[ 52.126129] audit: type=1800 audit(1545315019.183:25): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.801991] kauditd_printk_skb: 3 callbacks suppressed [ 53.802016] audit: type=1800 audit(1545315020.853:29): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 53.826632] audit: type=1800 audit(1545315020.863:30): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2018/12/20 14:10:32 fuzzer started 2018/12/20 14:10:37 dialing manager at 10.128.0.26:46613 2018/12/20 14:10:37 syscalls: 1 2018/12/20 14:10:37 code coverage: enabled 2018/12/20 14:10:37 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 14:10:37 setuid sandbox: enabled 2018/12/20 14:10:37 namespace sandbox: enabled 2018/12/20 14:10:37 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 14:10:37 fault injection: enabled 2018/12/20 14:10:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 14:10:37 net packet injection: enabled 2018/12/20 14:10:37 net device setup: enabled 14:10:56 executing program 0: unshare(0x20400) r0 = socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff01e, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) syzkaller login: [ 90.171500] IPVS: ftp: loaded support on port[0] = 21 [ 91.607985] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.614620] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.623077] device bridge_slave_0 entered promiscuous mode [ 91.707776] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.714367] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.722895] device bridge_slave_1 entered promiscuous mode [ 91.806928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 91.890183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 92.143456] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 92.230313] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 92.316310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 92.323359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.407854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 92.414879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.673475] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 92.682384] team0: Port device team_slave_0 added [ 92.765795] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 92.774332] team0: Port device team_slave_1 added [ 92.859017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.947048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 93.032352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 93.039983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.049472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.136972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 93.144637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.153889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:11:00 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 94.037426] IPVS: ftp: loaded support on port[0] = 21 [ 94.389231] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.395881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.403170] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.409721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.419091] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 94.425725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.281131] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.287830] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.296247] device bridge_slave_0 entered promiscuous mode [ 96.414062] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.420631] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.429151] device bridge_slave_1 entered promiscuous mode [ 96.563720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 96.717875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 97.124683] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 97.260570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 97.753997] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 97.762743] team0: Port device team_slave_0 added [ 97.904010] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 97.912738] team0: Port device team_slave_1 added [ 98.021929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 98.028946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 98.038055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 98.120386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 98.127449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 98.136492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.268860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 98.276430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.285592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.377818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 98.385528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.394824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:11:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) [ 99.336812] IPVS: ftp: loaded support on port[0] = 21 [ 100.024829] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.031400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.038473] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.045040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.054535] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 100.061022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.978787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.667055] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.009792] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.016557] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.024940] device bridge_slave_0 entered promiscuous mode [ 102.173094] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.180269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.188318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.219903] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.226563] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.234843] device bridge_slave_1 entered promiscuous mode [ 102.428950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.588323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.794561] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.028106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.194528] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.278648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 103.286140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 103.404278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 103.411293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.817611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.826363] team0: Port device team_slave_0 added [ 103.940476] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.949660] team0: Port device team_slave_1 added [ 104.042842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.231210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 104.238310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 104.247406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.412731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.420344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.429391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.606060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.613806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.622900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.667128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.680314] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.686910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.694078] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.700723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.709729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.716324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:11:13 executing program 0: unshare(0x20400) r0 = socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff01e, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) 14:11:14 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002d0007031dfffd946fa2830020200a0ceb000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:11:14 executing program 0: unshare(0x20400) r0 = socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff01e, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) 14:11:14 executing program 0: unshare(0x20400) r0 = socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff01e, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) [ 107.433215] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:11:14 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) [ 107.584159] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 107.785430] IPVS: ftp: loaded support on port[0] = 21 14:11:15 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) [ 108.194948] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 108.201396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.209381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:11:15 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 14:11:15 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) [ 109.007840] 8021q: adding VLAN 0 to HW filter on device team0 14:11:16 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 