[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 35.285894] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.070532] random: sshd: uninitialized urandom read (32 bytes read) [ 38.555904] random: sshd: uninitialized urandom read (32 bytes read) [ 39.725244] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. [ 45.415048] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 21:31:26 fuzzer started [ 47.181063] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 21:31:30 dialing manager at 10.128.0.26:33143 2018/09/12 21:31:30 syscalls: 1 2018/09/12 21:31:30 code coverage: enabled 2018/09/12 21:31:30 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/12 21:31:30 setuid sandbox: enabled 2018/09/12 21:31:30 namespace sandbox: enabled 2018/09/12 21:31:30 fault injection: enabled 2018/09/12 21:31:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 21:31:30 net packed injection: enabled 2018/09/12 21:31:30 net device setup: enabled [ 51.597605] random: crng init done 21:32:33 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000540)=@alg, &(0x7f00000005c0)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000600), 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000a80)=0x30) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001dc0)='./file0/file0\x00', &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000003a00)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@remote, @in=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000004e40)=0xe8) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ec0)={&(0x7f0000000ac0)=@proc, 0xc, &(0x7f0000004cc0), 0x0, &(0x7f0000004e80)}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f00000002c0)='!vboxnet0&\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x10) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x0) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 21:32:33 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 21:32:33 executing program 5: memfd_create(&(0x7f0000000080)="7b5c5ea2707070305b2300", 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000340)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000140), 0x0, &(0x7f00000005c0)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xe) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 21:32:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f000000a340)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000aec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b380)={'tunl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000b4c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b700)={{{@in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b840)={@local, @rand_addr}, &(0x7f000000b880)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b8c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f000000b9c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ba00)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000bb00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb40)={@loopback}, &(0x7f000000bb80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000be80)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f000000bf80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bfc0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000004fc0)=0x57) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000c100)={{{@in6, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f000000c200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c780)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ce00)={&(0x7f0000006a40), 0xc, &(0x7f000000cdc0)={&(0x7f000000c7c0)={0x14}, 0x14}}, 0x0) 21:32:33 executing program 3: stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 21:32:33 executing program 4: clone(0x200, &(0x7f0000001600), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000380)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000700), &(0x7f0000000200)) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file1\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000640), &(0x7f0000000440)) r1 = dup2(r0, r0) ioctl$sock_netdev_private(r1, 0x0, &(0x7f0000000200)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 113.769460] IPVS: ftp: loaded support on port[0] = 21 [ 113.769510] IPVS: ftp: loaded support on port[0] = 21 [ 113.790594] IPVS: ftp: loaded support on port[0] = 21 [ 113.793629] IPVS: ftp: loaded support on port[0] = 21 [ 113.805028] IPVS: ftp: loaded support on port[0] = 21 [ 113.818310] IPVS: ftp: loaded support on port[0] = 21 [ 116.151875] ip (4487) used greatest stack depth: 53976 bytes left [ 116.929688] ip (4534) used greatest stack depth: 53784 bytes left [ 116.997047] ip (4538) used greatest stack depth: 53496 bytes left [ 117.214945] ip (4548) used greatest stack depth: 53288 bytes left [ 117.592417] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.598918] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.625460] device bridge_slave_0 entered promiscuous mode [ 117.691615] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.698118] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.724389] device bridge_slave_0 entered promiscuous mode [ 117.747439] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.753934] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.799699] device bridge_slave_0 entered promiscuous mode [ 117.818499] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.825020] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.856939] device bridge_slave_0 entered promiscuous mode [ 117.882054] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.888557] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.920461] device bridge_slave_0 entered promiscuous mode [ 117.938602] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.945113] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.957150] device bridge_slave_1 entered promiscuous mode [ 117.972916] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.979493] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.002082] device bridge_slave_0 entered promiscuous mode [ 118.024598] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.031112] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.058360] device bridge_slave_1 entered promiscuous mode [ 118.072949] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.079443] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.108472] device bridge_slave_1 entered promiscuous mode [ 118.125288] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.131774] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.156650] device bridge_slave_1 entered promiscuous mode [ 118.189049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.206278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.213722] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.220209] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.250555] device bridge_slave_1 entered promiscuous mode [ 118.283106] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.289640] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.331412] device bridge_slave_1 entered promiscuous mode [ 