0x800) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x20000000000000dd, 0x0, 0x0, 0x0) [ 250.763148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.769509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.777492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:53:29 executing program 0: r0 = epoll_create1(0x0) r1 = syz_open_dev$sndseq(&(0x7f0000f8eff3)='/dev/snd/seq\x00', 0x0, 0x20401) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000380)={0x40000004}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0xe}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x40880) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000040)={0x7, 0x7, 0x1}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40802, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XT\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') sendfile(r3, r4, &(0x7f0000000180)=0x100000, 0x8402) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) close(r3) epoll_create(0x7) 23:53:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) [ 251.584236] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.920257] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.926926] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.935422] device bridge_slave_0 entered promiscuous mode [ 253.120126] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.126697] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.134948] device bridge_slave_1 entered promiscuous mode [ 253.297933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.507755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.965990] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.165315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.284785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.291808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.466569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.473694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.818464] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.827152] team0: Port device team_slave_0 added [ 255.022728] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.031466] team0: Port device team_slave_1 added [ 255.212070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.219063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.227891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.370180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.377232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.386028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.538103] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.545819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.555032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 23:53:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x3c86, 0x505000) [ 255.752608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.772251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.781162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.255313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.831154] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 257.429043] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.435546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.444052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.478173] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.484814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.491998] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.498565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.508426] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.128446] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.501849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:53:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x3c86, 0x505000) [ 262.155569] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.319526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.488140] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.494461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.502341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.668741] 8021q: adding VLAN 0 to HW filter on device team0 23:53:41 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x7, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) 23:53:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:41 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x10, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'user_u'}}, {@obj_type={'obj_type', 0x3d, 'M'}}, {@obj_type={'obj_type', 0x3d, '/'}}, {@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'vboxnet0vmnet0\xb8security\xe3'}}, {@fsname={'fsname'}}, {@subj_type={'subj_type', 0x3d, 'posix_acl_access#/GPL.GPLvmnet0vboxnet0-nodevsystemwlan0'}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x3) write(r0, &(0x7f0000000480)="8c54c7", 0x3) r4 = fcntl$dupfd(r0, 0x406, r0) mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x20000, &(0x7f0000000540)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1}}], [{@fsname={'fsname', 0x3d, 'ppp0{\'vboxnet1vboxnet1l'}}, {@smackfsdef={'smackfsdef', 0x3d, '/'}}, {@fsname={'fsname', 0x3d, '/'}}, {@obj_user={'obj_user', 0x3d, '+selinux'}}]}}) r5 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video2\x00', 0x2, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) fcntl$setsig(r0, 0xa, 0x2e) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000680)={0x2, [0x0, 0x0]}, &(0x7f00000006c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000700)={0xfffffffffffffeb7, 0x0, 0x0, 0x80, 0x7f, 0x9, 0x100000001, 0x8, r6}, &(0x7f0000000740)=0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000780)={0x0, 0x100000001, 0x3ff}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000940)={'vcan0\x00', r8}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/attr/current\x00', 0x2, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/rtc0\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000a00)={r7, @in={{0x2, 0x7fff, @remote}}, 0x4, 0x69, 0xf1f0, 0x18000, 0x4}, 0x98) setsockopt$inet_tcp_TLS_TX(r9, 0x6, 0x1, &(0x7f0000000ac0), 0x4) ioctl$KVM_GET_TSC_KHZ(r9, 0xaea3) ioctl$VIDIOC_G_OUTPUT(r5, 0x8004562e, &(0x7f0000000b00)) r10 = syz_genetlink_get_family_id$nbd(&(0x7f0000000b80)='nbd\x00') sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x10000805}, 