Warning: Permanently added '10.128.0.186' (ECDSA) to the list of known hosts. 2018/12/20 16:03:37 fuzzer started 2018/12/20 16:03:42 dialing manager at 10.128.0.26:46613 2018/12/20 16:03:42 syscalls: 1 2018/12/20 16:03:42 code coverage: enabled 2018/12/20 16:03:42 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 16:03:42 setuid sandbox: enabled 2018/12/20 16:03:42 namespace sandbox: enabled 2018/12/20 16:03:42 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 16:03:42 fault injection: enabled 2018/12/20 16:03:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 16:03:42 net packet injection: enabled 2018/12/20 16:03:42 net device setup: enabled 16:04:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) fchdir(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) io_submit(0x0, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x101, &(0x7f0000000340)={0x11, 0x1, 0x0, 0x1, 0x0, 0x6, @dev={[], 0x1e}}, 0x14) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340)='threaded\x00', 0xffffffc5) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 137.911788] IPVS: ftp: loaded support on port[0] = 21 [ 139.263778] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.270346] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.278814] device bridge_slave_0 entered promiscuous mode [ 139.360810] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.367421] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.375895] device bridge_slave_1 entered promiscuous mode [ 139.454317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 139.533112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.782647] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 139.866372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 139.949305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.956380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.037833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 140.044900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.294784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 140.303465] team0: Port device team_slave_0 added [ 140.382790] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 140.391306] team0: Port device team_slave_1 added [ 140.472611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.557935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.641453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 140.649173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.658515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.742365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 140.749906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.759377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:04:52 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) [ 141.754670] IPVS: ftp: loaded support on port[0] = 21 [ 142.020119] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.026710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.033897] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.040455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.049479] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 142.056072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.034948] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.041470] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.049642] device bridge_slave_0 entered promiscuous mode [ 144.187217] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.193894] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.203085] device bridge_slave_1 entered promiscuous mode [ 144.349577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 144.500933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 144.889528] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.975686] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.583760] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 145.592559] team0: Port device team_slave_0 added [ 145.739949] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 145.748678] team0: Port device team_slave_1 added [ 145.850902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 145.871716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.880498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.010927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.147661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 146.155432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.164507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.323539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 146.331079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.342660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:04:57 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x71) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 147.096671] IPVS: ftp: loaded support on port[0] = 21 [ 147.463870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.966374] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.972987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.980165] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.986798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.995881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 148.002487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.027097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 148.630927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 148.637323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.645450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.263026] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.858875] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.865510] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.873988] device bridge_slave_0 entered promiscuous mode [ 150.061825] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.068323] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.076587] device bridge_slave_1 entered promiscuous mode [ 150.244280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 150.402606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.915699] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 151.103279] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.187068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 151.194153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.317926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 151.324992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.704108] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.712816] team0: Port device team_slave_0 added [ 151.841229] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 151.850451] team0: Port device team_slave_1 added [ 151.975147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.129812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.314970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.323064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.332229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.543569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.551117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.560246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:05:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x60002, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) fcntl$setstatus(r1, 