118.366179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.373876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.425409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.437115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.445056] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.539139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 118.589008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.604951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.690905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 118.778913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 119.172259] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.211241] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.240781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.295059] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.434185] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.444090] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.470558] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.488942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.532711] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 119.557129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.691649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.699986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 119.707411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.736957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 119.743953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.764593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 119.774051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.813553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 119.820587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.839870] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 119.954246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 119.961350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 119.976215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 119.983175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 120.027283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 120.034319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.055847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 120.067011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.092146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 120.099231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 120.125176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 120.134894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.228388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 120.232634] ip (4690) used greatest stack depth: 53240 bytes left [ 120.235469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.413204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 120.435679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.702936] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.721047] team0: Port device team_slave_0 added [ 120.799454] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.826456] team0: Port device team_slave_0 added [ 120.837162] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.849961] team0: Port device team_slave_0 added [ 120.875326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.897080] team0: Port device team_slave_0 added [ 120.959109] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 120.979320] team0: Port device team_slave_0 added [ 121.009124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.037755] team0: Port device team_slave_1 added [ 121.064580] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.095672] team0: Port device team_slave_1 added [ 121.109313] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.131987] team0: Port device team_slave_1 added [ 121.160118] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 121.173155] team0: Port device team_slave_0 added [ 121.183707] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.210289] team0: Port device team_slave_1 added [ 121.220563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.239000] team0: Port device team_slave_1 added [ 121.257647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.271577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.288480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.332596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.339615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.354498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.395621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.402729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.418502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.459247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.466277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.477264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.506101] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 121.516638] team0: Port device team_slave_1 added [ 121.541356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.549192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.570183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.609781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.623490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.644901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.667130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.677618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.690915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.698472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.728899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.754204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.778721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.808412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.830206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.849040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 121.867011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.879370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.923022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 121.945994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 121.959186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.969356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.984764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.003409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.029577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.037540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.045107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.067962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.092787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.112400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.128186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.137829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.161324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.198853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 