[ 58.619020] audit: type=1800 audit(1539795398.661:25): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.638268] audit: type=1800 audit(1539795398.661:26): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.657925] audit: type=1800 audit(1539795398.691:27): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.703343] startpar (6067) used greatest stack depth: 53280 bytes left Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.70' (ECDSA) to the list of known hosts. 2018/10/17 16:56:53 fuzzer started 2018/10/17 16:56:57 dialing manager at 10.128.0.26:41589 2018/10/17 16:56:58 syscalls: 1 2018/10/17 16:56:58 code coverage: enabled 2018/10/17 16:56:58 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/17 16:56:58 setuid sandbox: enabled 2018/10/17 16:56:58 namespace sandbox: enabled 2018/10/17 16:56:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/17 16:56:58 fault injection: enabled 2018/10/17 16:56:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/17 16:56:58 net packed injection: enabled 2018/10/17 16:56:58 net device setup: enabled 16:59:33 executing program 0: syzkaller login: [ 234.096551] IPVS: ftp: loaded support on port[0] = 21 [ 236.576157] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.583033] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.592011] device bridge_slave_0 entered promiscuous mode [ 236.742756] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.749234] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.757952] device bridge_slave_1 entered promiscuous mode [ 236.901410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.049593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 16:59:37 executing program 1: [ 237.538155] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.745886] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.122579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.129678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.370177] IPVS: ftp: loaded support on port[0] = 21 [ 238.986603] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.994965] team0: Port device team_slave_0 added [ 239.206042] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.214255] team0: Port device team_slave_1 added [ 239.441170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.448383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.457600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.741489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.748761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.757984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.985907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.993550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.002758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.243308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.250890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.260107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.034179] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.040675] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.049359] device bridge_slave_0 entered promiscuous mode [ 242.341533] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.348193] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.356789] device bridge_slave_1 entered promiscuous mode [ 242.666054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 242.729526] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.736110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.743174] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.749666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.758566] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.956462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 242.972310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:59:43 executing program 2: [ 243.610909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 243.851892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.092829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.099976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.425191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.432363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.753087] IPVS: ftp: loaded support on port[0] = 21 [ 245.321299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.329540] team0: Port device team_slave_0 added [ 245.613922] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.622243] team0: Port device team_slave_1 added [ 245.910092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.917327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.926249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.130200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.138121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.147119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.447245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 246.455043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.464261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.816114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.823865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.833135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.748409] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.755037] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.763704] device bridge_slave_0 entered promiscuous mode [ 249.954429] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.960914] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.969768] device bridge_slave_1 entered promiscuous mode [ 250.317227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.385955] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.392516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.399494] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.406120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.415797] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.672313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.212056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.383980] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.660226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.975966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.983130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.216196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.225081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 