[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 32.690893] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.079347] random: sshd: uninitialized urandom read (32 bytes read) [ 37.490930] random: sshd: uninitialized urandom read (32 bytes read) [ 38.660930] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. [ 44.445014] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 20:58:24 fuzzer started [ 46.093310] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 20:58:27 dialing manager at 10.128.0.26:33143 2018/09/12 20:58:27 syscalls: 1 2018/09/12 20:58:27 code coverage: enabled 2018/09/12 20:58:27 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/12 20:58:27 setuid sandbox: enabled 2018/09/12 20:58:27 namespace sandbox: enabled 2018/09/12 20:58:27 fault injection: enabled 2018/09/12 20:58:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 20:58:27 net packed injection: enabled 2018/09/12 20:58:27 net device setup: enabled [ 50.737123] random: crng init done 20:59:26 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 20:59:26 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 20:59:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x210007f7, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'lo\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='K']}) 20:59:26 executing program 0: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 20:59:26 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:26 executing program 4: clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) gettid() ptrace$setopts(0x4206, 0x0, 0xffff, 0x0) r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fsetxattr(r0, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='\x00', 0x1, 0x0) [ 106.995754] IPVS: ftp: loaded support on port[0] = 21 [ 107.012994] IPVS: ftp: loaded support on port[0] = 21 [ 107.058042] IPVS: ftp: loaded support on port[0] = 21 [ 107.076978] IPVS: ftp: loaded support on port[0] = 21 [ 107.115875] IPVS: ftp: loaded support on port[0] = 21 [ 107.140214] IPVS: ftp: loaded support on port[0] = 21 [ 108.912207] ip (4385) used greatest stack depth: 53752 bytes left [ 110.080905] ip (4455) used greatest stack depth: 53496 bytes left [ 110.543582] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.550132] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.592368] device bridge_slave_0 entered promiscuous mode [ 110.708548] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.715128] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.745799] device bridge_slave_0 entered promiscuous mode [ 110.788190] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.794765] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.843827] device bridge_slave_1 entered promiscuous mode [ 110.864228] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.870748] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.908319] device bridge_slave_0 entered promiscuous mode [ 110.949544] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.956055] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.983285] device bridge_slave_0 entered promiscuous mode [ 111.004295] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.010788] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.042886] device bridge_slave_1 entered promiscuous mode [ 111.057827] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.064327] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.083214] device bridge_slave_0 entered promiscuous mode [ 111.098102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.115455] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.121923] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.143862] device bridge_slave_1 entered promiscuous mode [ 111.161548] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.168006] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.199076] device bridge_slave_1 entered promiscuous mode [ 111.223656] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.230157] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.259850] device bridge_slave_0 entered promiscuous mode [ 111.283258] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.289810] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.319574] device bridge_slave_1 entered promiscuous mode [ 111.342743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.361041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.369605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.388036] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.394534] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.429818] device bridge_slave_1 entered promiscuous mode [ 111.457373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.574243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.581877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.600039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.642195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.695596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.811158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.886298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.135335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.296537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.316020] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.332309] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.345385] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.528044] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.548780] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.560500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.587977] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.609256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.617637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.631302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.743866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.799556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.816322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.823619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.865226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.872238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.894193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.902271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.909294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.942534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.999523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.006572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.048988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.056067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.103143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.110201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.143509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.150574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.165349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.172379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.238335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.245361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.296578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.303647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.536322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.553197] team0: Port device team_slave_0 added [ 113.773295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.793322] team0: Port device team_slave_1 added [ 113.838477] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.862119] team0: Port device team_slave_0 added [ 113.896040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.921891] team0: Port device team_slave_0 added [ 113.928331] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.950115] team0: Port device team_slave_0 added [ 113.978565] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.002544] team0: Port device team_slave_0 added [ 