122.205923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.219560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.251241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.259068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.279008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.304406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.313629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.321666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.335558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.373098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.387467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.408608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.420122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.428227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.447934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.473301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.496084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.538455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.545995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.555231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.585627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.601718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.636930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.838915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.846481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.861382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 124.992234] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.998757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.005702] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.012202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.075622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.082576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.110864] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.117334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.124253] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.130718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.149909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.168347] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.174872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.181786] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.188281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.231213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.245788] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.252307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.259188] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.265650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.275736] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.297937] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.304399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.311253] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.317705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.327111] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.790951] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.797474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.804347] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.810888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.863555] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.103154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.118237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.146226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.169477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.183586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.865609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.928392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.026697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.069043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.221363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.384347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.761730] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.896127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.904048] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.024281] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.167893] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.368268] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.615411] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.621764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.633405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.692679] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.699288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.710931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.911524] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.920109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.934944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.004077] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.010397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.022858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.170266] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.177065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.195681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.507146] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.551579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.558188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.572923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.718097] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.954160] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.004449] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.043158] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.533639] 8021q: adding VLAN 0 to HW filter on device team0 21:33:05 executing program 5: getresgid(&(0x7f0000000300), &(0x7f0000000440), &(0x7f00000016c0)) fstat(0xffffffffffffff9c, &(0x7f0000001700)) getegid() setresgid(0x0, 0x0, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000001680)=ANY=[]}}, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 21:33:05 executing program 4: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x51a7cdc9, {{0x2, 0x0, @multicast1}}}, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f00000000c0), &(0x7f00000001c0)=""/55}, 0x18) 21:33:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000a9cff8)) socket$packet(0x11, 0x2, 0x300) r1 = dup2(r0, r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) 21:33:05 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000540)=@alg, &(0x7f00000005c0)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000600), 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) nanosleep(&(0x7f00000008c0), &(0x7f0000000380)) keyctl$join(0x1, &(0x7f0000000280)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000a80)=0x30) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000001dc0)='./file0/file0\x00', &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000003a00)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@remote, @in=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000004e40)=0xe8) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ec0)={&(0x7f0000000ac0)=@proc, 0xc, &(0x7f0000004cc0), 