[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.955888] kauditd_printk_skb: 4 callbacks suppressed [ 52.955918] audit: type=1800 audit(1545314210.008:29): pid=6367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 52.980670] audit: type=1800 audit(1545314210.018:30): pid=6367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. 2018/12/20 13:57:04 fuzzer started 2018/12/20 13:57:09 dialing manager at 10.128.0.26:46613 2018/12/20 13:57:09 syscalls: 1 2018/12/20 13:57:09 code coverage: enabled 2018/12/20 13:57:09 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 13:57:09 setuid sandbox: enabled 2018/12/20 13:57:09 namespace sandbox: enabled 2018/12/20 13:57:09 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 13:57:09 fault injection: enabled 2018/12/20 13:57:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 13:57:09 net packet injection: enabled 2018/12/20 13:57:09 net device setup: enabled 13:57:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) syzkaller login: [ 87.129676] IPVS: ftp: loaded support on port[0] = 21 [ 88.658240] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.665436] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.673885] device bridge_slave_0 entered promiscuous mode [ 88.758894] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.765541] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.773902] device bridge_slave_1 entered promiscuous mode [ 88.858822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 88.944464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 89.208961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.299546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.386784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 89.393905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.480435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 89.487536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.748664] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 89.757625] team0: Port device team_slave_0 added [ 89.841975] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 89.850606] team0: Port device team_slave_1 added [ 89.934635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.025885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 13:57:27 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [0x86ddffff], {0x41, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev}}}}}}}, 0x0) [ 90.112680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 90.120259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.129721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.254913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 90.262731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.272316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.625656] IPVS: ftp: loaded support on port[0] = 21 [ 91.900526] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.907171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.914443] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.921040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.930540] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 91.937189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.718425] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.725087] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.733852] device bridge_slave_0 entered promiscuous mode [ 92.891390] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.898063] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.907105] device bridge_slave_1 entered promiscuous mode [ 93.057659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 93.208135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 93.636929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 93.812948] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 94.003230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 94.015758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.091726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 94.098783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.460746] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 94.469570] team0: Port device team_slave_0 added [ 94.593570] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 94.602263] team0: Port device team_slave_1 added [ 94.709812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.822794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.963368] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 94.970995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.980272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.135199] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 95.143022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.152134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:57:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) [ 96.130321] IPVS: ftp: loaded support on port[0] = 21 [ 96.926529] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.933207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.940366] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.947077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.956427] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 96.963114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.173255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.938179] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 99.010014] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.016699] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.025119] device bridge_slave_0 entered promiscuous mode [ 99.210148] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.216841] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.225158] device bridge_slave_1 entered promiscuous mode [ 99.439414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 99.604693] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 99.611010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.619394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.633209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.095288] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.269839] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.360555] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.482081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 100.489106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.651132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 100.658314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.062352] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 101.070869] team0: Port device team_slave_0 added [ 101.206897] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 101.215622] team0: Port device team_slave_1 