114.034789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.043740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.057210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.088108] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.106097] team0: Port device team_slave_0 added [ 114.128937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.136971] team0: Port device team_slave_1 added [ 114.156316] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.178953] team0: Port device team_slave_1 added [ 114.195223] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.213080] team0: Port device team_slave_1 added [ 114.225748] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.253199] team0: Port device team_slave_1 added [ 114.296238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.310889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.327482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.383805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.390883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.404395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.421907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.431645] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.465309] team0: Port device team_slave_1 added [ 114.488972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.501838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.533116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.541150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.548885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.571133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.593268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.608379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.658178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.665621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.673215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.692609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.701413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.718618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.736778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.747332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.755503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.767886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.800153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.824313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.852446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.873512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.890486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.901617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.909459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.918887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.939618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.949678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.966800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.979915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.988284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.997544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 115.031574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.047289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.073278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.103916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.111813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.127108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.160516] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.168380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.191195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.211112] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.224052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.237273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.250305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.268139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.288634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.329558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.345216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.354798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.372633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.391400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.421246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.451911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.459645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.468492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.521078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.528908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.545267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.597203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 115.604843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.622526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.664812] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.671302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.678183] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.684623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.703539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.712853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 117.777878] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.784375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.791255] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.797743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.868521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.953762] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.960282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.967176] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.973643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.030195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 118.080064] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.086601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.093511] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.099987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.127935] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 118.148054] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.154574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.161497] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.168004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.179128] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 118.186613] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.193114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.200040] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.206521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.255193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 118.739061] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.757206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.775953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.798217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.814912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.150303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.183319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.259013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.562890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.669073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.686774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.964440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.011740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.151093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.397217] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.548980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.584281] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 128.820475] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 