[ 50.085112] audit: type=1800 audit(1545328769.129:26): pid=6289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.579766] kauditd_printk_skb: 2 callbacks suppressed [ 51.579793] audit: type=1800 audit(1545328770.629:29): pid=6289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 51.605518] audit: type=1800 audit(1545328770.639:30): pid=6289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2018/12/20 17:59:43 fuzzer started 2018/12/20 17:59:47 dialing manager at 10.128.0.26:46613 2018/12/20 17:59:48 syscalls: 1 2018/12/20 17:59:48 code coverage: enabled 2018/12/20 17:59:48 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 17:59:48 setuid sandbox: enabled 2018/12/20 17:59:48 namespace sandbox: enabled 2018/12/20 17:59:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 17:59:48 fault injection: enabled 2018/12/20 17:59:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 17:59:48 net packet injection: enabled 2018/12/20 17:59:48 net device setup: enabled 18:01:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') fstat(r0, &(0x7f00000001c0)) syzkaller login: [ 163.831297] IPVS: ftp: loaded support on port[0] = 21 [ 165.211498] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.218668] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.227081] device bridge_slave_0 entered promiscuous mode [ 165.306978] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.313575] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.322158] device bridge_slave_1 entered promiscuous mode [ 165.405560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.486858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.742850] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.827202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.912743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.919746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.004524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.011522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.267901] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.276677] team0: Port device team_slave_0 added [ 166.361607] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.370174] team0: Port device team_slave_1 added [ 166.452393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.542495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.627584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.635235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.644713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.729463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.737197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.746693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:01:26 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) [ 167.810107] IPVS: ftp: loaded support on port[0] = 21 [ 168.031800] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.038376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.045612] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.052202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.061401] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 168.068012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.040987] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.047653] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.056167] device bridge_slave_0 entered promiscuous mode [ 170.140224] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.146883] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.155303] device bridge_slave_1 entered promiscuous mode [ 170.234334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 170.313832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 170.704107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.845286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.939033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.947622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.581853] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.590674] team0: Port device team_slave_0 added [ 171.740193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.748929] team0: Port device team_slave_1 added [ 171.883088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.890092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.899172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.062915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 172.069900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.078912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.220837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.228534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.237798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.342380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.350003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.359336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:01:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)=""/62, 0x3e}}], 0x1, 0x0, 0x0) [ 173.228098] IPVS: ftp: loaded support on port[0] = 21 [ 174.114088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.202800] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.209487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.216688] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.223318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.232493] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 174.239031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.667179] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 