added [ 101.432107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 101.439128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.448261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.642655] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 101.649662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.658728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.860831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 101.868562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.877907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.972657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 101.980341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.989480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:57:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) [ 103.551067] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.557698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.564938] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.571531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.580965] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 103.587932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.956167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.107498] IPVS: ftp: loaded support on port[0] = 21 [ 104.723519] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 13:57:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) 13:57:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) [ 105.491434] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 105.497859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.505729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:57:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) 13:57:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) 13:57:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) 13:57:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0xe000)=nil, 0xe000, 0x0, 0x80000004031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000006000/0x3000)=nil) [ 106.391851] 8021q: adding VLAN 0 to HW filter on device team0 13:57:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x4}) 13:57:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x4}) 13:57:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x4}) [ 107.691965] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.698539] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.706932] device bridge_slave_0 entered promiscuous mode [ 107.864820] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.871380] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.879649] device bridge_slave_1 entered promiscuous mode [ 108.028705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 108.169628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 108.526223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 108.672268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 108.832411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 108.839472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.020088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 109.027266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.564358] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 109.573037] team0: Port device team_slave_0 added [ 109.782673] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.791260] team0: Port device team_slave_1 added [ 109.959049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.966402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.975516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.137683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 110.146345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.155278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.318222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.325917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.335101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.526078] dccp_invalid_packet: P.CsCov 15 exceeds packet length 48 [ 110.548999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.556710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.565925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:57:47 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [0x86ddffff], {0x41, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev}}}}}}}, 0x0) [ 110.578235] dccp_invalid_packet: P.CsCov 15 exceeds packet length 48 [ 110.706343] dccp_invalid_packet: P.CsCov 15 exceeds packet length 48 [ 111.789372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.221576] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.228220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.235414] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.242083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.251255] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.257833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.462156] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 113.055343] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 113.062287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.070154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.487152] 8021q: adding VLAN 0 to HW filter on device team0 13:57:53 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [0x86ddffff], {0x41, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev}}}}}}}, 0x0) [ 116.761449] dccp_invalid_packet: P.CsCov 15 exceeds packet length 48 [ 117.203996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 117.379132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 117.548103] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 117.554831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.562601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.733101] 8021q: adding VLAN 0 to HW filter on device team0 13:57:55 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_getscheduler(r0) ptrace$getregset(0x4204, r0, 0x200, &(0x7f00000000c0)={&(0x7f0000000040)=""/104, 0x68}) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x41a, 0x8000) write$P9_RREADDIR(r1, &(0x7f0000000140)={0xa6, 0x29, 0x1, {0x4, [{{0x0, 0x4, 0x6}, 0x9, 0x6, 0x7, './file0'}, {{0x8e, 0x4, 0x7}, 0x9, 0x7, 0x7, './file0'}, {{0xd, 0x1, 0x1}, 0x390, 0x5, 0x7, './file0'}, {{0x10, 0x1, 0x3}, 0x7fffffff, 0x8929, 0x7, './file0'}, {{0x4}, 0xe86, 0x9, 0x7, './file0'}]}}, 0xa6) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x2c4, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x6, 0x1, 0x100000001, 0x9]}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x76, "9d6735772bf96c4319c06630c57ea0d6d43b131f1895865b60666ddbff07585bd0f8330800036473ee0666af625e6630114ca32a1a65d4dae505904b5a65c2646716bb67cff5e14f1c55fbadc36891fc6f4c08cbb403d67be33b25f134a483b170e009f2a462cbea13a8c0216d8242477638ce977ead"}, &(0x7f0000000340)=0x7e) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000380)={r3, 