16:59:52 executing program 3: [ 253.349818] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.358159] team0: Port device team_slave_0 added [ 253.631460] IPVS: ftp: loaded support on port[0] = 21 [ 253.721136] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.729792] team0: Port device team_slave_1 added [ 254.072599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.079692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.088811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.445522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.452876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.461608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.812446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.820230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.829551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.182402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.189997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.199246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.425092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.872974] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.319180] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.325741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.333935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.456823] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.463416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.470335] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.476928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.486191] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 259.673166] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.850410] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.857444] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.866082] device bridge_slave_0 entered promiscuous mode [ 259.932698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.344733] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.351217] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.360091] device bridge_slave_1 entered promiscuous mode [ 260.705035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.020259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.136610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.567803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.883550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 262.890649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.269368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.278389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 17:00:03 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x6c00) [ 264.515173] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.523572] team0: Port device team_slave_0 added [ 264.916670] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.924977] team0: Port device team_slave_1 added [ 265.331239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.338502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.347647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.506090] IPVS: ftp: loaded support on port[0] = 21 [ 265.853486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.860558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.869756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.053893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.317904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.325617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.334866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.779201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.786936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.796203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.859875] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:00:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000080)) [ 269.642391] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 269.648771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.656856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.866233] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 17:00:10 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffffff0bffaaaaaa00000000000000002c328f9b7d570c739bbc420207d99ea7f3bf8be819965bd5b165661c58000000000000009078ac1414"], &(0x7f0000000000)) r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x24001) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001, 0x100000001}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x9, 0x1f, 0x80000000, 0xffffffff, 0x3f}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x4, 0x0, 0x8002, 0x3, 0x5, 0x8001, 0x0, 0x7fffffff, r2}, 0x20) finit_module(r0, &(0x7f0000000040)='\x00', 0x1) fsetxattr$security_evm(r0, &(0x7f0000000480)='security.evm\x00', &(0x7f00000004c0)=@v2={0x7, 0x3, 0xb, 0x47, 0x2b, "89ae459db21f8abce3d09ea12258e918ae0fbac889d851f48dd18afa051b9a38888d20ea995a7b2ff05e7c"}, 0x35, 0x1) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000140)={0xf3, 0x7f, 0x10000, 0x8}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x980, r1}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@loopback, @mcast1, @ipv4={[], [], @multicast1}, 0x0, 0x3f, 0x5, 0x0, 0x100000001, 0x4010000, r3}) 17:00:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000080)="48f0b47e99c38bcf012545a26b0a49e7d5304af17670296028de45a917451dbf55f99ed1bec6be8199faefd6283b0189e0dcbf55537b3c68fa683c60332cca97c2a5a97ca172", 0xfffffc94, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="00f520462101879e9f"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x7d}, [@ldst={0x2000cfad}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x48d, &(0x7f000000cf3d)=""/195}, 0x18) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x7d, &(0x7f0000000240), &(0x7f0000000280)=0x10) [ 271.276142] 8021q: adding VLAN 0 to HW filter on device team0 17:00:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030a2f0936dc9e39c1e303030303030303034303030342c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x179) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000700), 0x1000) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2}, 0x78) sendfile(r0, r0, &(0x7f0000000000), 0x1) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/92, 0x5c) [ 