0xc, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x88, r10, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r9}, {0x8, 0x1, r9}, {0x8, 0x1, r9}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}]}, 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x31866ddea79fe41a) modify_ldt$read_default(0x2, &(0x7f0000000d00)=""/164, 0xa4) getpeername(r0, &(0x7f0000000dc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000e40)=0x80) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000ec0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r11, &(0x7f0000000f80)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x80040014}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x28, r12, 0x400, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'ib', 0x3a, 'sit0\x00'}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x20040001) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000fc0)=0x100000001) ioctl$VIDIOC_S_OUTPUT(r5, 0xc004562f, &(0x7f0000001000)=0x6ba) 23:53:41 executing program 0: mprotect(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) uselib(&(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:53:41 executing program 4: r0 = epoll_create(0x6) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x7, 0x1}]}, 0xc, 0x3) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7, 0x42000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x8, @remote, 0x8}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e23, 0x80000000, @remote, 0x7}, @in6={0xa, 0x4e24, 0x3, @remote, 0x1}, @in6={0xa, 0x4e21, 0x47, @mcast2, 0x8}], 0x90) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x80000001}]}, 0xc, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000200)={0xb0000000}) write$vnet(r1, &(0x7f0000000400)={0x1, {&(0x7f0000000240)=""/213, 0xd5, &(0x7f0000000340)=""/134, 0x2, 0x1}}, 0x68) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000480)={0x2002}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000004c0)) syz_emit_ethernet(0xa6, &(0x7f0000000580)={@local, @random="1d8804dc3011", [], {@llc_tr={0x11, {@llc={0xaa, 0xbe, "c9", "d2e58412fd6653f2f45333d197c88c59d0b155375802c776bc64601408989e271d3572e5be40f90cf45bf81a2be0522fe1e4591b38cbd67690f1153ed256162006a4a23047701bf8ca5a5ce07856649e9537f1d8f2aacee5e31198526f11b59eadaa67927beff6e9f5e3e7b32f2a7dae0165098f6e4fc87d8c2afe49ecb5f6ebf31f3f5c0a92f4e5d527e5965517ef5b42faf62a57"}}}}}, &(0x7f0000000640)={0x1, 0x1, [0x91c, 0x42d7, 0x266, 0x65c]}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000680)) getsockopt$packet_int(r1, 0x107, 0xd, &(0x7f00000006c0), &(0x7f0000000700)=0x4) fsync(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000880)={&(0x7f0000000740), 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x54, r2, 0xc, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8a}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3b0}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000008c0)={0x0, 0x41, "975fea4f60da1b290a9ede4f14c5539718c2ae99f31e12167fd7d9245e33e96703f863aea7a1eb4529ac3bacbfbff8deb33c8d4886ed5bbd461bea063cbf7e65a7"}, &(0x7f0000000940)=0x49) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000980)=r3, 0x4) fchmodat(r1, &(0x7f00000009c0)='./file0\x00', 0xb5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000a00)={0x1, [0x0]}, &(0x7f0000000a40)=0x8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000a80)=0x0) ioprio_get$pid(0x2, r5) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) pread64(r1, &(0x7f0000000ac0)=""/130, 0x82, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000b80)={r4, 0x1000}, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000bc0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000c00)={'bond_slave_0\x00', {0x2, 0x4e20, @multicast1}}) readahead(r0, 0x0, 0x9) 23:53:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x3c86, 0x505000) 23:53:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x3c86, 0x505000) 23:53:42 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x7, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) 23:53:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:42 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x7, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) 23:53:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 264.696740] IPVS: ftp: loaded support on port[0] = 21 [ 264.704761] IPVS: ftp: loaded support on port[0] = 21 [ 266.040929] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.047587] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.055802] device bridge_slave_0 entered promiscuous mode [ 266.078899] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.085531] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.093715] device bridge_slave_0 entered promiscuous mode [ 266.133037] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.139543] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.147725] device bridge_slave_1 entered promiscuous mode [ 266.171687] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.178182] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.186346] device bridge_slave_1 entered promiscuous mode [ 266.224543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 266.263413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 266.305758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 266.335303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 266.539470] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.576214] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.618092] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.655205] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.699697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 266.706696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.733900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 266.740848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.783438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 266.790385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.820658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 266.827754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.036112] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.044881] team0: Port device team_slave_0 added [ 