175.361902] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 175.368215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.376318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.747585] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.754187] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.762603] device bridge_slave_0 entered promiscuous mode [ 175.881600] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.888332] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.896566] device bridge_slave_1 entered promiscuous mode [ 175.954482] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.038010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.116402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.673333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.843748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.570991] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.579797] team0: Port device team_slave_0 added [ 177.689542] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.698900] team0: Port device team_slave_1 added [ 177.845528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 177.854189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.863105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.031120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.150946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.158633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.167835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.298889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.306543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.315795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:01:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') fstat(r0, &(0x7f00000001c0)) 18:01:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') fstat(r0, &(0x7f00000001c0)) [ 180.263677] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.270391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.277580] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.284347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.293421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.299900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:01:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') fstat(r0, &(0x7f00000001c0)) 18:01:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$alg(r0, &(0x7f00000008c0)=[{0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000300)=[@op={0x18}, @assoc={0x18}], 0x30}], 0x1, 0x0) 18:01:39 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) ioprio_set$pid(0x1, r0, 0x0) 18:01:39 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) ioprio_set$pid(0x1, r0, 0x0) 18:01:39 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) ioprio_set$pid(0x1, r0, 0x0) 18:01:40 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) ioprio_set$pid(0x1, r0, 0x0) [ 181.203771] IPVS: ftp: loaded support on port[0] = 21 18:01:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000000000)={0x0, 0x7f}, 0x8) close(0xffffffffffffffff) 18:01:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000000000)={0x0, 0x7f}, 0x8) close(0xffffffffffffffff) [ 181.687528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.327650] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.876307] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.883165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.891038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.619166] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.019692] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.026451] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.034745] device bridge_slave_0 entered promiscuous mode [ 184.129524] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.136109] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.144316] device bridge_slave_1 entered promiscuous mode [ 184.237241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.337218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.923359] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.099030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.244429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.251451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.390897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.398114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.983774] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.992837] team0: Port device team_slave_0 added [ 186.162666] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.171189] team0: Port device team_slave_1 added [ 186.329859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.336998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.346084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.532183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.539460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.548422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.749453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.757182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.766378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.980844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.989077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.998280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.525001] 8021q: adding VLAN 0 to HW filter on device bond0 18:01:46 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) [ 