271.909546] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.916137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.923318] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.929784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.938392] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 17:00:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000400)='/dev/sg#\x00', 0xffffffffffffff7d, 0x2) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="854a103503cdaffe00f577ecebe5bdcec727248fd220b3"}, {&(0x7f0000000140)="938971f304db05e8858a4707ed6d191d1165a00bfac8996961a8ddfebdf71bae2937f6951df64cc0e246650365e16f33061b8ec58a31cecf3e89197da6ebb9ae779af4122df7ddc2ad3be73142da37888f251120ffc74c4fc1ac822b1176dda8919c59c023526ca3eef803319f33a3daa5e115f93f00dddadd0d91a555e3d5281cf648"}], 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340)=0x8, 0x4) rt_sigaction(0x18, &(0x7f00000000c0)={&(0x7f0000000040)="f343dd03f2a7c401fa6f8000000020c481f92ba3e8ea000047f78a09000000df000000c4819b5de60f6ae46736652e65f2abc4c3fd01c486", {0x2}, 0x10000000, &(0x7f0000000080)="41d9eec4e17d51092e42f78d0e000000b62aabd7c4c2bdbcb41596000000c4823d09d5c461b8c6e6e8c4a175e1960c000000c48178296ec745d9e9c4e1ddfc2a"}, &(0x7f00000002c0)={&(0x7f0000000240)="c4417d7061ac00c4e16df4b50a000000f3420faed60fa966660f381c2244f58fa978d720c4c221b88504000000de2d03000000490fc7a0b009832d", {}, 0x0, &(0x7f0000000280)="c4c1fe7f632d430f8483dfb36bc4c1b9ef23c1e045c4223d0acf0fe8912c53f6c6f30f5cc9dae8"}, 0x8, &(0x7f0000000300)) [ 272.662566] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.669062] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.677904] device bridge_slave_0 entered promiscuous mode [ 272.732545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:00:12 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x3) close(r0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r3, 0x0) shutdown(r3, 0x1) poll(&(0x7f0000000040)=[{r3}], 0x20000000000000e6, 0x0) write$UHID_CREATE(r2, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)={0x1}) [ 273.102981] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.109813] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.116816] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.123703] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.130484] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.137484] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.144365] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.151153] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.158092] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.164968] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.171893] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 273.259703] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.266344] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.275024] device bridge_slave_1 entered promiscuous mode [ 273.372511] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 273.423611] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.430451] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.437495] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.444363] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.451140] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.457998] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.464872] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.471657] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.478538] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.485474] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.492329] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 273.702368] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 273.875188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:00:14 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xfffffffffffffffd) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0x1, 0x15a) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x25) bind$pptp(r1, &(0x7f00000001c0)={0x18, 0x2, {0x20000000000003, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x1e) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000001ec0)=[{{&(0x7f0000001740), 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/168, 0xa8}}], 0x1, 0x10000, &(0x7f0000001f80)={0x0, 0x989680}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0xffffffffffffff44) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000200)) r2 = getpgid(0x0) rmdir(&(0x7f00000002c0)='./file0\x00') ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) r3 = semget$private(0x0, 0x1, 0x140) semctl$GETZCNT(r3, 0x1, 0xf, &(0x7f0000000300)=""/110) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x1f, @mcast2, 0x2}, 0x1c) [ 274.290778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 17:00:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x24) pipe(&(0x7f0000000000)) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) [ 275.524285] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.853869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 276.259080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 276.266295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.649294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.656633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.212343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.732838] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 277.741042] team0: Port device team_slave_0 added [ 277.956960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 277.965401] team0: Port device team_slave_1 added [ 278.278854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 278.286092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.294999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.361560] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 278.632402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 278.639911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.648780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.991524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.999478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.008657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.220208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 279.227988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.237094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.592525] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 