128.826953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.839774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.876484] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 128.885819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.915082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.149396] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 129.155831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.168074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.345623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 129.351921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.363331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.444583] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 129.450860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.469780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.595792] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 129.602081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.614115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.682028] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.781334] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.069389] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.249673] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.326194] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.417896] 8021q: adding VLAN 0 to HW filter on device team0 20:59:55 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 20:59:55 executing program 0: 20:59:55 executing program 3: 20:59:55 executing program 0: 20:59:55 executing program 4: 20:59:55 executing program 3: [ 135.880099] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.887075] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.987028] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.993544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.000471] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.006938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.013885] device bridge0 entered promiscuous mode [ 136.086452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 136.111132] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.117859] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.147121] device bridge0 left promiscuous mode [ 136.169437] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.175964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.182906] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.189476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.196383] device bridge0 entered promiscuous mode [ 136.225610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 20:59:56 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 20:59:56 executing program 0: 20:59:56 executing program 4: 20:59:56 executing program 3: 20:59:56 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:56 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) [ 136.936928] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.943618] bridge0: port 1(bridge_slave_0) entered disabled state 20:59:57 executing program 3: 20:59:57 executing program 0: [ 136.994249] device bridge0 left promiscuous mode 20:59:57 executing program 4: [ 137.071786] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.078349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.085251] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.091818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.098781] device bridge0 entered promiscuous mode 20:59:57 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:57 executing program 3: [ 137.215351] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 20:59:57 executing program 0: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)}]) 20:59:57 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 20:59:57 executing program 4: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x20000) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 20:59:57 executing program 3: 20:59:57 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 20:59:57 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:57 executing program 0: [ 137.839210] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.845926] bridge0: port 1(bridge_slave_0) entered disabled state 20:59:57 executing program 3: [ 137.909789] device bridge0 left promiscuous mode 20:59:58 executing program 0: [ 137.932167] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.938632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.945517] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.951987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.958994] device bridge0 entered promiscuous mode 20:59:58 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0x238) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x40000001043, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x901, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x0, {0x1}}, 0x14) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) [ 138.048470] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 138.071057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:59:58 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 20:59:58 executing program 1: r0 = socket(0x0, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) [ 138.320449] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.327164] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.377826] device bridge0 left promiscuous mode [ 138.394893] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.401404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.408271] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.414765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.421593] device bridge0 entered promiscuous mode 20:59:58 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 20:59:58 executing program 0: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 20:59:58 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) 20:59:58 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) prctl$intptr(0x27, 0x1fc) 20:59:58 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 138.739680] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.746399] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.774194] device bridge0 left promiscuous mode 20:59:58 executing program 1: socket(0x10, 0x10000000003, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="240000001a0025f00018000400edfc0e80390f00000000000000000008000f0003000000", 0x24) 20:59:58 executing program 0: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 20:59:58 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 20:59:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) r1 = accept4(r0, 0x0, &(0x7f00000000c0)=0x2e4, 0x0) sendto$unix(r1, &(0x7f0000000600), 0x26fa00, 0x0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) 20:59:59 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='F', 0x1, 0xffffffffffffffff) 20:59:59 executing program 0: rt_sigpending(&(0x7f0000000680), 0x1) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)="766d6e657431707070312b2ef66d6e65743000", 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000380)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) getpeername(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000180)=0x80) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 20:59:59 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 20:59:59 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 20:59:59 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='F', 0x1, 0xffffffffffffffff) 20:59:59 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 20:59:59 executing program 0: 20:59:59 executing program 3: 20:59:59 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='F', 0x1, 0xffffffffffffffff) 20:59:59 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 20:59:59 executing program 3: 20:59:59 executing program 0: 20:59:59 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 20:59:59 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)='F', 0x1, 