0x4, 0x30, 0x1, 0xfffffffffffffffe}, &(0x7f00000003c0)=0x18) write$FUSE_WRITE(r2, &(0x7f0000000400)={0x18, 0xfffffffffffffffe, 0x3, {0xc2}}, 0x18) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000004c0)={0xdc}, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bic\x00', 0x4) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000540)={0x0, 0x1bd, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x8000}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000600)=0xd97, 0x1) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000640)) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000740)) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000780)={r4, 0xffffffffffffff53}, &(0x7f00000007c0)=0x8) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000800)={0x7, 0xffffffffffffffc1, 0x9, 0x2}) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000840)=0x1, 0x2) r5 = memfd_create(&(0x7f0000000880)='bic\x00', 0x1) ptrace$getregs(0xe, r0, 0x4, &(0x7f00000008c0)=""/130) ptrace$getregset(0x4204, r0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)=""/102, 0x66}) ioctl$VIDIOC_ENCODER_CMD(r5, 0xc028564d, &(0x7f0000000a40)={0x1, 0x1, [0x100, 0xfff, 0x1, 0xffffffffffff8000, 0xffff, 0x8, 0xa73, 0x3f]}) fsetxattr$security_smack_transmute(r1, &(0x7f0000000a80)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000ac0)='TRUE', 0x4, 0x1) getsockopt$netlink(r2, 0x10e, 0x2, &(0x7f0000000b00)=""/48, &(0x7f0000000b40)=0x30) 13:57:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:57:55 executing program 4: write(0xffffffffffffffff, &(0x7f0000000180)="8a", 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xf0ffffff}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 13:57:55 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x4}) 13:57:55 executing program 1: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="8a37962a294f", [], {@ipv6={0x86dd, {0x0, 0x6, "110c11", 0x30, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x6, [0x86ddffff], {0x41, 0x6, "cb155d", 0x0, 0x0, 0x0, @mcast2, @dev}}}}}}}, 0x0) 13:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) [ 118.924603] dccp_invalid_packet: P.CsCov 15 exceeds packet length 48 13:57:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 13:57:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:57:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) [ 119.783762] IPVS: ftp: loaded support on port[0] = 21 [ 119.853445] IPVS: ftp: loaded support on port[0] = 21 [ 121.127770] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.134440] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.142748] device bridge_slave_0 entered promiscuous mode [ 121.188938] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.195599] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.203974] device bridge_slave_0 entered promiscuous mode [ 121.222291] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.228815] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.237033] device bridge_slave_1 entered promiscuous mode [ 121.282057] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.288588] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.296916] device bridge_slave_1 entered promiscuous mode [ 121.315391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 121.376673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 121.393857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 121.454947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 121.637908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 121.702094] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 121.719822] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 121.782923] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 121.807795] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 121.814858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.861526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 121.868652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.897041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 121.904146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.951942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 121.958947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.152806] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 122.161404] team0: Port device team_slave_0 added [ 122.212437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 122.220982] team0: Port device team_slave_0 added [ 122.238550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 122.247172] team0: Port device team_slave_1 added [ 122.300636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 122.309265] team0: Port device team_slave_1 added [ 122.327910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.389582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.420070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.482776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.521561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.529239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.538448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.567210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 122.575833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.584966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.625462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.633234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.642523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.673863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 122.681513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.691817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.557256] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.563902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.571042] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.577703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.586919] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 123.600015] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.606662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.613908] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.620444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.629908] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 