279.598901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.606829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:00:20 executing program 1: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000180), 0xce17, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0x10, &(0x7f0000000340)={&(0x7f00000001c0)=""/63, 0x3f}}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 280.836159] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.354509] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.361028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.368112] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.374687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.383166] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 282.389821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.047738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.896130] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:00:26 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4), 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x17, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) [ 286.668231] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 286.674739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.682752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.229423] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.883818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.442194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:00:30 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c80)=""/27, 0x1b}], 0x1, &(0x7f0000002000)=""/112, 0x70}}], 0x1, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f00000017c0), 0x189, 0x0) [ 290.993528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.999788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.007919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.308142] 8021q: adding VLAN 0 to HW filter on device team0 17:00:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd255766070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000ff1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 17:00:33 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r1, r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f00000000c0)=0x101) ioctl$TIOCCBRK(r3, 0x5428) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0xffffffff, 0x8, 0x1, 0x7}) migrate_pages(r2, 0x100000000, &(0x7f0000000140)=0x7, &(0x7f0000000180)=0xcfb) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f00000001c0)) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000200)) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000240)=0x400, 0x4) r5 = fanotify_init(0x2, 0x1) flistxattr(r5, &(0x7f0000000280)=""/104, 0x68) r6 = syz_open_procfs(r2, &(0x7f0000000300)='net/stat\x00') getsockopt$inet_opts(r3, 0x0, 0x9, &(0x7f0000000340)=""/116, &(0x7f00000003c0)=0x74) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0x56, @mcast2}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000500)={r7, 0x2}, &(0x7f0000000540)=0xc) rename(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000600)=r2) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000000640)="5f6f7080fadf0a707531ed94ccec8fa49cd3f03f2145e8f3af2cd91f17dd7209e896a7d73ca1ba8e9b0981d62d036fb60274ac5d4f0bb419b5c31e4a40b561bdf66f16f856a447735263a4011e679d4c3d3be3eb5fb6996b555b601a38385206c33d0bbd7e02db71746645cf3d358a3b5d61be913a8cba30a3ec739c881522048fe845986da19a51f26d53f9048307f703f542d1923d31101688b81d481687b46be1e02435fe353c04d8d23a053237f204ef7c370e9548a4db79416da00f630133191658f9c703e0a593a8979733362cb1acd93255d82531726540183c72c82432728399d6aeec77") process_vm_readv(r2, &(0x7f0000000880)=[{&(0x7f0000000740)=""/59, 0x3b}, {&(0x7f0000000780)=""/215, 0xd7}], 0x2, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/101, 0x65}, {&(0x7f0000000940)=""/223, 0xdf}, {&(0x7f0000000a40)=""/160, 0xa0}, {&(0x7f0000000b00)=""/251, 0xfb}, {&(0x7f0000000c00)=""/176, 0xb0}], 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000000d80)=@req={0x28, &(0x7f0000000d40)={'nr0\x00', @ifru_ivalue=0x9}}) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/vcs\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000e00)={r8, 0x27}, 0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000e40), &(0x7f0000000e80)=0x4) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000ec0)={0xffffffff, 0x100000001, 0xdde1, 0x1, 0x4, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x80000000, 0x79d5, 0x6}) r10 = request_key(&(0x7f0000000f00)='.dead\x00', &(0x7f0000000f40)={'syz', 0x3}, &(0x7f0000000f80)='\x00', 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r10, 0x40) 17:00:33 executing program 0: unshare(0x2000400) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80, 0x10000) getsockname$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb5, 0x0) ioctl$int_in(r1, 0x800000c0045001, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 17:00:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000340)={0x0, 0x0, 0x1, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "f6ef70c4719f5767847629eb45f283d7"}) poll(&(0x7f0000000100)=[{r1, 0x40012}], 0x1, 0xff) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000e00000020b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 17:00:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r0, 0x0) dup2(r1, r2) 17:00:33 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) 17:00:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x401, &(0x7f0000001f80)=[{&(0x7f0000001c80)=""/27, 0x1b}], 0x1, &(0x7f0000002000)=""/112, 0x70}}], 0x1, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x189, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) [ 293.581456] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:00:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, &(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x1}) 17:00:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) getpgrp(0xffffffffffffffff) sendmsg$unix(r1, &(0x7f00000018c0)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001540), 0x0, &(0x7f0000001840)=[@cred={0x18, 0x1, 0x2, r2}], 0x18}, 0x0) 17:00:34 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000000000281) sendfile(r0, r0, &(0x7f0000000140), 0x8800000) 17:00:34 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond_slave_0\x00'}, 0xfffffffffffffebd) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) 17:00:34 