14:11:16 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) [ 110.789572] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.796487] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.805029] device bridge_slave_0 entered promiscuous mode [ 110.997350] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.004124] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.012295] device bridge_slave_1 entered promiscuous mode [ 111.185933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.349886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.823898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.003658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.215816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.222986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.410128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.417145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.964525] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 112.973285] team0: Port device team_slave_0 added 14:11:20 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 113.129093] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.137779] team0: Port device team_slave_1 added [ 113.360269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.367438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.376457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.494728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.501703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.510687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.673877] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.681634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.692163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.810287] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.818006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.826934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.133734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.658980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 115.004879] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 115.011175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.019070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.079733] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.086360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.093502] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.100045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.109062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.122578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.564719] 8021q: adding VLAN 0 to HW filter on device team0 14:11:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:26 executing program 0: userfaultfd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x0, 0x0, 0x1, 0x0, 0x30f25eef}]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x0) [ 120.203493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.382590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.545049] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.551237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.559305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.718660] 8021q: adding VLAN 0 to HW filter on device team0 14:11:28 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0xb, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 'syz1\x00', &(0x7f0000000080)}) 14:11:28 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002d0007031dfffd946fa2830020200a0ceb000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:11:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) [ 121.780535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 121.792117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 14:11:28 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 14:11:29 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) [ 122.016808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 14:11:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:29 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002d0007031dfffd946fa2830020200a0ceb000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:11:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) [ 122.289532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 14:11:29 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBLED(r0, 0xc08c5114, &(0x7f0000a07fff)) 14:11:29 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002d0007031dfffd946fa2830020200a0ceb000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 122.559644] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 122.861624] IPVS: ftp: loaded support on port[0] = 21 [ 122.883258] IPVS: ftp: loaded support on port[0] = 21 [ 124.215090] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.221617] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.229844] device bridge_slave_0 entered promiscuous mode [ 124.246902] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.253612] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.261933] device bridge_slave_0 entered promiscuous mode [ 124.313726] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.320254] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.328742] device bridge_slave_1 entered promiscuous mode [ 124.342633] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.349146] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.357498] device bridge_slave_1 entered promiscuous mode [ 124.409752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 124.439396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 124.491037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 124.525886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 124.742967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.781149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.829299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.869215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.921609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 124.928757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 124.967392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 124.974638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.012943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.019978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.059559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.067214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.276551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.285309] team0: Port device team_slave_0 added [ 125.325294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.334479] team0: Port device team_slave_0 added [ 125.365135] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.373706] team0: Port device team_slave_1 added [ 125.418263] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.426802] team0: Port device team_slave_1 added [ 125.447530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.505744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.532656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.591279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.613194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.621005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.630038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.691577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.699250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.708579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.723708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.731216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.740237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.820789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.828371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.837826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.591247] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.597894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.605066] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.611535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.619729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.782743] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.789318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.796501] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.803079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.811974] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.901959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.909959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.971981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.224819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.294934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 130.544297] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 130.632315] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 130.638572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.647946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.876375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 130.882836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.890713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.940997] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.211718] 