0x4, 0x42000) dup3(r2, r0, 0x0) 16:05:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x60002, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) fcntl$setstatus(r1, 0x4, 0x42000) dup3(r2, r0, 0x0) 16:05:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x60002, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) fcntl$setstatus(r1, 0x4, 0x42000) dup3(r2, r0, 0x0) 16:05:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x60002, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000040)=0x8, 0x4) fcntl$setstatus(r1, 0x4, 0x42000) dup3(r2, r0, 0x0) 16:05:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) [ 154.303824] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.310449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.318164] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.324745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.334250] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 154.340802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 16:05:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 16:05:05 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 16:05:06 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) [ 155.046478] 8021q: adding VLAN 0 to HW filter on device bond0 16:05:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, 0x0) [ 155.407186] IPVS: ftp: loaded support on port[0] = 21 [ 155.495590] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 155.784704] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 156.471159] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 156.477550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.485404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.144909] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.068777] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.075421] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.083985] device bridge_slave_0 entered promiscuous mode [ 158.250919] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.257955] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.266262] device bridge_slave_1 entered promiscuous mode [ 158.473746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 158.661815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 159.159064] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.383059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.585717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 159.592812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.768211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 159.775827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.268220] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 160.276950] team0: Port device team_slave_0 added [ 160.486325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.494915] team0: Port device team_slave_1 added [ 160.698136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.705261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.714208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 16:05:11 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) [ 160.915411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.922438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.931324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.977829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.139303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 161.147048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.156206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.253075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 161.260740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.269805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.640817] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.061419] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.067928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.075798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.632652] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.639247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.646434] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.653044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.661934] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 162.669216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.687644] 8021q: adding VLAN 0 to HW filter on device team0 16:05:16 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x19, @mcast2, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0xa761, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x13d6, @remote, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @rand_addr=0x40}], 0xfffffffffffffead) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x463}) listen(r0, 0x4) 16:05:16 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x71) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 16:05:16 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) 16:05:16 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x2, 0x7ff, 0x1, 0x9a}) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000080)={0x10000000000000, "e04f6b4aeb96a0adff5935ce33e471bd1bf3e4d1013654fc2946697425f7a92b", 0x1090, 0x4, 0x80, 0x2, 0x3}) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0xffffffff) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) keyctl$search(0xa, r1, &(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, r1) keyctl$setperm(0x5, r1, 0x2008) r3 = geteuid() setuid(r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) prlimit64(r4, 0x2, &(0x7f0000000340)={0x9, 0xffff}, &(0x7f0000000380)) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x49) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x42, "cb542b569b56e8fe31872ec7c6ddc95ac60b11614ff37d911c7cd8e245ef39243bb3bba12bf2cfdcd3425ec38d9e379e3a51af63fa72e86813a2b03e65197fd6cb85"}, &(0x7f0000000440)=0x4a) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000480)={r5, 0xfffffffffffffffb, 0x8000, 0x69}, 0x10) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000004c0)={0xfa, 0xffffffffffffe29d, 0xc6a}) r6 = syz_open_dev$sg(&(0x7f0000000500)='/dev/sg#\x00', 0x7, 0x90080) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000540)={r5, 0x4, 0x45, "6af254e8b879831e75ff9bce805f8be47404bfa03bb3cad2886163fd3088dd26345dbcf71675131ce0bd8a0921976fc8e4c2e2ffc523400b9f88a19a5e838b991674f79170"}, 0x4d) keyctl$revoke(0x3, r1) fcntl$setown(r6, 0x8, r4) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000005c0)={0x0, 0x2, @start={0x33476aba, 0x1}}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x2, &(0x7f0000000640)=""/20) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) bind$vsock_stream(r0, &(0x7f0000000680)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f00000006c0)={0x3, "4e729e7fd603b1d47dfa094cc0d73dd8cef00959ccbd8c5bb873d7190efbdb00", 0x1, 0x80, 0x4, 0x7, 0x12, 0x3, 0x1, 