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0xfc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x803, 0x8) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000740)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 17:00:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r0, &(0x7f0000000300)="040300000100000000000000c52cf7c21975e697b02f5c566b2b2ff0dac8897c6b11876d886b6621d8d207ccf73f257e55e86eb29406136fcfff0500000000000000c7a6", 0x44, 0x0, &(0x7f0000000000)={0xa, 0x800, 0x6, @dev}, 0x1c) [ 294.818020] IPVS: ftp: loaded support on port[0] = 21 [ 296.171214] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.177798] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.186273] device bridge_slave_0 entered promiscuous mode [ 296.269945] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.276445] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.284557] device bridge_slave_1 entered promiscuous mode [ 296.362264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.440953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.677937] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.762369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 296.845589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 296.852719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 296.936293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 296.943414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.188445] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 297.196070] team0: Port device team_slave_0 added [ 297.276671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 297.284310] team0: Port device team_slave_1 added [ 297.364135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.449008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.529688] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 297.537878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.547176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.622192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 297.629497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.638723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.941200] ip (7698) used greatest stack depth: 53264 bytes left [ 298.541048] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.547590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.554643] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.561089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.569455] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 298.842357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 301.891052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.193652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 302.499333] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 302.505671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.513979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.822856] 8021q: adding VLAN 0 to HW filter on device team0 17:00:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0x8010aebc) 17:00:44 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000001580), 0x1000) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000001540)) read$FUSE(r0, &(0x7f0000000380), 0x1000) 17:00:44 executing program 3: pause() openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)={0x0, 0x8001}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) read(r0, &(0x7f0000000380)=""/172, 0xffffff88) setpriority(0x1, 0x0, 0x101) 17:00:44 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x401, &(0x7f0000001f80)=[{&(0x7f0000001c80)=""/27, 0x1b}], 0x1, &(0x7f0000002000)=""/112, 0x70}}], 0x1, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x189, 0x0) 17:00:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x21, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) 17:00:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f7, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) [ 305.024632] hrtimer: interrupt took 55622 ns [ 305.102067] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:00:45 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\nmd5sumbdev\\eth1\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000001700)=ANY=[@ANYBLOB='\v'], 0x1) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x1, 0x0) 17:00:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x5e) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(cryptd(cmac(blowfish-generic)),cbc-serpent-avx2)\x00'}, 0x58) close(r1) 17:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="86162100070000fddd4e090000000000002cef626a", 0x15) 17:00:46 executing program 4: mknod$loop(&(0x7f0000000640)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f00000000c0)='./file0\x00', 0x2) creat(&(0x7f0000000400)='./file0\x00', 0x0) 17:00:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0x4038ae7a) 17:00:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000040)=0x7) 17:00:46 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x401, &(0x7f0000001f80)=[{&(0x7f0000001c80)=""/27, 0x1b}], 0x1, &(0x7f0000002000)=""/112, 0x70}}], 0x1, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x189, 0x0) 17:00:46 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @rand_addr}, 0xc) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) nanosleep(&(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0xfb, 0x0, &(0x7f0000000140), 0x100000000000007f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f00000000c0)=0x6}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000016000/0x1000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x7ffd}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:00:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, &(0x7f0000000340)=""/197, 0xff18) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r0, 0x0) dup2(r3, r1) 17:00:47 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) fallocate(r0, 0x0, 0x0, 0x6) 17:00:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=@ethtool_cmd={0x12, 0x0, 0x707000, 0x0, 0x0, 0x0, 0x2}}) 17:00:47 executing program 1: io_submit(0x0, 0x0, &(0x7f0000000780)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000007c0)={{0x5}, {0x7c}}) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x1, &(0x7f00000003c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x8000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) close(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr}}, [0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100]}, &(0x7f0000000080)=0x100) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000440)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000200)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) 