188.125392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.662037] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.668442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.676453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.828353] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.835012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.842320] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.848882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.858054] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.322460] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.692112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:01:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)=""/62, 0x3e}}], 0x1, 0x0, 0x0) 18:01:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000000000)={0x0, 0x7f}, 0x8) close(0xffffffffffffffff) 18:01:51 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) 18:01:51 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x3, 0x100, 0x0, 0x7, 0x58}, 0x14) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80004080}, 0xc, &(0x7f0000000400)={&(0x7f0000000100)={0x2cc, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfef}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe5b}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa16}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x19b99ca1}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xbcb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200000000}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xb97}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffff0000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2000200000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x34d}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xaf}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xae43}]}]}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x40840}, 0x40) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000480)={0x0, 0x80, 0x6, 0xe9, 0xc0}, 0x14) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000004c0)=0x1, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000580)={0x18, 0x0, &(0x7f0000000500)=[@request_death={0x400c630e, 0x0, 0x4}, @acquire={0x40046305, 0x3}], 0x8, 0x0, &(0x7f0000000540)="3cef29973f0a4db2"}) ioctl$KVM_SMI(r0, 0xaeb7) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000600)={0x0, 0x800, 0x4}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000680)={r2}, &(0x7f00000006c0)=0x8) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000700)=""/132) open_by_handle_at(r0, &(0x7f00000007c0)={0xa2, 0x100000000, "b07940136832f2b9e8ab3dfe46ee8e1a32958cbbc1f410439f9cbbbd993906f28b8777461c7656ebfb382a64f38cd5fb02469b0851e8838500718796a35cb6dd38933fb5fa8d1785a5c3909bc5dd8a4cd140e021e5b14971be8f8d707c5f49579730b91c5de33e6062a614d40b4b4df288cce2fa81b9164e4a7f78121ebbdd549a89d6a88a7a2ec8edf6fea530a8eab75dee7894c1ae3ae107be"}, 0x200) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000008c0)={'filter\x00', 0x7, 0x4, 0x450, 0x118, 0x250, 0x118, 0x368, 0x368, 0x368, 0x4, &(0x7f0000000880), {[{{@uncond, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@arp={@broadcast, @multicast2, 0x0, 0xffffffff, @mac=@random="c413a8aa73eb", {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}, @mac=@broadcast, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, 0x87d, 0x8000, 0x2ed9a820, 0x8, 0x2, 0x5, 'lo\x00', 'vlan0\x00', {}, {0xff}, 0x0, 0x108}, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xc000000000, 'syz1\x00', 0x7}}}, {{@arp={@broadcast, @multicast1, 0xffffffff, 0xffffff00, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x6, 0x410, 0x1, 0x1f, 0x5, 0x100000001, 'veth0\x00', 'veth1_to_bridge\x00', {0xff}, {}, 0x0, 0x200}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a0) write$binfmt_elf64(r0, &(0x7f0000000d80)={{0x7f, 0x45, 0x4c, 0x46, 0x9a, 0x6, 0x8, 0x7, 0xd4a3, 0x2, 0x3f, 0xd7a, 0x2ef, 0x40, 0x2c0, 0x1, 0x5, 0x38, 0x2, 0x0, 0x6, 0xc5b}, [{0x60000004, 0x3, 0x7ff, 0xfffffffeffffffff, 0xcc1, 0x0, 0x3, 0xfffffffffffffff8}, {0x7474e555, 0x5, 0x3, 0xb5b, 0x9, 0x7fff, 0x9, 0x800}], "ce2f5f70ecd4acf94cf365927d63561851bd1ddb416675b37c2e55b63bb8106397afd25a568262bc7252d7c9c3b7507c60b2d6ccdd235e1189487b327986cea4eef73fa1b94ef02cd10230206aab958029fa993f1f353715dae79287efa2c8a17b26d2b5340d1c289d2ff13f76", [[], [], [], [], []]}, 0x61d) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000001400)={0xbf0000, 0x7, 0xf85, [], &(0x7f00000013c0)={0xa2095b, 0x0, [], @value64=0x3}}) lsetxattr(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)=@known='trusted.overlay.opaque\x00', &(0x7f00000014c0)='veth1_to_bridge\x00', 0x10, 0x3) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001580)={0x10, 0x0, &(0x7f0000001500)=[@clear_death={0x400c630f, 0x4, 0x3}], 0x6, 0x0, &(0x7f0000001540)="48d92bf1e25c"}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000001600)={&(0x7f00000015c0)=[0x80000000, 0x4, 0x8, 0x7fff], 0x4, 0x7f, 0x6, 0x401, 0x7ff, 0x0, {0x1fc000000000000, 0x2, 0x971a, 0xffff, 0x518, 0x1000, 0x20, 0x3, 0x8, 0x80000000, 0x6, 0x6, 0x7fff, 0x5, "59f6e727036c751db8d7530b7d8707b87499e989ab1436cf9abdb6f634190281"}}) r3 = getpid() ptrace$getsig(0x4202, r3, 0x4, &(0x7f0000001680)) write$nbd(r0, &(0x7f0000001700)={0x67446698, 0x0, 0x3, 0x0, 0x3, "54ca64eb0500081d789c451e158d820e24de33f353fcc85c52f540d17f00fe4b9e7f3223aa67ed0ffdbab6ae96b7b38743f24753668fa35b8ee21b5e1f4d7af11613599e9d3cb4d94d51cd70d65b79adfeaf25ff467ed0b8f3c883d9c492495613a076284e22cc26ad4991cdeebc108952fd5ad0f3c8490c2730b9fdeb67b5a6cf366de7930611a84750defcdb8ea48f5d2de38e040b17babfc9edf66058449b000dc0fb2db6e8499d43efef30a08dd4cda25ea496ee7271fd854704abb4040244d2ead03406a9c1"}, 