123.811876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.819888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.895352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.939837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.195746] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.234728] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.490884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.497294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.505513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.535271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.542506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.550537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.822285] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.865220] 8021q: adding VLAN 0 to HW filter on device team0 13:58:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) 13:58:06 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 13:58:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:58:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f000001d000)={0x8000000000000001}) dup3(r0, r1, 0x0) 13:58:06 executing program 4: write(0xffffffffffffffff, &(0x7f0000000180)="8a", 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xf0ffffff}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 13:58:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 13:58:07 executing program 4: write(0xffffffffffffffff, &(0x7f0000000180)="8a", 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xf0ffffff}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 13:58:07 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) pread64(r0, &(0x7f0000000000)=""/9, 0x9, 0x0) 13:58:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'saw\x00', 0x2, [{}, {}]}, 0x48) 13:58:07 executing program 1: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:07 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) pread64(r0, &(0x7f0000000000)=""/9, 0x9, 0x0) 13:58:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'saw\x00', 0x2, [{}, {}]}, 0x48) 13:58:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 13:58:07 executing program 4: write(0xffffffffffffffff, &(0x7f0000000180)="8a", 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xf0ffffff}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 13:58:07 executing program 1: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'saw\x00', 0x2, [{}, {}]}, 0x48) 13:58:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 13:58:07 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) pread64(r0, &(0x7f0000000000)=""/9, 0x9, 0x0) 13:58:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:07 executing program 1: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'saw\x00', 0x2, [{}, {}]}, 0x48) 13:58:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) pread64(r0, &(0x7f0000000000)=""/9, 0x9, 0x0) 13:58:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 1: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:08 executing program 2: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bcsf0\x00', 0x43732e5398416f1a}) ppoll(&(0x7f00000000c0)=[{r1}, {r1}], 0x2, &(0x7f0000000140), 0x0, 0x0) 13:58:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:08 executing program 2: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 13:58:08 executing program 0: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:08 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 0: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 4: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bcsf0\x00', 0x43732e5398416f1a}) ppoll(&(0x7f00000000c0)=[{r1}, {r1}], 0x2, &(0x7f0000000140), 0x0, 0x0) 13:58:09 executing program 2: unshare(0x20400) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @local}}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:58:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 0: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 4: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0xffffffffffffff3a) recvmmsg(r1, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/118, 0x76}, {&(0x7f0000000340)=""/106, 0x6a}], 0x2}}], 0x1, 0x0, 0x0) 13:58:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bcsf0\x00', 0x43732e5398416f1a}) ppoll(&(0x7f00000000c0)=[{r1}, {r1}], 0x2, &(0x7f0000000140), 0x0, 0x0) 13:58:09 executing program 0: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 4: r0 = epoll_create(0x220) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000480)) 13:58:09 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) 13:58:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bcsf0\x00', 0x43732e5398416f1a}) ppoll(&(0x7f00000000c0)=[{r1}, {r1}], 0x2, &(0x7f0000000140), 0x0, 0x0) 13:58:09 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000680)={&(0x7f0000000a00)={0x24, 0x2e, 0x109, 0x0, 0x0, {}, [@nested={0x10, 0x0, [@typed={0x4, 0x0, @binary}, @typed={0x8, 0x0, @uid}]}]}, 0x24}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:58:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 13:58:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x3f, 0xa, 0x0, "8cac3a94aa7dfd73c37b6187fc5a11e774c84a936b60a327949ce1273b94266c"}) 13:58:10 executing program 5: r0 = inotify_init1(0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff87, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 13:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 13:58:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x3f, 0xa, 0x0, "8cac3a94aa7dfd73c37b6187fc5a11e774c84a936b60a327949ce1273b94266c"}) 13:58:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000680)={&(0x7f0000000a00)={0x24, 0x2e, 0x109, 0x0, 0x0, {}, [@nested={0x10, 0x0, [@typed={0x4, 0x0, @binary}, @typed={0x8, 0x0, @uid}]}]}, 0x24}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:58:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x6, 0x10, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 13:58:10 executing program 5: r0 = inotify_init1(0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff87, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 13:58:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x3f, 0xa, 0x0, "8cac3a94aa7dfd73c37b6187fc5a11e774c84a936b60a327949ce1273b94266c"}) 13:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 13:58:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000680)={&(0x7f0000000a00)={0x24, 0x2e, 0x109, 0x0, 0x0, {}, [@nested={0x10, 0x0, [@typed={0x4, 0x0, @binary}, @typed={0x8, 0x0, @uid}]}]}, 0x24}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:58:10 executing program 5: r0 = inotify_init1(0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x3f, 0xa, 0x0, "8cac3a94aa7dfd73c37b6187fc5a11e774c84a936b60a327949ce1273b94266c"}) 13:58:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x6, 0x10, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 13:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 13:58:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff87, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 