17:00:47 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = socket(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$unix(r0, &(0x7f0000004300)=[{&(0x7f0000000180)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000200)="10d96d", 0x3}], 0x1, &(0x7f0000000c80)}], 0x1, 0x8000) sendmmsg$alg(r0, &(0x7f00000092c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="fe74", 0x2}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) 17:00:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) dup3(r0, r1, 0x0) 17:00:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="580000001300add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f6400940005002825fda48c00000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) [ 308.028326] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! 17:00:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c80)=""/27, 0x1b}], 0x1, &(0x7f0000002000)=""/112, 0x70}}], 0x1, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') preadv(r0, &(0x7f00000017c0), 0x189, 0x0) 17:00:48 executing program 3: io_submit(0x0, 0x0, &(0x7f0000000780)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000007c0)={{}, {0x7c}}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r0, 0x0, 0x1, &(0x7f00000003c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x8000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr}}, [0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0xf15, 0x0, 0x100]}, &(0x7f0000000080)=0x100) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) io_destroy(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000440)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) 17:00:48 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x5, 0x0, r0}, 0x2c) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000240)=""/221) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000100), &(0x7f0000000080)}, 0x20) 17:00:48 executing program 5: io_submit(0x0, 0x0, &(0x7f0000000780)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000007c0)={{}, {0x7c}}) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x1, &(0x7f00000003c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x8000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr}}, [0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0xf15, 0x0, 0x100]}, &(0x7f0000000080)=0x100) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)) ioctl$TIOCNXCL(r0, 0x540d) io_destroy(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) 17:00:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8) 17:00:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2b, 'pids'}]}, 0x6) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x1ff) 17:00:49 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x0, &(0x7f0000000240)) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000025c0)=""/4096, 0x1000) 17:00:49 executing program 2: mkdir(&(0x7f00000013c0)='./file0/\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x31}, 0x2c) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)="70726f63009b6a2c823f92ab1d5b2f50155c21b4ddadd9060079216becc16f47afb3aec6b4d757eac0a6344afd1ce9d561075c31c4142aa5bf61c3ae458640c0ec61baa4c00d684cd95e0be68153c4adca5e45190c3a26a50c41d793a4a983e9", 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/', 0x0) mount(&(0x7f0000000240), &(0x7f0000000000)='.', &(0x7f0000000040)='proc\x00', 0x0, 0x0) 17:00:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = syz_open_pts(r0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r1, r2) 17:00:49 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 17:00:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{r0, 0x40012}], 0x1, 0xff) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5603067fffffff81004e220000e00000020b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 17:00:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6, @in6=@dev}, {@in6=@remote}, @in6=@ipv4={[], [], @broadcast}}}, [@mark={0xc}]}, 0x104}, 0x8}, 0x0) 17:00:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x80001}) [ 310.213259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 310.282084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 17:00:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000cd8ff4)) 17:00:50 executing program 0: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r1, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000ac0)=""/4096, 0x20001ac0}], 0x1, 0x0) 17:00:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6, @in6=@dev}, {@in6=@remote}, @in6=@ipv4={[], [], @broadcast}}}, [@mark={0xc}]}, 0x104}, 0x8}, 0x0) 17:00:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{r0, 0x40012}], 0x1, 0xff) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5603067fffffff81004e220000e00000020b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 17:00:51 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xc000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80206433, &(0x7f0000000180)=""/198) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) ioctl$RTC_PIE_ON(r0, 0x7005) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x84) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) listen(r0, 0x3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x2000000096010000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x25d) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xd25e01000001e04a]}, @empty, @loopback, 0x3}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000740)=ANY=[], &(0x7f00000002c0)) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000400)={@rand_addr, @rand_addr}, &(0x7f0000000440)=0xc) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @rand_addr=0x1f}, {0x2, 0x4e24, @local}, {0x2, 0x0, @local}, 0x24, 0x5900000, 0x0, 0x0, 0x1, 0x0, 0x4, 0x7, 0x1}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0), 0x4) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000580)={0x7b, 0x0, [0x7]}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r3, r4) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000040)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000080)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$inet(0x10, 