0xffffffffffffffff) 20:59:59 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 20:59:59 executing program 4: 20:59:59 executing program 3: 21:00:00 executing program 0: 21:00:00 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) 21:00:00 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:00 executing program 3: 21:00:00 executing program 0: 21:00:00 executing program 4: 21:00:00 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) 21:00:00 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 21:00:00 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e8039", 0x12) 21:00:00 executing program 3: 21:00:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200), 0xfffffffffffffe28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) 21:00:00 executing program 4: clone(0x40000020002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) close(r0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000c80)) dup2(r0, r0) 21:00:00 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) 21:00:00 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e8039", 0x12) 21:00:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e106558", &(0x7f0000000140)=""/41, 0x69}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)="2e2f6372006f6f000000787189b173656aab000000000000", 0x1ff) 21:00:00 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgroups(0x0, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000fc0)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getgroups(0x0, &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001200)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getgroups(0x0, &(0x7f00000013c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) gettid() fstat(0xffffffffffffffff, &(0x7f00000036c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740), &(0x7f0000003780)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003900), 0x0, 0x0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000240), 0x4) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000200)=0xc) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 21:00:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x3}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0xf0fffffffffffe}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 21:00:00 executing program 0: 21:00:00 executing program 1: r0 = socket(0x10, 0x10000000003, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000400edfc0e8039", 0x12) 21:00:00 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000002bc0)={'syzkaller0\x00', {0x2, 0x0, @multicast1}}) [ 140.951197] device ip6gre0 entered promiscuous mode [ 140.987588] ================================================================== [ 140.995034] BUG: KMSAN: uninit-value in memcmp+0x11d/0x180 [ 141.000682] CPU: 0 PID: 6107 Comm: syz-executor4 Not tainted 4.19.0-rc3+ #45 [ 141.007881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.017243] Call Trace: [ 141.019854] dump_stack+0x14b/0x190 [ 141.023514] kmsan_report+0x183/0x2b0 [ 141.027345] __msan_warning+0x70/0xc0 [ 141.031179] memcmp+0x11d/0x180 [ 141.034494] dev_uc_add_excl+0x165/0x7b0 [ 141.038596] rtnl_fdb_add+0x1081/0x1270 [ 141.042632] ? rtnl_dump_all+0x540/0x540 [ 141.046721] rtnetlink_rcv_msg+0xa0b/0x1530 [ 141.051088] ? ___sys_sendmsg+0xe70/0x1290 [ 141.055364] ? __alloc_skb+0x201/0x9e0 [ 141.059282] ? netlink_sendmsg+0xb49/0x1290 [ 141.063635] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.068508] ? __msan_poison_alloca+0x173/0x1f0 [ 141.073200] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.078081] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.082962] ? kmsan_set_origin+0x93/0x150 [ 141.087231] netlink_rcv_skb+0x36e/0x5f0 [ 141.091326] ? rtnetlink_bind+0x120/0x120 [ 141.095507] rtnetlink_rcv+0x50/0x60 [ 141.099246] netlink_unicast+0x1638/0x1720 [ 141.103521] ? rtnetlink_net_exit+0x90/0x90 [ 141.107886] netlink_sendmsg+0x1205/0x1290 [ 141.112181] ___sys_sendmsg+0xe70/0x1290 [ 141.116279] ? netlink_getsockopt+0x11c0/0x11c0 [ 141.120988] ? __fget_light+0x53/0x700 [ 141.124892] ? __fdget+0x4e/0x60 [ 141.128283] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 141.133665] ? __fget_light+0x6a3/0x700 [ 141.137694] __se_sys_sendmsg+0x2a3/0x3d0 [ 141.141895] __x64_sys_sendmsg+0x4a/0x70 [ 141.145977] do_syscall_64+0xb8/0x100 [ 141.149801] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 141.155005] RIP: 0033:0x4572d9 [ 141.158214] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.177128] RSP: 002b:00007f08b1f51c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.184867] RAX: ffffffffffffffda RBX: 00007f08b1f526d4 RCX: 00000000004572d9 [ 141.192157] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 141.199453] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 141.206743] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 141.214029] R13: 00000000004d4f70 R14: 00000000004c9446 R15: 0000000000000001 [ 141.221322] [ 141.222955] Uninit was created at: [ 141.226522] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 141.231648] kmsan_kmalloc+0x98/0x100 [ 141.235470] kmsan_slab_alloc+0x10/0x20 [ 141.239474] __kmalloc_node_track_caller+0x9e7/0x1160 [ 141.244690] __alloc_skb+0x2f5/0x9e0 [ 141.248432] netlink_sendmsg+0xb49/0x1290 [ 141.252593] ___sys_sendmsg+0xe70/0x1290 [ 141.256663] __se_sys_sendmsg+0x2a3/0x3d0 [ 141.260829] __x64_sys_sendmsg+0x4a/0x70 [ 141.264896] do_syscall_64+0xb8/0x100 [ 141.268711] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 141.273905] ================================================================== [ 141.281265] Disabling lock debugging due to kernel taint [ 141.286717] Kernel panic - not syncing: panic_on_warn set ... [ 141.286717] [ 141.294098] CPU: 0 PID: 6107 Comm: syz-executor4 Tainted: G B 4.19.0-rc3+ #45 [ 141.302705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.312066] Call Trace: [ 141.314668] dump_stack+0x14b/0x190 [ 141.318319] panic+0x35d/0x8cb [ 141.321557] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 141.327024] kmsan_report+0x2a8/0x2b0 [ 141.330841] __msan_warning+0x70/0xc0 [ 141.334659] memcmp+0x11d/0x180 [ 141.337960] dev_uc_add_excl+0x165/0x7b0 [ 141.342249] rtnl_fdb_add+0x1081/0x1270 [ 141.346266] ? rtnl_dump_all+0x540/0x540 [ 141.350333] rtnetlink_rcv_msg+0xa0b/0x1530 [ 141.354678] ? ___sys_sendmsg+0xe70/0x1290 [ 141.358929] ? __alloc_skb+0x201/0x9e0 [ 141.362826] ? netlink_sendmsg+0xb49/0x1290 [ 141.367168] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.372022] ? __msan_poison_alloca+0x173/0x1f0 [ 141.376700] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.381569] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.386436] ? kmsan_set_origin+0x93/0x150 [ 141.390693] netlink_rcv_skb+0x36e/0x5f0 [ 141.394778] ? rtnetlink_bind+0x120/0x120 [ 141.398946] rtnetlink_rcv+0x50/0x60 [ 141.402673] netlink_unicast+0x1638/0x1720 [ 141.406936] ? rtnetlink_net_exit+0x90/0x90 [ 141.411286] netlink_sendmsg+0x1205/0x1290 [ 141.415561] ___sys_sendmsg+0xe70/0x1290 [ 141.419647] ? netlink_getsockopt+0x11c0/0x11c0 [ 141.424339] ? __fget_light+0x53/0x700 [ 141.428235] ? __fdget+0x4e/0x60 [ 141.431614] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 141.436990] ? __fget_light+0x6a3/0x700 [ 141.441002] __se_sys_sendmsg+0x2a3/0x3d0 [ 141.445191] __x64_sys_sendmsg+0x4a/0x70 [ 141.449319] do_syscall_64+0xb8/0x100 [ 141.453146] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 141.458341] RIP: 0033:0x4572d9 [ 141.461540] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.480663] RSP: 002b:00007f08b1f51c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.488389] RAX: ffffffffffffffda RBX: 00007f08b1f526d4 RCX: 00000000004572d9 [ 141.495667] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 141.502946] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 141.510219] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 141.517495] R13: 00000000004d4f70 R14: 00000000004c9446 R15: 0000000000000001 [ 141.525115] Kernel Offset: disabled [ 141.528754] Rebooting in 86400 seconds..