267.071837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.080418] team0: Port device team_slave_0 added [ 267.122109] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.130785] team0: Port device team_slave_1 added [ 267.156221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.164766] team0: Port device team_slave_1 added [ 267.207467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.241723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.288623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.323567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.369630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.377227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.386513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.403043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.410726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.419781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.482149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.489815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.498763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.514275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.521929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.530908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.372877] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.379472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.386747] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.393369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.402099] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.414349] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.421079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.428510] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.435154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.444387] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.681872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.689807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.586896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.616469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.873982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.896336] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.161563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.167883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.176051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.193117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.199381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.207306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.470821] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.502165] 8021q: adding VLAN 0 to HW filter on device team0 23:53:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x10, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x80323}) 23:53:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1300}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0x400000000000075, 0x1a000, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 23:53:52 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='vmnet1proceth1\'\x00') 23:53:52 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000527ff8)=0x70c3, 0x2, 0x0) mbind(&(0x7f0000963000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000000)=0x6f, 0xff, 0x0) 23:53:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) sendto$packet(r1, &(0x7f0000000080)="d2c505394ce8e7370e92f288af58adc206724951a276e84e743ad921797f7706a95ec986a122ca7717ac8fef28f764a6a2d6f14ed4", 0x35, 0x0, 0x0, 0x0) 23:53:52 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix_mp={0x0, 0x0, 0x32315258, 0x0, 0x0, [], 0x1}}) [ 274.584685] vhci_hcd: invalid port number 0 23:53:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x18, 0x0, 0x0) 23:53:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xc0002000}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:52 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix_mp={0x0, 0x0, 0x32315258, 0x0, 0x0, [], 0x1}}) 23:53:52 executing program 0: clone(0x8000a007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$cont(0x4205, r0, 0x0, 0x90ab01) 23:53:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10040463f2) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 23:53:52 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'team_slave_0\x00'}, 0x18) 23:53:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x81) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x18, 0x0, 0x0) 23:53:53 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix_mp={0x0, 0x0, 0x32315258, 0x0, 0x0, [], 0x1}}) 23:53:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x115, 0x0) 23:53:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10040463f2) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 23:53:53 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix_mp={0x0, 0x0, 0x32315258, 0x0, 0x0, [], 0x1}}) 23:53:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x18, 0x0, 0x0) 23:53:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x10000000008993, &(0x7f0000000040)={'bond0\x00\x00Z\x00', @ifru_ivalue=0x20b17d7b}) 23:53:53 executing program 0: clone(0x8000a007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$cont(0x4205, r0, 0x0, 0x90ab01) 23:53:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000340)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fcntl$setstatus(r1, 0x4, 0xc00) sendfile(r0, r1, 0x0, 0x80003) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, 0x0) 23:53:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x18, 0x0, 0x0) 23:53:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10040463f2) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 23:53:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = eventfd2(0x0, 0x0) r2 = epoll_create1(0x0) r3 = dup2(r1, r2) read$eventfd(r3, &(0x7f00007b0ff8), 0x8) write$eventfd(r3, &(0x7f0000000000)=0x3, 0x8) 23:53:53 executing program 2: mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0xa000, 0x3, &(0x7f0000ff3000/0xa000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xe) 23:53:53 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10040463f2) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 