0x3, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000080)={0x7, 0x5}) 17:00:51 executing program 4: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xb6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)) 17:00:51 executing program 0: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0x63], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 17:00:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000240)={0x21}, 0x21) [ 312.024957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 17:00:52 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000480)={{0xffffffffffffffff}}) 17:00:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{r0, 0x40012}], 0x1, 0xff) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5603067fffffff81004e220000e00000020b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 17:00:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/rt6_stats\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x7, 0x1) 17:00:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6, @in6=@dev}, {@in6=@remote}, @in6=@ipv4={[], [], @broadcast}}}, [@mark={0xc}]}, 0x104}, 0x8}, 0x0) 17:00:52 executing program 4: r0 = gettid() sched_getaffinity(r0, 0x8, &(0x7f0000000040)) 17:00:52 executing program 0: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xb6, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) [ 313.165643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 17:00:53 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) 17:00:53 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) 17:00:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r0, r2}) 17:00:53 executing program 4: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) 17:00:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6, @in6=@dev}, {@in6=@remote}, @in6=@ipv4={[], [], @broadcast}}}, [@mark={0xc}]}, 0x104}, 0x8}, 0x0) 17:00:53 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x8}, 0x80, &(0x7f00000001c0)}, 0x0) 17:00:53 executing program 0: [ 313.783342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 313.890422] ================================================================== [ 313.897881] BUG: KMSAN: uninit-value in sit_tunnel_xmit+0x1b14/0x3d10 [ 313.904496] CPU: 1 PID: 8141 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #69 [ 313.911705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.921083] Call Trace: [ 313.923708] dump_stack+0x306/0x460 [ 313.927365] ? _raw_spin_lock_irqsave+0x227/0x340 [ 313.932258] ? sit_tunnel_xmit+0x1b14/0x3d10 [ 313.936708] kmsan_report+0x1a2/0x2e0 [ 313.940542] __msan_warning+0x7c/0xe0 [ 313.944378] sit_tunnel_xmit+0x1b14/0x3d10 [ 313.948693] ? ipip6_tunnel_uninit+0x7e0/0x7e0 [ 313.953311] dev_hard_start_xmit+0x6b8/0xdb0 [ 313.957781] __dev_queue_xmit+0x2e62/0x3d90 [ 313.962167] dev_queue_xmit+0x4b/0x60 [ 313.965988] ? __netdev_pick_tx+0x1490/0x1490 [ 313.970507] packet_sendmsg+0x853e/0x9170 [ 313.974768] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 313.980151] ? aa_sk_perm+0x739/0x960 [ 313.984033] ___sys_sendmsg+0xe47/0x1200 [ 313.988128] ? compat_packet_setsockopt+0x360/0x360 [ 313.993177] ? __fget+0x8f7/0x940 [ 313.996704] __se_sys_sendmsg+0x307/0x460 [ 314.000904] __x64_sys_sendmsg+0x4a/0x70 [ 314.004991] do_syscall_64+0xbe/0x100 [ 314.008841] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.014059] RIP: 0033:0x457569 [ 314.017276] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.036196] RSP: 002b:00007f552e0bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 314.043926] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 314.051210] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 314.058494] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.065796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f552e0bf6d4 [ 314.073082] R13: 00000000004c3823 R14: 00000000004d5640 R15: 00000000ffffffff [ 314.080388] [ 314.082025] Uninit was created at: [ 314.085595] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 314.090739] kmsan_kmalloc+0xa4/0x120 [ 314.094557] kmsan_slab_alloc+0x10/0x20 [ 314.098555] __kmalloc_node_track_caller+0xb43/0x1400 [ 314.103764] __alloc_skb+0x422/0xe90 [ 314.107496] alloc_skb_with_frags+0x1d0/0xac0 [ 314.112005] sock_alloc_send_pskb+0xe00/0x1420 [ 314.116642] packet_sendmsg+0x6874/0x9170 [ 314.120822] ___sys_sendmsg+0xe47/0x1200 [ 314.124913] __se_sys_sendmsg+0x307/0x460 [ 314.129080] __x64_sys_sendmsg+0x4a/0x70 [ 314.133159] do_syscall_64+0xbe/0x100 [ 314.136981] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.142173] ================================================================== [ 314.149539] Disabling lock debugging due to kernel taint [ 314.154999] Kernel panic - not syncing: panic_on_warn set ... [ 314.154999] [ 314.162405] CPU: 1 PID: 8141 Comm: syz-executor1 Tainted: G B 4.19.0-rc7+ #69 [ 314.170993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.180358] Call Trace: [ 314.183015] dump_stack+0x306/0x460 [ 314.186686] panic+0x54c/0xafa [ 314.189953] kmsan_report+0x2d3/0x2e0 [ 314.193787] __msan_warning+0x7c/0xe0 [ 314.197628] sit_tunnel_xmit+0x1b14/0x3d10 [ 314.201952] ? ipip6_tunnel_uninit+0x7e0/0x7e0 [ 314.206559] dev_hard_start_xmit+0x6b8/0xdb0 [ 314.211023] __dev_queue_xmit+0x2e62/0x3d90 [ 314.215418] dev_queue_xmit+0x4b/0x60 [ 314.219239] ? __netdev_pick_tx+0x1490/0x1490 [ 314.223763] packet_sendmsg+0x853e/0x9170 [ 314.227973] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.233359] ? aa_sk_perm+0x739/0x960 [ 314.237247] ___sys_sendmsg+0xe47/0x1200 [ 314.241337] ? compat_packet_setsockopt+0x360/0x360 [ 314.246388] ? __fget+0x8f7/0x940 [ 314.249917] __se_sys_sendmsg+0x307/0x460 [ 314.254116] __x64_sys_sendmsg+0x4a/0x70 [ 314.258199] do_syscall_64+0xbe/0x100 [ 314.262026] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.267230] RIP: 0033:0x457569 [ 314.270445] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.289368] RSP: 002b:00007f552e0bec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 314.297104] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 314.304390] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 314.311676] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.318963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f552e0bf6d4 [ 314.326253] R13: 00000000004c3823 R14: 00000000004d5640 R15: 00000000ffffffff [ 314.334474] Kernel Offset: disabled [ 314.338114] Rebooting in 86400 seconds..