0xd8) ptrace$setopts(0x4206, r3, 0xffffffffffff435d, 0x2) accept4$tipc(r0, 0x0, &(0x7f0000001800), 0x80800) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001840)={0xe, 0x2, 0x80000000, 0x80000, r0}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000001880)={0xf, 0x2, 0x1, {0xffffffffffff47c0, 0x8, 0x0, 0x1000}}) openat$null(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/null\x00', 0x400400, 0x0) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000001d80)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001d40)={&(0x7f0000001ac0)={0x280, 0x22, 0x4, 0x70bd25, 0x25dfdbfe, {0x12}, [@generic="b10e64e2e5a208d2e374ec60ad8f2668983d15b373eb5ce223da6e228c95a9e499d95cb8e3c1db2991507bbaa0943f1a0242f7d12331da9ff040406048cf4468e5d7ebe0adeeda23f1864f9a0eb96acc266dd56670d911b5f03d96fa556d804810bd77100adb629ace5009532337b2df6c5b65cd0ef19dc8b5c796b9dd7eab8cc127dd470d8eeec09726c8d571d9b1427e319fc631f3bf5d107fccfca4427e690b4a158df14b9c96c7c7c464c0537a12e7accc07299e", @typed={0x8, 0x1d, @ipv4=@local}, @typed={0x8, 0x6b, @uid=r4}, @typed={0x8, 0x1, @ipv4=@local}, @generic="a862773eb1a5e3dc31e3d8d8fc0214e0d609b81bb050fb1faaedbb5ca75526ec533387bed92fc288c08c66b2459429c301321df9e9f7ce8afeea4300b6ea0a868acf6409e0d2ff6e690a6561d7615c367d760b313d32c6a309c26065c84cd3c5bfe04163f1ed9a1054111850901691e9cb14a381f228f4372e15cb1214764bd241ff7ea1121e2124ff60853b08daab6e716320fd9bdb100581da20fc7daf4a54fdaf7f729657253b4fccf11c8a476fe2f3c293f1046911990a778273fbbe49bbd27aafa35ea8185808b4d03e62dd9d136af86be2d6801baba3ab7cdaf6524a904011861e9e31b711105695b68db0e898f4be485ad4f8b18132", @typed={0x8, 0x5, @uid=r5}, @nested={0x9c, 0x78, [@typed={0x80, 0x88, @binary="f9908288be6d0b253794b122f1273c49999109c01c1e107c418386b812b5bebb0e8f72d34ac5c5dd917cdf7cba5c2bb9c9b0e67de4b37236e6b865f04d88dcfa39324d71566bfcd506094f99f6767edf264798d3abc8ca5ff4f9778bd4e787f5df88a1c6557e64502a2abfbe9de1a17c8141adb9a9441f1465"}, @typed={0xc, 0x25, @str='veth0\x00'}, @typed={0xc, 0x72, @str='wlan1\x00'}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x1}, 0x80) [ 193.053465] IPVS: ftp: loaded support on port[0] = 21 [ 194.994103] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.000654] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.008842] device bridge_slave_0 entered promiscuous mode [ 195.036567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.090941] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.097577] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.105840] device bridge_slave_1 entered promiscuous mode [ 195.186060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.271201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.352331] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.539722] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.623985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.661125] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.667504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.675656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.698675] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 195.705701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.786545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 195.793578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.982085] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.043559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.052234] team0: Port device team_slave_0 added [ 196.140746] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.149484] team0: Port device team_slave_1 added [ 196.230665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.321920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.403555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.411118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.420307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.503601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.511202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.520474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.417526] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.424227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.431344] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.437961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.447353] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.552062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:01:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$alg(r0, &(0x7f00000008c0)=[{0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000300)=[@op={0x18}, @assoc={0x18}], 0x30}], 0x1, 0x0) 18:01:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000000000)={0x0, 0x7f}, 0x8) close(0xffffffffffffffff) 18:01:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)=""/62, 0x3e}}], 0x1, 0x0, 0x0) 18:01:57 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) 18:01:57 executing program 5: prctl$PR_SET_FPEXC(0xc, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f0000000040)={@local, @multicast2, @multicast1}, 0xc) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400000) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000000c0)) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000004c0)={'filter\x00'}, &(0x7f0000000540)=0x78) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000580)) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000005c0)='veth0_to_bond\x00') r2 = socket$inet(0x2, 0x7, 0x8) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000600)={0x1, 0x0, [{0x5, 0x6, 