0x8000}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000740)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x4e22, 0xfffe, @mcast2, 0x8}], 0x2c) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000780)={0x9, 0x9}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000007c0)={'ipddp0\x00', 0x16583b92}) 16:05:17 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x19, @mcast2, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0xa761, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x13d6, @remote, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @rand_addr=0x40}], 0xfffffffffffffead) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x463}) listen(r0, 0x4) 16:05:17 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x71) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 16:05:17 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) [ 166.584112] IPVS: ftp: loaded support on port[0] = 21 [ 168.229508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.539997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.581338] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.587909] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.596229] device bridge_slave_0 entered promiscuous mode [ 168.675630] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.682135] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.689442] device bridge_slave_1 entered promiscuous mode [ 168.766938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.844563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 168.859757] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.867600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.875704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.082698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.165076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.182249] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.245362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 169.252360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.333461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 169.340648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.601663] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 169.610258] team0: Port device team_slave_0 added [ 169.688136] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 169.696700] team0: Port device team_slave_1 added [ 169.775225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.859130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.939963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 169.947663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.956753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.036686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.044296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.053332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.939651] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.946322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.953443] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.959906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.968239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.222081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 16:05:22 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x19, @mcast2, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0xa761, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x13d6, @remote, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @rand_addr=0x40}], 0xfffffffffffffead) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x463}) listen(r0, 0x4) 16:05:22 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x71) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 16:05:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r2, 0x7f, 0x10, 0x3f}, &(0x7f0000000100)=0x18) exit_group(0x6) 16:05:22 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/99) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000000c0)=0xce) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r1}}, 0xc) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0)=0x1, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000280)) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x2, 0x10000) execveat(r0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000340)=']selfnodev\x00', &(0x7f0000000380)='/dev/dlm-monitor\x00', &(0x7f00000003c0)='keyring*cpusetlo-!\x00', &(0x7f0000000400)='/dev/sg#\x00', &(0x7f0000000440)='[user,posix_acl_accesseth0\x00', &(0x7f0000000480)='L\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='\x00', &(0x7f0000000540)='$*\x00'], 0x1000) r3 = openat$cgroup_ro(r0, &(0x7f00000005c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, r2, 0x0, 0x15, &(0x7f0000000600)='$cpusetem0wlan0%,@@(\x00', 0xffffffffffffffff}, 0x30) r5 = syz_open_procfs$namespace(r4, &(0x7f0000000680)='ns/net\x00') ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x264) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dsp\x00', 0x40000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000740)='*&{eth1ppp1eth1procsecurity-ppp0selinuxnodevem1eth1\x00') syz_open_dev$vivid(&(0x7f0000000780)='/dev/video#\x00', 0x3, 0x2) write$cgroup_subtree(r0, &(0x7f00000007c0)={[{0x2b, 'pids'}]}, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vsock\x00', 0x218000, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r6, 0xc0305616, &(0x7f0000000840)={0x0, {0x8, 0x100000001}}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000008c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000880), r1}}, 0x18) setsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000900)=0x8000, 0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000940)) 16:05:22 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_script(r0, 0x0, 0x0) 16:05:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond\x00', &(0x7f00000000c0)=@ethtool_gstrings={0x28}}) close(r2) close(r1) 16:05:22 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x19, @mcast2, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0xa761, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x13d6, @remote, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @rand_addr=0x40}], 0xfffffffffffffead) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x463}) listen(r0, 0x4) [ 172.028554] IPVS: ftp: loaded support on port[0] = 21 [ 173.382706] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.389248] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.397593] device bridge_slave_0 entered promiscuous mode [ 173.477891] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.484540] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.492755] device bridge_slave_1 entered promiscuous mode [ 173.570820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.649821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.896400] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.982975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.064294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.071269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.154055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 