8021q: adding VLAN 0 to HW filter on device team0 14:11:40 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0xb, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 'syz1\x00', &(0x7f0000000080)}) 14:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:40 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBLED(r0, 0xc08c5114, &(0x7f0000a07fff)) 14:11:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x1, 0x51, 0x400000002}], 0xb69) 14:11:40 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBLED(r0, 0xc08c5114, &(0x7f0000a07fff)) 14:11:40 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0xb, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 'syz1\x00', &(0x7f0000000080)}) 14:11:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x5, 0x8, 0x3f, 0xf8, "f5f48a6bc2d70e88ff950a1f227aa815b3513cfe6943a22d27c9090f4446239242bbe43b6efbf8fa20684e70d22c2143960a54a572371d4a42362fbcd0cb769cd67a20918e042e55bfd5b1f1498612810bf49d6f4fd5783b5ba442c1a079aaa0bd194d1c17b467690690e35bd262d22c308fdbebee7b0999acd074931ee1e0c1e91f5e9ef6ad23b5ca6f41ea60a6487d74600553fcde3195f74681f78fa972e25bb7a67ae3b644f0af1983aaca426fa6aa37cc9613d257a3af364445959e6281e5d90b1570e25de49c90d938dcfb7c29a5696cc769392d50794a8d1227c9912378ad1c8fa44c9116b51968120ff3a28d442c2b5c99a91597"}, 0x104) 14:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:40 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0xb, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 'syz1\x00', &(0x7f0000000080)}) 14:11:40 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBLED(r0, 0xc08c5114, &(0x7f0000a07fff)) 14:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0x5) 14:11:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) r1 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x1, 0x51, 0x400000002}], 0xb69) 14:11:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 14:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) r2 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) sendfile(r0, r0, &(0x7f00000000c0), 0x5) 14:11:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) r1 = syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000001780), &(0x7f00000017c0)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x1, 0x51, 0x400000002}], 0xb69) 14:11:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 14:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) sendfile(r0, r0, &(0x7f00000000c0), 0x5) 14:11:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 14:11:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 14:11:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) syz_open_dev$adsp(&(0x7f0000001740)='/dev/adsp#\x00', 0x8e9, 0x8000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x1, 0x51, 0x400000002}], 0xb69) 14:11:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 14:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000) sendfile(r0, r0, &(0x7f00000000c0), 0x5) 14:11:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11, 0x9effffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:11:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 14:11:42 executing program 5: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 14:11:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r0, r0, &(0x7f00000000c0), 0x5) 14:11:42 executing program 3: r0 = socket$inet6(0xa, 0x80006, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 14:11:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000c86000), &(0x7f0000000040)=0x3b) 14:11:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x8000, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) [ 135.248177] ================================================================== [ 135.255625] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 135.262221] CPU: 0 PID: 8265 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #8 [ 135.269346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.278716] Call Trace: [ 135.281335] dump_stack+0x173/0x1d0 [ 135.285013] kmsan_report+0x120/0x290 [ 135.288867] kmsan_internal_check_memory+0x9a7/0xa20 [ 135.294030] __msan_instrument_asm_load+0x8a/0x90 [ 135.298894] __siphash_aligned+0x512/0xae0 [ 135.303173] secure_ipv6_port_ephemeral+0x110/0x220 [ 135.308250] inet6_hash_connect+0x11f/0x1a0 [ 135.312611] tcp_v6_connect+0x20ba/0x2890 [ 135.316817] ? __msan_poison_alloca+0x1e0/0x270 [ 135.321539] ? tcp_v6_pre_connect+0x130/0x130 [ 135.326067] __inet_stream_connect+0x2f9/0x1340 [ 135.330796] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 135.335676] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 135.340392] tcp_sendmsg_locked+0x65d5/0x6be0 [ 135.344937] ? aa_label_sk_perm+0xda/0x940 [ 135.349210] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 135.354650] ? aa_label_sk_perm+0x6d6/0x940 [ 135.359008] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 135.364428] ? futex_wait+0x912/0xc40 [ 135.368349] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 135.373767] tcp_sendmsg+0xb2/0x100 [ 135.377432] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 135.382130] inet_sendmsg+0x54a/0x720 [ 135.385962] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 135.391380] ? security_socket_sendmsg+0x1bd/0x200 [ 135.396397] ? inet_getname+0x490/0x490 [ 135.400397] __sys_sendto+0x8c4/0xac0 [ 135.404257] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 135.409734] ? prepare_exit_to_usermode+0x114/0x420 [ 135.414801] ? syscall_return_slowpath+0x50/0x650 [ 135.419665] __se_sys_sendto+0x107/0x130 [ 135.423761] __x64_sys_sendto+0x6e/0x90 [ 135.427762] do_syscall_64+0xbc/0xf0 [ 135.431503] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 135.436701] RIP: 0033:0x457669 [ 135.439920] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.458831] RSP: 002b:00007fe49b6e4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 135.466575] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 135.473849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 135.481125] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c [ 135.488425] R10: fffffefffffffffe R11: 0000000000000246 R12: 00007fe49b6e56d4 [ 135.495745] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 135.503036] [ 135.504675] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 135.512113] Variable was created at: [ 135.515841] secure_ipv6_port_ephemeral+0x6a/0x220 [ 135.520796] inet6_hash_connect+0x11f/0x1a0 [ 135.525113] [ 135.526752] Bytes 2-7 of 8 are uninitialized [ 135.531155] Memory access of size 8 starts at ffff88815b31f5f0 [ 135.537116] ================================================================== [ 135.544469] Disabling lock debugging due to kernel taint [ 135.549917] Kernel panic - not syncing: panic_on_warn set ... [ 135.555815] CPU: 0 PID: 8265 Comm: syz-executor4 Tainted: G B 4.20.0-rc7+ #8 [ 135.564334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.573690] Call Trace: [ 135.576314] dump_stack+0x173/0x1d0 [ 135.579965] panic+0x3ce/0x961 [ 135.583215] kmsan_report+0x285/0x290 [ 135.587048] kmsan_internal_check_memory+0x9a7/0xa20 [ 135.592198] __msan_instrument_asm_load+0x8a/0x90 [ 135.597061] __siphash_aligned+0x512/0xae0 [ 135.601347] secure_ipv6_port_ephemeral+0x110/0x220 [ 135.606401] inet6_hash_connect+0x11f/0x1a0 [ 135.610778] tcp_v6_connect+0x20ba/0x2890 [ 135.615004] ? __msan_poison_alloca+0x1e0/0x270 [ 135.619703] ? tcp_v6_pre_connect+0x130/0x130 [ 135.624231] __inet_stream_connect+0x2f9/0x1340 [ 135.628913] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 135.633773] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 135.638495] tcp_sendmsg_locked+0x65d5/0x6be0 [ 135.643045] ? aa_label_sk_perm+0xda/0x940 [ 135.647309] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 135.652684] ? aa_label_sk_perm+0x6d6/0x940 [ 135.657015] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 135.662401] ? futex_wait+0x912/0xc40 [ 135.666271] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 135.671690] tcp_sendmsg+0xb2/0x100 [ 135.675363] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 135.680048] inet_sendmsg+0x54a/0x720 [ 135.683901] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 135.689275] ? security_socket_sendmsg+0x1bd/0x200 [ 135.694265] ? inet_getname+0x490/0x490 [ 135.698269] __sys_sendto+0x8c4/0xac0 [ 135.702132] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 135.707594] ? prepare_exit_to_usermode+0x114/0x420 [ 135.712617] ? syscall_return_slowpath+0x50/0x650 [ 135.717474] __se_sys_sendto+0x107/0x130 [ 135.721566] __x64_sys_sendto+0x6e/0x90 [ 135.725561] do_syscall_64+0xbc/0xf0 [ 135.729299] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 135.734494] RIP: 0033:0x457669 [ 135.737692] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.756595] RSP: 002b:00007fe49b6e4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 135.764326] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 135.771599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 135.778887] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c [ 135.786165] R10: fffffefffffffffe R11: 0000000000000246 R12: 00007fe49b6e56d4 [ 135.793441] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 135.801701] Kernel Offset: disabled [ 135.805337] Rebooting in 86400 seconds..