0x0, 0x0, @adapter={0x3, 0x5, 0x80, 0x6b, 0x4}}]}) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000640), &(0x7f0000000680)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000700)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000780)={0x16, 0x98, 0xfa00, {&(0x7f00000006c0), 0x2, r3, 0x30, 0x1, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @broadcast}, 0x1}}}, 0xa0) pread64(r0, &(0x7f0000000840)=""/31, 0x1f, 0x0) connect$rds(r1, &(0x7f0000000880)={0x2, 0x4e24, @loopback}, 0x10) pwritev(r0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="78a898b9074f7484fee92783c478fcce51faaaeecaa148ffc7252b6296a206fea61b062a11e45e63ed86068d8a950ee79f3beef4a1aed459f36c0183a7b7733a8a90588d60ee5fc0894364f9c82e486ffc7d5f395b47e79d18e4a49881e48a3345a0b4c0a94edd0839c8ce4a67f7fb461c6f974a64db810f0cf1abab9703744008f60a67a3c3b634bde8d1e0f8a1d740fe83122c33066923e2bf761ed438270b469fee1a09f41cadfa075875473d8161ca184d53ab7c1b92aa2d210bd6e198c144fb577dbc60a065667523d9e8bdb132f92faf333b82fc54dbac5f473c7456db386c708fe32c", 0xe6}], 0x1, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$TIOCCBRK(r4, 0x5428) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000a40)={0x80000000000000, 0x0, 0x10001, 0x6c4d}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000a80)={0xff0, r5, 0x1}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000ac0)={0x0}, &(0x7f0000000b00)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000b40)={r6, 0x1000, "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"}, &(0x7f0000001b80)=0x1008) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001bc0)={0x0, @multicast1, @multicast2}, &(0x7f0000001c00)=0xc) socket$kcm(0x29, 0x5, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r7, 0x0, 0x48b, &(0x7f0000001d00)={0x1, 'vlan0\x00'}, 0x18) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/dlm_plock\x00', 0x201, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f0000001d80)={0x5000, 0x6, 0x0, 'queue0\x00', 0x3}) clone(0x10000, &(0x7f0000001e40)="7f95c411f4b0ad4f28e53655702d19208bb21fb7dfd402ba3b2e6b71702d3d5fb204e5db1af7c1079b7018611b228351eba0d8e028655bfb0afaaf5ed4ef7460afe57742d6aaefdf34bfdb08580cee0432e9b9184a6e550c015cc0bdf8cee5870e318d252778f99d66685c0dcce9ee6b5d635e74d464436b1929fdeeab7347db582a3759e54e00b3516170c7eac51ba34e26a5fd22e4116e2c7b1d94acdc5b1819a6d20803f4c5d1560710fd081a4470816dfc92e5536450fa716534b8ead6dce9d822e086976b5f05021c3b11df9f432e7de1765644c9b62dc883077f89b7", &(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)="3d205e248d1e4b90c786404b008977a2c355272821062d7a5af4c1ff3f2d7f400ae6a02eaee5808c2c1eb70c2f0a345b3700e0e49f361ea80ce0cbe2b59c095e835f8845161caeb705dca417080d2791214eb3934202bb0def21198356bd2c98b38fca09cf775360ad64a68ebe4273608bd1e7b9ee03be6723") 18:01:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0}}}}, 0x128}}, 0x0) 18:01:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$alg(r0, &(0x7f00000008c0)=[{0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000300)=[@op={0x18}, @assoc={0x18}], 0x30}], 0x1, 0x0) 18:01:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)=""/62, 0x3e}}], 0x1, 0x0, 0x0) 18:01:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0}}}}, 0x128}}, 0x0) 18:01:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_origin(0x0, &(0x7f0000000680)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:6%,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:01:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$alg(r0, &(0x7f00000008c0)=[{0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000300)=[@op={0x18}, @assoc={0x18}], 0x30}], 0x1, 0x0) [ 198.739943] libceph: parse_ips bad ip '[d::]:6%,[' [ 199.002391] IPVS: ftp: loaded support on port[0] = 21 [ 200.408978] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.415785] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.424218] device bridge_slave_0 entered promiscuous mode [ 200.507292] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.513977] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.522576] device bridge_slave_1 entered promiscuous mode [ 200.603364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.682454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.937970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.028949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.111140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.119773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.198736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.206567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.454788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.462992] team0: Port device team_slave_0 added [ 201.546604] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.554504] team0: Port device team_slave_1 added [ 201.638719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.654178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.741091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.827127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.834867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.844285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.928955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.937148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.946319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.994846] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.297978] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.304817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.312769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.622204] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.866048] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.872649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.879745] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.886357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.895167] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.072171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:02:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) readahead(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(0x0, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 