174.161018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.405547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 174.414272] team0: Port device team_slave_0 added [ 174.493743] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 174.502329] team0: Port device team_slave_1 added [ 174.581100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.664825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.747145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.756105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.765293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.849844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.858635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.867916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.883340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.187441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 175.483014] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 175.489302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.497411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.750022] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.756649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.763827] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.770408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.781021] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 175.806862] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.032903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:05:28 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_script(r0, 0x0, 0x0) 16:05:28 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) 16:05:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond\x00', &(0x7f00000000c0)=@ethtool_gstrings={0x28}}) close(r2) close(r1) 16:05:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:28 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x19, @mcast2, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0xa761, @loopback, 0x9}, @in6={0xa, 0x4e20, 0x13d6, @remote, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @rand_addr=0x40}], 0xfffffffffffffead) listen(r0, 0x4) [ 177.810091] mmap: syz-executor4 (7986): VmData 18493440 exceed data ulimit 9. Update limits or use boot option ignore_rlimit_data. 16:05:29 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_script(r0, 0x0, 0x0) 16:05:29 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond\x00', &(0x7f00000000c0)=@ethtool_gstrings={0x28}}) close(r2) close(r1) [ 178.970052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.136232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.299207] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 179.305489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.313481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.480356] 8021q: adding VLAN 0 to HW filter on device team0 16:05:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:05:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:31 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_script(r0, 0x0, 0x0) 16:05:31 executing program 0: unshare(0x20400) listen(0xffffffffffffffff, 0x4) 16:05:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond\x00', &(0x7f00000000c0)=@ethtool_gstrings={0x28}}) close(r2) close(r1) 16:05:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) 16:05:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:31 executing program 0: unshare(0x20400) listen(0xffffffffffffffff, 0x4) 16:05:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:05:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:32 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8904, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 16:05:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 181.041336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 16:05:32 executing program 0: unshare(0x20400) listen(0xffffffffffffffff, 0x4) 16:05:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:05:32 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8904, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 16:05:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000000c0)=""/184, 0xb8}], 0x2, 0x0) 16:05:32 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) 16:05:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:05:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) close(r2) close(r1) 16:05:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:32 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8904, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 16:05:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000000c0)=""/184, 0xb8}], 0x2, 0x0) [ 181.750298] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 16:05:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000480)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 16:05:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) close(r2) close(r1) 16:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) 16:05:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000000c0)=""/184, 0xb8}], 0x2, 0x0) 16:05:33 executing program 0: unshare(0x0) r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:33 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8904, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 16:05:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000480)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 16:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) close(r2) close(r1) [ 182.302093] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 16:05:33 executing program 0: unshare(0x0) r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000000c0)=""/184, 0xb8}], 0x2, 0x0) 16:05:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:33 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) 16:05:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000480)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 16:05:33 executing program 0: unshare(0x0) r0 = socket(0x10, 0x803, 0x0) listen(r0, 0x4) 16:05:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) [ 182.752569] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 16:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) close(r2) close(r1) [ 182.850167] syz-executor5 (8264): /proc/8264/oom_adj is deprecated, please use /proc/8264/oom_score_adj instead. 16:05:34 executing program 0: unshare(0x20400) r0 = socket(0x0, 0x803, 0x0) listen(r0, 0x4) 16:05:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000), 0xfe7b) 16:05:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000480)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 16:05:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000), 0xfe7b) 16:05:34 executing program 0: unshare(0x20400) r0 = socket(0x0, 0x803, 0x0) listen(r0, 0x4) 16:05:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000), 0xfe7b) 16:05:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:34 executing program 0: unshare(0x20400) r0 = socket(0x0, 0x803, 0x0) listen(r0, 0x4) 16:05:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000), 0xfe7b) 16:05:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, &(0x7f0000000000), 0x7fff) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x800) 16:05:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:35 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0xc, 0x7, 0x0, 0x0, [{}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 16:05:35 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x0, 0x0) listen(r0, 0x4) 16:05:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00\x00\x00\x00\x00\x00\x00?