23:53:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x400, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 23:53:54 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:54 executing program 2: mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0xa000, 0x3, &(0x7f0000ff3000/0xa000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xe) [ 276.191184] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:53:54 executing program 0: clone(0x8000a007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$cont(0x4205, r0, 0x0, 0x90ab01) 23:53:54 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:54 executing program 2: mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0xa000, 0x3, &(0x7f0000ff3000/0xa000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xe) 23:53:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 23:53:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) 23:53:54 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 23:53:54 executing program 2: mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0xa000, 0x3, &(0x7f0000ff3000/0xa000)=nil) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xe) 23:53:54 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 23:53:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:55 executing program 2: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) r3 = getpgrp(0xffffffffffffffff) r4 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, r0, &(0x7f0000000000)={r2, r1}) 23:53:55 executing program 0: clone(0x8000a007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$cont(0x4205, r0, 0x0, 0x90ab01) 23:53:55 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 23:53:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 23:53:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 23:53:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:55 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 23:53:55 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 23:53:56 executing program 1: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:56 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:56 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 23:53:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='lo:\b\x00\x06\x00\x10\x00\x00\x04\x00'}) 23:53:56 executing program 1: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) 23:53:56 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:56 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x6, 0x0, 0x0, &(0x7f0000013000)) dup3(r1, r3, 0x0) close(r0) 23:53:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x15}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 23:53:56 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x105205) 23:53:56 executing program 1: socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', &(0x7f0000000000)=@ethtool_modinfo={0x42, 0x0, 0x0, "9eca84b929b8fe82"}}) [ 278.432608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 23:53:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x6a) 23:53:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="390000001300090468fe000081000000e800ff3f03000000450001070000001419001a00040002000700020002000004a9ff4ba8249905d62a", 0x39}], 0x1) 23:53:56 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) mlock(&(0x7f0000005000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x9) [ 278.704686] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 278.713307] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 23:53:57 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 23:53:57 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) mlock(&(0x7f0000005000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x9) 23:53:57 executing program 5: syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1ff, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, 0x0) 23:53:57 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="390000001300090468fe000081000000e800ff3f03000000450001070000001419001a00040002000700020002000004a9ff4ba8249905d62a", 0x39}], 0x1) 23:53:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 23:53:57 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) mlock(&(0x7f0000005000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x9) 23:53:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) getsockopt$packet_buf(r3, 0x111, 0x4, &(0x7f0000000400)=""/162, &(0x7f0000000040)=0xa2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000004c0)=ANY=[@ANYBLOB="849cc019840f8b611b4ff541cecef5434e912089494702bdf3e629ab8ba70a1bfa6f562696da5dbf8a499cbf8bff4c96138c8d3827a7bfe1766c0cb327d74623d31f4070f580b1d37bae21b85fa641fa36666ac2c341672773b3b0ce7bdddd50cdab64262b590a51625cff78d865d8af54beb2d859d75c79abb398108f2506be3637ed3c7758df92cba83e4f42a18516c4ad9392b4e4c065b49871a7526ded3bb9cf3b8ea4281edaec6c04817a9e0edc2661d9ac94f4f77d4d1daa137a79d39ef3be0f3b240e64de723ff7426acff1fced9d3867be76b35ae17f6f42044bb378075966c20e753d836e288adf12de8515762a60c69f54b87942d3459086aa942a7262f4b8ef2c1b92d371f9e9ff0d8469ef26ae9be63788a73e1be96312b80d5ca09c722758728c31fcd7488d82bb089890c0a4deaf4f"], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x6b}, &(0x7f00000000c0)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x121002, 0x0) 23:53:57 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) mlock(&(0x7f0000005000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x9) [ 279.419589] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 279.428574] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 23:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="390000001300090468fe000081000000e800ff3f03000000450001070000001419001a00040002000700020002000004a9ff4ba8249905d62a", 0x39}], 0x1) 23:53:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) [ 279.729520] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 279.739143] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 23:53:57 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/192, 0xc0) 23:53:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10, 0x700000000000000}, 0xc, &(0x7f0000029000)={&(0x7f0000000080)=@ipv4_newroute={0x2c, 0x18, 0xd19, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0xcd}}, 0x0) 23:53:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slaveO0\x00', 0x0}) 23:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="390000001300090468fe000081000000e800ff3f03000000450001070000001419001a00040002000700020002000004a9ff4ba8249905d62a", 0x39}], 0x1) [ 279.920472] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 279.929132] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 279.938506] netlink: 'syz-executor5': attribute type 21 has an invalid length. 