18:02:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0}}}}, 0x128}}, 0x0) 18:02:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010207041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 18:02:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&3||\x00') 18:02:03 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x6, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 204.783207] netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. [ 205.831553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.000395] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.167667] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.174240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.181959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.351897] 8021q: adding VLAN 0 to HW filter on device team0 18:02:06 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 18:02:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xf0}}}}, 0x128}}, 0x0) 18:02:06 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x6, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 18:02:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010207041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 18:02:06 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000100)={0x0, 0x0, 0x800}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)={0x6}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:02:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) readahead(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(0x0, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 207.466472] QAT: Invalid ioctl [ 207.472623] IPVS: Unknown mcast interface: vlan0 [ 207.477861] QAT: Invalid ioctl [ 207.503753] QAT: Invalid ioctl [ 207.507756] IPVS: Unknown mcast interface: vlan0 [ 207.512924] QAT: Invalid ioctl [ 207.605273] netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. [ 207.610634] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 18:02:06 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x6, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 18:02:06 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 207.693943] encrypted_key: keyword 'new' not allowed when called from .update method 18:02:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010207041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 18:02:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) readahead(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(0x0, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 18:02:06 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 18:02:07 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x6, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 207.964276] netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. 18:02:07 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:02:07 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2) poll(&(0x7f0000000240)=[{r0, 0x1004}], 0x1, 0x0) 18:02:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) readahead(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(0x0, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 18:02:07 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 18:02:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10000}) getrandom(&(0x7f0000000040)=""/57, 0x39, 0x2) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) 18:02:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010207041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 18:02:07 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:02:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req={0x10000, 0xea5f, 0x100000000, 0x80}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='[proc\x00', r0}, 0x10) setsockopt$inet_tcp_buf(r2, 0x6, 0x7c957d371538e228, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000240)}) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000000)=0xd9fe, 0x4) sendto$inet6(r0, &(0x7f0000000380), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = dup2(r0, r0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback}, 0x1c) poll(&(0x7f0000000040)=[{r3}], 0x1, 0xe0) dup2(r1, r0) 18:02:07 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) [ 208.410238] netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. 