0x0, &(0x7f0000004e80)}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f00000002c0)='!vboxnet0&\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) syz_open_pts(0xffffffffffffff9c, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='\x00', 0xffffffffffffff9c}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x10) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x0) mq_open(&(0x7f0000000740)='eth0cgpoup(\x00', 0x0, 0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0956969ef69dc00d91b69203737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 21:33:05 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001d00)='/dev/vsock\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) stat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getpgrp(0x0) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getgid() getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000036c0)) 21:33:05 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 21:33:05 executing program 1: set_robust_list(&(0x7f0000000600)={&(0x7f0000000540)={&(0x7f0000000500)}, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)}}, 0x18) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0xfffffc5a, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f00000004c0)=0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@ipv6_newaddr={0x18}, 0x18}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000440)=0xc) ioprio_get$pid(0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 21:33:06 executing program 3: ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)="9b7d00"}, 0x10) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000400)=""/150}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)="2f70726f632f7379732f6e1ec46addd8befa87015860d8ae65742f697076342f7673421ab164d1ab207543c7886a20a8e3402f6578706972b95f917569657363c7604a085b43312428b44d8e41244b6e09e0d803eafc8a84821f9dca15bf74cb63aa31876aa4dd010496e606132afaf7ebd01d7ccac90a8e75ea0d2da629ae7e2420a39e63340521ef", 0x2, 0x0) dup(0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 21:33:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@empty, @remote, @loopback, 0x0, 0x0, 0x0, 0x400}) 21:33:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000a9cff8)) socket$packet(0x11, 0x2, 0x300) r1 = dup2(r0, r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) 21:33:06 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000700), &(0x7f0000000200)) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file1\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000640), &(0x7f0000000440)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='veth1\x00') open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:33:06 executing program 0: add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440), &(0x7f0000000580), 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000001680)=ANY=[]}}, 0x0) dup(0xffffffffffffffff) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000300)={0x43}, 0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 21:33:06 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001d00)='/dev/vsock\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) stat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getpgrp(0x0) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getgid() getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000036c0)) 21:33:06 executing program 1: getresgid(&(0x7f0000000300), &(0x7f0000000440), &(0x7f00000016c0)) fstat(0xffffffffffffff9c, &(0x7f0000001700)) getegid() setresgid(0x0, 0x0, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000001680)=ANY=[]}}, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 21:33:07 executing program 3: ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)="9b7d00"}, 0x10) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000400)=""/150}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)="2f70726f632f7379732f6e1ec46addd8befa87015860d8ae65742f697076342f7673421ab164d1ab207543c7886a20a8e3402f6578706972b95f917569657363c7604a085b43312428b44d8e41244b6e09e0d803eafc8a84821f9dca15bf74cb63aa31876aa4dd010496e606132afaf7ebd01d7ccac90a8e75ea0d2da629ae7e2420a39e63340521ef", 0x2, 0x0) dup(0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 21:33:07 executing program 4: mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0xffffffffffffff30) memfd_create(&(0x7f0000000200)='/dev/full\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') getgroups(0x0, &(0x7f0000000200)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000680)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getgroups(0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000740)=0xc) getresgid(&(0x7f0000000500), &(0x7f0000000840), &(0x7f00000004c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000004c0)) 21:33:07 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180), &(0x7f00000001c0)=':selinux{[\'cgroup^vmnet0wlan0keyringcpuset.{em1vboxnet0em1\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff9) 21:33:07 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001d00)='/dev/vsock\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) stat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getpgrp(0x0) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getgid() getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000036c0)) 21:33:07 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x111404, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 21:33:07 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000001c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000780), &(0x7f0000000ac0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000780), &(0x7f0000000800)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @rumble}) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:33:08 executing program 3: ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)="9b7d00"}, 0x10) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000400)=""/150}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)="2f70726f632f7379732f6e1ec46addd8befa87015860d8ae65742f697076342f7673421ab164d1ab207543c7886a20a8e3402f6578706972b95f917569657363c7604a085b43312428b44d8e41244b6e09e0d803eafc8a84821f9dca15bf74cb63aa31876aa4dd010496e606132afaf7ebd01d7ccac90a8e75ea0d2da629ae7e2420a39e63340521ef", 0x2, 0x0) dup(0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 21:33:08 executing program 4: mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0xffffffffffffff30) memfd_create(&(0x7f0000000200)='/dev/full\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') getgroups(0x0, &(0x7f0000000200)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000680)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getgroups(0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000740)=0xc) getresgid(&(0x7f0000000500), &(0x7f0000000840), &(0x7f00000004c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000004c0)) 21:33:08 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001d00)='/dev/vsock\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) stat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getpgrp(0x0) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getgid() getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000036c0)) 