\x00\x00h'}]}, 0x34}}, 0x0) 16:05:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 16:05:35 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0xc, 0x7, 0x0, 0x0, [{}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 16:05:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0xffffffffffffffff, &(0x7f0000000100)) 16:05:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00\x00\x00\x00\x00\x00\x00?\x00\x00h'}]}, 0x34}}, 0x0) 16:05:35 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x0, 0x0) listen(r0, 0x4) 16:05:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x46, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) 16:05:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0xffffffffffffffff, &(0x7f0000000100)) 16:05:35 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0xc, 0x7, 0x0, 0x0, [{}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 16:05:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00\x00\x00\x00\x00\x00\x00?\x00\x00h'}]}, 0x34}}, 0x0) 16:05:35 executing program 0: unshare(0x20400) r0 = socket(0x10, 0x0, 0x0) listen(r0, 0x4) 16:05:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0xffffffffffffffff, &(0x7f0000000100)) 16:05:36 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@timestamp={0x44, 0xc, 0x7, 0x0, 0x0, [{}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 16:05:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0xffffffffffffffff, &(0x7f0000000100)) 16:05:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00\x00\x00\x00\x00\x00\x00?\x00\x00h'}]}, 0x34}}, 0x0) 16:05:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:36 executing program 0: unshare(0x20400) socket(0x10, 0x803, 0x0) listen(0xffffffffffffffff, 0x4) 16:05:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x46, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) 16:05:36 executing program 4: unshare(0x28020400) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) 16:05:36 executing program 5: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000540), 0xcf53e35) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x0) close(r0) 16:05:36 executing program 0: unshare(0x20400) socket(0x10, 0x803, 0x0) listen(0xffffffffffffffff, 0x4) 16:05:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000680), &(0x7f0000000640)=0x2f7) 16:05:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 185.611930] ================================================================== [ 185.619359] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 185.625959] CPU: 0 PID: 8422 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #8 [ 185.633075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.642436] Call Trace: [ 185.645077] dump_stack+0x173/0x1d0 [ 185.648741] kmsan_report+0x120/0x290 [ 185.652574] kmsan_internal_check_memory+0x9a7/0xa20 [ 185.657733] __msan_instrument_asm_load+0x8a/0x90 [ 185.662607] __siphash_aligned+0x512/0xae0 [ 185.666895] secure_ipv6_port_ephemeral+0x110/0x220 [ 185.671948] inet6_hash_connect+0x11f/0x1a0 [ 185.676312] tcp_v6_connect+0x20ba/0x2890 [ 185.680520] ? __msan_poison_alloca+0x1e0/0x270 [ 185.685233] ? tcp_v6_pre_connect+0x130/0x130 [ 185.689753] __inet_stream_connect+0x2f9/0x1340 [ 185.694513] inet_stream_connect+0x101/0x180 [ 185.698959] __sys_connect+0x664/0x820 [ 185.702886] ? __inet_stream_connect+0x1340/0x1340 [ 185.707871] ? prepare_exit_to_usermode+0x114/0x420 [ 185.712930] ? syscall_return_slowpath+0x50/0x650 [ 185.717814] __se_sys_connect+0x8d/0xb0 [ 185.721824] __x64_sys_connect+0x4a/0x70 [ 185.725907] do_syscall_64+0xbc/0xf0 [ 185.729645] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 185.734847] RIP: 0033:0x457669 [ 185.738072] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.757013] RSP: 002b:00007fbc730d4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 185.764760] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 185.772054] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000005 [ 185.779371] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 185.786672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc730d56d3 [ 185.793954] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 185.801268] [ 185.802913] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 185.810367] Variable was created at: [ 185.814098] secure_ipv6_port_ephemeral+0x6a/0x220 [ 185.819052] inet6_hash_connect+0x11f/0x1a0 [ 185.823381] [ 185.825011] Bytes 2-7 of 8 are uninitialized [ 185.829429] Memory access of size 8 starts at ffff88814a82f9f0 [ 185.835400] ================================================================== [ 185.842760] Disabling lock debugging due to kernel taint [ 185.848219] Kernel panic - not syncing: panic_on_warn set ... [ 185.854133] CPU: 0 PID: 8422 Comm: syz-executor5 Tainted: G B 4.20.0-rc7+ #8 [ 185.862646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.872004] Call Trace: [ 185.874621] dump_stack+0x173/0x1d0 [ 185.878286] panic+0x3ce/0x961 [ 185.881548] kmsan_report+0x285/0x290 [ 185.885397] kmsan_internal_check_memory+0x9a7/0xa20 [ 185.890557] __msan_instrument_asm_load+0x8a/0x90 [ 185.895430] __siphash_aligned+0x512/0xae0 [ 185.899721] secure_ipv6_port_ephemeral+0x110/0x220 [ 185.904782] inet6_hash_connect+0x11f/0x1a0 [ 185.909135] tcp_v6_connect+0x20ba/0x2890 16:05:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000680), &(0x7f0000000640)=0x2f7) [ 185.913330] ? __msan_poison_alloca+0x1e0/0x270 [ 185.918037] ? tcp_v6_pre_connect+0x130/0x130 [ 185.922573] __inet_stream_connect+0x2f9/0x1340 [ 185.927313] inet_stream_connect+0x101/0x180 [ 185.931752] __sys_connect+0x664/0x820 [ 185.935668] ? __inet_stream_connect+0x1340/0x1340 [ 185.940625] ? prepare_exit_to_usermode+0x114/0x420 [ 185.945691] ? syscall_return_slowpath+0x50/0x650 [ 185.950567] __se_sys_connect+0x8d/0xb0 [ 185.954581] __x64_sys_connect+0x4a/0x70 [ 185.958669] do_syscall_64+0xbc/0xf0 [ 185.962413] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 185.967619] RIP: 0033:0x457669 [ 185.970843] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.989761] RSP: 002b:00007fbc730d4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 185.997482] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 186.004764] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000005 [ 186.012057] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 186.019343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc730d56d3 [ 186.026629] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 186.034853] Kernel Offset: disabled [ 186.038486] Rebooting in 86400 seconds..