18:02:07 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:02:07 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0xc00020c004500a, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0x8}, 0xfffffe74) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000040)) 18:02:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40106614, 0x0) 18:02:07 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2) poll(&(0x7f0000000240)=[{r0, 0x1004}], 0x1, 0x0) [ 208.673473] ================================================================== [ 208.680919] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 208.687533] CPU: 1 PID: 8175 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #8 [ 208.694650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.704466] Call Trace: [ 208.707080] dump_stack+0x173/0x1d0 [ 208.710759] kmsan_report+0x120/0x290 [ 208.714612] kmsan_internal_check_memory+0x9a7/0xa20 [ 208.719749] ? __local_bh_enable_ip+0xb3/0x1a0 [ 208.724389] __msan_instrument_asm_load+0x8a/0x90 [ 208.729279] __siphash_aligned+0x512/0xae0 [ 208.733575] secure_tcpv6_seq+0x143/0x2b0 [ 208.737759] ? inet6_hash_connect+0x176/0x1a0 [ 208.742364] tcp_v6_connect+0x242b/0x2890 [ 208.746563] ? __msan_poison_alloca+0x1e0/0x270 [ 208.751303] ? tcp_v6_pre_connect+0x130/0x130 [ 208.755831] __inet_stream_connect+0x2f9/0x1340 [ 208.760545] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 208.765425] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 208.770176] tcp_sendmsg_locked+0x65d5/0x6be0 [ 208.774714] ? aa_label_sk_perm+0xda/0x940 [ 208.779045] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 208.784447] ? aa_label_sk_perm+0x6d6/0x940 [ 208.788975] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 208.794363] ? futex_wait+0x912/0xc40 [ 208.798261] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 208.803709] tcp_sendmsg+0xb2/0x100 [ 208.807389] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 208.812078] inet_sendmsg+0x54a/0x720 [ 208.815912] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 208.821308] ? security_socket_sendmsg+0x1bd/0x200 [ 208.826397] ? inet_getname+0x490/0x490 [ 208.830407] __sys_sendto+0x8c4/0xac0 [ 208.834304] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 208.839795] ? prepare_exit_to_usermode+0x114/0x420 [ 208.844837] ? syscall_return_slowpath+0x50/0x650 [ 208.849724] __se_sys_sendto+0x107/0x130 [ 208.853848] __x64_sys_sendto+0x6e/0x90 [ 208.857847] do_syscall_64+0xbc/0xf0 [ 208.861594] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 208.866832] RIP: 0033:0x457669 18:02:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40106614, 0x0) [ 208.870068] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.889010] RSP: 002b:00007f73abe0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 208.896750] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 208.904043] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 208.911335] RBP: 000000000072bf00 R08: 000000002072e000 R09: 000000000000001c [ 208.918632] R10: 00000000200408d4 R11: 0000000000000246 R12: 00007f73abe0b6d4 [ 208.925920] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 208.933234] [ 208.934890] Local variable description: ----combined@secure_tcpv6_seq [ 208.941499] Variable was created at: [ 208.945236] secure_tcpv6_seq+0x7d/0x2b0 [ 208.949332] tcp_v6_connect+0x242b/0x2890 [ 208.953489] [ 208.955129] Bytes 4-7 of 8 are uninitialized [ 208.959549] Memory access of size 8 starts at ffff88814697f658 [ 208.965533] ================================================================== [ 208.972903] Disabling lock debugging due to kernel taint [ 208.978382] Kernel panic - not syncing: panic_on_warn set ... [ 208.984316] CPU: 1 PID: 8175 Comm: syz-executor4 Tainted: G B 4.20.0-rc7+ #8 [ 208.992817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.002188] Call Trace: [ 209.004807] dump_stack+0x173/0x1d0 [ 209.008478] panic+0x3ce/0x961 [ 209.011757] kmsan_report+0x285/0x290 [ 209.015653] kmsan_internal_check_memory+0x9a7/0xa20 [ 209.020814] ? __local_bh_enable_ip+0xb3/0x1a0 [ 209.025446] __msan_instrument_asm_load+0x8a/0x90 [ 209.030315] __siphash_aligned+0x512/0xae0 [ 209.034598] secure_tcpv6_seq+0x143/0x2b0 [ 209.038774] ? inet6_hash_connect+0x176/0x1a0 [ 209.043303] tcp_v6_connect+0x242b/0x2890 [ 209.047491] ? __msan_poison_alloca+0x1e0/0x270 [ 209.052189] ? tcp_v6_pre_connect+0x130/0x130 [ 209.056703] __inet_stream_connect+0x2f9/0x1340 [ 209.061390] ? kmem_cache_alloc_trace+0x55a/0xb90 [ 209.066260] ? tcp_sendmsg_locked+0x6394/0x6be0 [ 209.070966] tcp_sendmsg_locked+0x65d5/0x6be0 [ 209.075488] ? aa_label_sk_perm+0xda/0x940 [ 209.079745] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 209.085132] ? aa_label_sk_perm+0x6d6/0x940 [ 209.089470] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 209.094845] ? futex_wait+0x912/0xc40 [ 209.098734] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 209.104148] tcp_sendmsg+0xb2/0x100 [ 209.107799] ? tcp_sendmsg_locked+0x6be0/0x6be0 [ 209.112486] inet_sendmsg+0x54a/0x720 [ 209.116310] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 209.121688] ? security_socket_sendmsg+0x1bd/0x200 [ 209.126659] ? inet_getname+0x490/0x490 [ 209.130663] __sys_sendto+0x8c4/0xac0 [ 209.134520] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 209.139985] ? prepare_exit_to_usermode+0x114/0x420 [ 209.145017] ? syscall_return_slowpath+0x50/0x650 [ 209.149879] __se_sys_sendto+0x107/0x130 [ 209.153976] __x64_sys_sendto+0x6e/0x90 [ 209.157968] do_syscall_64+0xbc/0xf0 [ 209.161710] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 209.166907] RIP: 0033:0x457669 [ 209.170111] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.189022] RSP: 002b:00007f73abe0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 209.196739] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 209.204023] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 209.211298] RBP: 000000000072bf00 R08: 000000002072e000 R09: 000000000000001c [ 209.218575] R10: 00000000200408d4 R11: 0000000000000246 R12: 00007f73abe0b6d4 [ 209.225852] R13: 00000000004c4539 R14: 00000000004d75a8 R15: 00000000ffffffff [ 209.234396] Kernel Offset: disabled [ 209.238028] Rebooting in 86400 seconds..