21:33:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000009a80)={&(0x7f0000000040), 0xc, &(0x7f0000009a40)={&(0x7f0000009640)={0x14}, 0x14}}, 0x0) 21:33:08 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xffffff7f}, 0x80, &(0x7f00000001c0)}, 0x0) 21:33:09 executing program 0: clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 148.149705] ================================================================== [ 148.157180] BUG: KMSAN: uninit-value in ip_rcv_core+0xabd/0x1160 [ 148.163356] CPU: 0 PID: 6096 Comm: syz-executor1 Not tainted 4.19.0-rc3+ #45 [ 148.170550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.179915] Call Trace: [ 148.182536] [ 148.184710] dump_stack+0x14b/0x190 [ 148.188376] kmsan_report+0x183/0x2b0 [ 148.192203] __msan_warning+0x70/0xc0 [ 148.196039] ip_rcv_core+0xabd/0x1160 [ 148.199891] ip_rcv+0xbb/0x6d0 [ 148.203121] process_backlog+0x752/0x10b0 [ 148.207322] ? ip_local_deliver_finish+0xea0/0xea0 [ 148.212289] ? rps_trigger_softirq+0x2e0/0x2e0 [ 148.216897] net_rx_action+0x723/0x19d0 [ 148.220946] ? net_tx_action+0xc40/0xc40 [ 148.225042] __do_softirq+0x562/0x948 [ 148.228873] do_softirq_own_stack+0x49/0x80 [ 148.233204] [ 148.235460] __local_bh_enable_ip+0x119/0x150 [ 148.239983] local_bh_enable+0x36/0x40 [ 148.243920] __dev_queue_xmit+0x35a8/0x3ab0 [ 148.248298] ? kmsan_memcpy_origins+0x111/0x1b0 [ 148.253048] dev_queue_xmit+0x4b/0x60 [ 148.256877] ? __netdev_pick_tx+0x12e0/0x12e0 [ 148.261393] packet_sendmsg+0x80ff/0x8c60 [ 148.265599] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 148.271082] ___sys_sendmsg+0xe70/0x1290 [ 148.275175] ? compat_packet_setsockopt+0x360/0x360 [ 148.280265] __se_sys_sendmsg+0x2a3/0x3d0 [ 148.284464] __x64_sys_sendmsg+0x4a/0x70 [ 148.288543] do_syscall_64+0xb8/0x100 [ 148.292362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 148.297566] RIP: 0033:0x4572d9 [ 148.300771] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.319709] RSP: 002b:00007f519249dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.327469] RAX: ffffffffffffffda RBX: 00007f519249e6d4 RCX: 00000000004572d9 [ 148.334760] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 148.342043] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 148.349322] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 148.356602] R13: 00000000004d4eb0 R14: 00000000004c93c4 R15: 0000000000000000 [ 148.363909] [ 148.365549] Uninit was stored to memory at: [ 148.369892] kmsan_internal_chain_origin+0x128/0x210 [ 148.375024] __msan_chain_origin+0x69/0xc0 [ 148.379281] iptunnel_xmit+0xa3c/0xd50 [ 148.383192] ip_tunnel_xmit+0x33e1/0x3750 [ 148.387378] ipgre_xmit+0xdcf/0xeb0 [ 148.391048] dev_hard_start_xmit+0x5df/0xc20 [ 148.395488] __dev_queue_xmit+0x2f35/0x3ab0 [ 148.399826] dev_queue_xmit+0x4b/0x60 [ 148.403664] packet_sendmsg+0x80ff/0x8c60 [ 148.407837] ___sys_sendmsg+0xe70/0x1290 [ 148.411913] __se_sys_sendmsg+0x2a3/0x3d0 [ 148.416075] __x64_sys_sendmsg+0x4a/0x70 [ 148.420148] do_syscall_64+0xb8/0x100 [ 148.423964] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 148.429178] [ 148.430807] Uninit was created at: [ 148.434368] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 148.439504] kmsan_kmalloc+0x98/0x100 [ 148.443318] kmsan_slab_alloc+0x10/0x20 [ 148.447322] __kmalloc_node_track_caller+0x9e7/0x1160 [ 148.452528] __alloc_skb+0x2f5/0x9e0 [ 148.456257] alloc_skb_with_frags+0x1d0/0xac0 [ 148.460785] sock_alloc_send_pskb+0xb47/0x1170 [ 148.465403] packet_sendmsg+0x6599/0x8c60 [ 148.469686] ___sys_sendmsg+0xe70/0x1290 [ 148.473767] __se_sys_sendmsg+0x2a3/0x3d0 [ 148.477938] __x64_sys_sendmsg+0x4a/0x70 [ 148.482041] do_syscall_64+0xb8/0x100 [ 148.485856] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 148.491050] ================================================================== [ 148.498409] Disabling lock debugging due to kernel taint [ 148.503877] Kernel panic - not syncing: panic_on_warn set ... [ 148.503877] [ 148.511271] CPU: 0 PID: 6096 Comm: syz-executor1 Tainted: G B 4.19.0-rc3+ #45 [ 148.519861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.529262] Call Trace: [ 148.532348] [ 148.534526] dump_stack+0x14b/0x190 [ 148.538191] panic+0x35d/0x8cb [ 148.541473] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 148.546964] kmsan_report+0x2a8/0x2b0 21:33:09 executing program 4: mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0xffffffffffffff30) memfd_create(&(0x7f0000000200)='/dev/full\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') getgroups(0x0, &(0x7f0000000200)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000680)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getgroups(0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000740)=0xc) getresgid(&(0x7f0000000500), &(0x7f0000000840), &(0x7f00000004c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000004c0)) 21:33:09 executing program 3: ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)="9b7d00"}, 0x10) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000400)=""/150}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)="2f70726f632f7379732f6e1ec46addd8befa87015860d8ae65742f697076342f7673421ab164d1ab207543c7886a20a8e3402f6578706972b95f917569657363c7604a085b43312428b44d8e41244b6e09e0d803eafc8a84821f9dca15bf74cb63aa31876aa4dd010496e606132afaf7ebd01d7ccac90a8e75ea0d2da629ae7e2420a39e63340521ef", 0x2, 0x0) dup(0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) [ 148.550830] __msan_warning+0x70/0xc0 [ 148.554682] ip_rcv_core+0xabd/0x1160 [ 148.558535] ip_rcv+0xbb/0x6d0 [ 148.561794] process_backlog+0x752/0x10b0 [ 148.566019] ? ip_local_deliver_finish+0xea0/0xea0 [ 148.570995] ? rps_trigger_softirq+0x2e0/0x2e0 [ 148.575616] net_rx_action+0x723/0x19d0 [ 148.579636] ? net_tx_action+0xc40/0xc40 [ 148.583723] __do_softirq+0x562/0x948 [ 148.587564] do_softirq_own_stack+0x49/0x80 [ 148.591904] [ 148.594167] __local_bh_enable_ip+0x119/0x150 [ 148.598697] local_bh_enable+0x36/0x40 [ 148.602628] __dev_queue_xmit+0x35a8/0x3ab0 [ 148.606992] ? kmsan_memcpy_origins+0x111/0x1b0 [ 148.611712] dev_queue_xmit+0x4b/0x60 [ 148.615549] ? __netdev_pick_tx+0x12e0/0x12e0 [ 148.620061] packet_sendmsg+0x80ff/0x8c60 [ 148.624253] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 148.629688] ___sys_sendmsg+0xe70/0x1290 [ 148.633818] ? compat_packet_setsockopt+0x360/0x360 [ 148.638909] __se_sys_sendmsg+0x2a3/0x3d0 [ 148.643346] __x64_sys_sendmsg+0x4a/0x70 [ 148.647443] do_syscall_64+0xb8/0x100 [ 148.651259] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 148.656457] RIP: 0033:0x4572d9 [ 148.659667] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.678579] RSP: 002b:00007f519249dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.686301] RAX: ffffffffffffffda RBX: 00007f519249e6d4 RCX: 00000000004572d9 [ 148.693583] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 148.700865] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 148.708146] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 148.715426] R13: 00000000004d4eb0 R14: 00000000004c93c4 R15: 0000000000000000 [ 148.723022] Kernel Offset: disabled [ 148.726650] Rebooting in 86400 seconds..