23:53:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/fib_trie\x00') read(r1, 0x0, 0x0) 23:53:58 executing program 4: timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 23:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:53:58 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x40, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0xa, {0xfffffffffffffffc}}) 23:53:58 executing program 0: futex(&(0x7f0000000000), 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000000), 0x0) 23:53:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x0, 0x1, [@remote]}, 0x14) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) [ 280.402639] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 23:53:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x0) 23:53:58 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f4634418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1db680ac78e5d31) 23:53:58 executing program 4: syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast, @random="324bc917fef4", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 23:53:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xffffffff}, 0x51) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 23:53:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) dup3(r1, r0, 0x0) 23:53:58 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000002980)="0a5c2d023c126285718070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xa7cd) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$int_in(r3, 0x5452, &(0x7f0000000080)=0x3) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 23:53:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0xfffffffffffffffa}], 0x1, 0x0, 0x0, 0x0) 23:53:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140)="aa4e245eb8ab5392fffe53632ca346f39fad948a15ec8409330bf1d9c55d401d97", 0x21, 0x0, 0x0, 0x0) [ 280.966678] ================================================================== [ 280.974120] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 280.980728] CPU: 1 PID: 8473 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #8 [ 280.987845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.997303] Call Trace: [ 280.999941] dump_stack+0x173/0x1d0 [ 281.003609] kmsan_report+0x120/0x290 [ 281.007452] kmsan_internal_check_memory+0x9a7/0xa20 [ 281.012611] __msan_instrument_asm_load+0x8a/0x90 [ 281.017487] __siphash_aligned+0x512/0xae0 [ 281.021779] secure_ipv6_port_ephemeral+0x110/0x220 [ 281.026832] inet6_hash_connect+0x11f/0x1a0 [ 281.031188] tcp_v6_connect+0x20ba/0x2890 [ 281.035401] ? __msan_poison_alloca+0x1e0/0x270 [ 281.040114] ? tcp_v6_pre_connect+0x130/0x130 [ 281.044638] __inet_stream_connect+0x2f9/0x1340 [ 281.049383] inet_stream_connect+0x101/0x180 [ 281.053833] __sys_connect+0x664/0x820 [ 281.057753] ? __inet_stream_connect+0x1340/0x1340 [ 281.062711] ? prepare_exit_to_usermode+0x114/0x420 [ 281.067755] ? syscall_return_slowpath+0x50/0x650 [ 281.072641] __se_sys_connect+0x8d/0xb0 [ 281.076654] __x64_sys_connect+0x4a/0x70 [ 281.080738] do_syscall_64+0xbc/0xf0 [ 281.084481] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.089688] RIP: 0033:0x457669 [ 281.092901] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.111823] RSP: 002b:00007f18aad42c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 281.119547] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 281.126830] RDX: 000000000000001c RSI: 0000000020000140 RDI: 0000000000000005 [ 281.134120] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 281.141406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18aad436d4 [ 281.148692] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 281.155996] [ 281.157637] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 281.165366] Variable was created at: [ 281.169107] secure_ipv6_port_ephemeral+0x6a/0x220 [ 281.174060] inet6_hash_connect+0x11f/0x1a0 [ 281.178397] [ 281.180033] Bytes 2-7 of 8 are uninitialized [ 281.184450] Memory access of size 8 starts at ffff8881342cf9f0 [ 281.190426] ================================================================== [ 281.197789] Disabling lock debugging due to kernel taint [ 281.203248] Kernel panic - not syncing: panic_on_warn set ... [ 281.209153] CPU: 1 PID: 8473 Comm: syz-executor4 Tainted: G B 4.20.0-rc7+ #8 [ 281.217651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.227020] Call Trace: [ 281.229633] dump_stack+0x173/0x1d0 [ 281.233299] panic+0x3ce/0x961 [ 281.236579] kmsan_report+0x285/0x290 [ 281.240419] kmsan_internal_check_memory+0x9a7/0xa20 [ 281.245579] __msan_instrument_asm_load+0x8a/0x90 [ 281.250447] __siphash_aligned+0x512/0xae0 [ 281.254738] secure_ipv6_port_ephemeral+0x110/0x220 [ 281.259793] inet6_hash_connect+0x11f/0x1a0 [ 281.264150] tcp_v6_connect+0x20ba/0x2890 [ 281.268366] ? __msan_poison_alloca+0x1e0/0x270 [ 281.273088] ? tcp_v6_pre_connect+0x130/0x130 [ 281.277614] __inet_stream_connect+0x2f9/0x1340 [ 281.282370] inet_stream_connect+0x101/0x180 [ 281.286817] __sys_connect+0x664/0x820 [ 281.290738] ? __inet_stream_connect+0x1340/0x1340 [ 281.295700] ? prepare_exit_to_usermode+0x114/0x420 [ 281.300738] ? syscall_return_slowpath+0x50/0x650 [ 281.305621] __se_sys_connect+0x8d/0xb0 [ 281.309633] __x64_sys_connect+0x4a/0x70 [ 281.313718] do_syscall_64+0xbc/0xf0 [ 281.317463] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.322672] RIP: 0033:0x457669 [ 281.325882] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.344798] RSP: 002b:00007f18aad42c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 281.352525] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 281.359808] RDX: 000000000000001c RSI: 0000000020000140 RDI: 0000000000000005 [ 281.367098] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 281.374388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18aad436d4 [ 281.381673] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 281.389988] Kernel Offset: disabled [ 281.393630] Rebooting in 86400 seconds..