13:58:11 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000680)={&(0x7f0000000a00)={0x24, 0x2e, 0x109, 0x0, 0x0, {}, [@nested={0x10, 0x0, [@typed={0x4, 0x0, @binary}, @typed={0x8, 0x0, @uid}]}]}, 0x24}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:58:11 executing program 5: r0 = inotify_init1(0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff87, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 13:58:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x3ff, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x20) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 13:58:11 executing program 1: unshare(0x600) r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) poll(&(0x7f0000000540)=[{r0}], 0x1, 0x0) [ 134.202252] ================================================================== [ 134.209718] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 134.216327] CPU: 1 PID: 8419 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #8 [ 134.223456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.232836] Call Trace: [ 134.235451] dump_stack+0x173/0x1d0 [ 134.239121] kmsan_report+0x120/0x290 [ 134.242963] kmsan_internal_check_memory+0x9a7/0xa20 [ 134.248103] ? __local_bh_enable_ip+0xb3/0x1a0 13:58:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x20400) setsockopt$packet_tx_ring(r0, 0x107, 0x8, 0xfffffffffffffffe, 0x902b98b342932898) [ 134.252729] __msan_instrument_asm_load+0x8a/0x90 [ 134.257633] __siphash_aligned+0x512/0xae0 [ 134.261951] secure_tcpv6_seq+0x143/0x2b0 [ 134.266152] ? inet6_hash_connect+0x176/0x1a0 [ 134.270694] tcp_v6_connect+0x242b/0x2890 [ 134.274915] ? __msan_poison_alloca+0x1e0/0x270 [ 134.279647] ? tcp_v6_pre_connect+0x130/0x130 [ 134.284174] __inet_stream_connect+0x2f9/0x1340 [ 134.288892] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 134.293787] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 134.298512] tcp_sendmsg_locked+0x65d5/0x6be0 [ 134.303067] ? aa_label_sk_perm+0xda/0x940 [ 134.307367] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 134.312761] ? aa_label_sk_perm+0x6d6/0x940 [ 134.317115] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 134.322512] ? futex_wait+0x912/0xc40 [ 134.326411] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 134.331842] tcp_sendmsg+0xb2/0x100 [ 134.335512] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 134.340206] inet_sendmsg+0x54a/0x720 [ 134.344043] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 134.349460] ? security_socket_sendmsg+0x1bd/0x200 [ 134.354432] ? inet_getname+0x490/0x490 [ 134.358435] __sys_sendto+0x8c4/0xac0 [ 134.362319] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 134.367815] ? prepare_exit_to_usermode+0x114/0x420 [ 134.372859] ? syscall_return_slowpath+0x50/0x650 [ 134.377764] __se_sys_sendto+0x107/0x130 [ 134.381885] __x64_sys_sendto+0x6e/0x90 [ 134.385890] do_syscall_64+0xbc/0xf0 [ 134.389637] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 134.394862] RIP: 0033:0x457669 13:58:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x6, 0x10, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) [ 134.398087] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.417013] RSP: 002b:00007ff6fa5d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 134.424750] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 134.432032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 134.439343] RBP: 000000000072bf00 R08: 000000002006ffe4 R09: 000000000000001c [ 134.446628] R10: fffffefffffffffe R11: 0000000000000246 R12: 00007ff6fa5da6d4 [ 134.453937] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 134.461260] [ 134.462926] Local variable description: ----combined@secure_tcpv6_seq [ 134.469502] Variable was created at: [ 134.473238] secure_tcpv6_seq+0x7d/0x2b0 [ 134.477316] tcp_v6_connect+0x242b/0x2890 [ 134.481465] [ 134.483119] Bytes 4-7 of 8 are uninitialized [ 134.487532] Memory access of size 8 starts at ffff88815ac9f658 [ 134.493513] ================================================================== [ 134.500872] Disabling lock debugging due to kernel taint [ 134.506337] Kernel panic - not syncing: panic_on_warn set ... [ 134.512235] CPU: 1 PID: 8419 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #8 [ 134.520743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.530102] Call Trace: [ 134.532712] dump_stack+0x173/0x1d0 [ 134.536379] panic+0x3ce/0x961 [ 134.539632] kmsan_report+0x285/0x290 [ 134.543467] kmsan_internal_check_memory+0x9a7/0xa20 [ 134.548604] ? __local_bh_enable_ip+0xb3/0x1a0 [ 134.553223] __msan_instrument_asm_load+0x8a/0x90 [ 134.558103] __siphash_aligned+0x512/0xae0 [ 134.562388] secure_tcpv6_seq+0x143/0x2b0 [ 134.566551] ? inet6_hash_connect+0x176/0x1a0 [ 134.571092] tcp_v6_connect+0x242b/0x2890 [ 134.575280] ? __msan_poison_alloca+0x1e0/0x270 [ 134.579989] ? tcp_v6_pre_connect+0x130/0x130 [ 134.584502] __inet_stream_connect+0x2f9/0x1340 [ 134.589186] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 134.594046] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 134.598772] tcp_sendmsg_locked+0x65d5/0x6be0 [ 134.603317] ? aa_label_sk_perm+0xda/0x940 [ 134.607572] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 134.612949] ? aa_label_sk_perm+0x6d6/0x940 [ 134.617296] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 134.622678] ? futex_wait+0x912/0xc40 [ 134.626552] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 134.631956] tcp_sendmsg+0xb2/0x100 [ 134.635603] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 134.640283] inet_sendmsg+0x54a/0x720 [ 134.644107] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 134.649482] ? security_socket_sendmsg+0x1bd/0x200 [ 134.654430] ? inet_getname+0x490/0x490 [ 134.658424] __sys_sendto+0x8c4/0xac0 [ 134.662289] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 134.667764] ? prepare_exit_to_usermode+0x114/0x420 [ 134.672798] ? syscall_return_slowpath+0x50/0x650 [ 134.677660] __se_sys_sendto+0x107/0x130 [ 134.681756] __x64_sys_sendto+0x6e/0x90 [ 134.685755] do_syscall_64+0xbc/0xf0 [ 134.689483] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 134.694676] RIP: 0033:0x457669 [ 134.697877] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.716784] RSP: 002b:00007ff6fa5d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 134.724498] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 134.731772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 134.739049] RBP: 000000000072bf00 R08: 000000002006ffe4 R09: 000000000000001c [ 134.746333] R10: fffffefffffffffe R11: 0000000000000246 R12: 00007ff6fa5da6d4 [ 134.753610] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 134.761942] Kernel Offset: disabled [ 134.765579] Rebooting in 86400 seconds..