[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 56.478076] audit: type=1800 audit(1540854613.521:25): pid=6147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.497471] audit: type=1800 audit(1540854613.521:26): pid=6147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.517307] audit: type=1800 audit(1540854613.551:27): pid=6147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2018/10/29 23:10:27 fuzzer started 2018/10/29 23:10:32 dialing manager at 10.128.0.26:46505 2018/10/29 23:10:32 syscalls: 1 2018/10/29 23:10:32 code coverage: enabled 2018/10/29 23:10:32 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/29 23:10:32 setuid sandbox: enabled 2018/10/29 23:10:32 namespace sandbox: enabled 2018/10/29 23:10:32 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/29 23:10:32 fault injection: enabled 2018/10/29 23:10:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/29 23:10:32 net packed injection: enabled 2018/10/29 23:10:32 net device setup: enabled 23:13:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x10004, 0x0, &(0x7f0000ffa000/0x4000)=nil}) keyctl$session_to_parent(0x12) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x8008, 0x9, 0x2, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0xcef4, 0x800, 0x8}, &(0x7f0000000140)=0x10) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000180)=0x1ff) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000001c0)=0x55, &(0x7f0000000200)=0x2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x21c000, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000280)=0x1000000000000000, &(0x7f00000002c0)=0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000300)={'icmp\x00'}, &(0x7f0000000340)=0x1e) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) pread64(r4, &(0x7f00000003c0)=""/116, 0x74, 0x0) userfaultfd(0x80000) ioctl$RTC_UIE_ON(r4, 0x7003) tee(r0, r0, 0x1, 0x2) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000440)={r1, 0xbfd, 0x3ff, 0x10000, 0xfffffffffffffff8, 0x1, 0x3, 0x6, {r1, @in={{0x2, 0x4e20, @rand_addr=0x200}}, 0x6, 0x8001, 0x1, 0x2, 0x1}}, &(0x7f0000000500)=0xb0) socket$inet(0x2, 0x800, 0x20) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000540)=0x1, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-net\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x54, r5, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000740)=""/27) accept4$inet(r3, &(0x7f0000000780)={0x2, 0x0, @remote}, &(0x7f00000007c0)=0x10, 0x800) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000800)=0x3) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000840)=r1, 0x4) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000880)={{0x3, 0xba, 0x8, 0x9}, 'syz0\x00', 0x28}) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000900)={0x0, r3}) prctl$seccomp(0x16, 0x0, &(0x7f0000000980)={0x3, &(0x7f0000000940)=[{0x1, 0x8000, 0xcf, 0x1}, {0x4, 0x2, 0x3, 0x1}, {0xffff, 0x7, 0x7fffffff, 0x2}]}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syzkaller login: [ 242.100179] IPVS: ftp: loaded support on port[0] = 21 [ 244.492872] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.499346] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.508197] device bridge_slave_0 entered promiscuous mode [ 244.664833] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.671302] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.679871] device bridge_slave_1 entered promiscuous mode [ 244.819203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 244.958863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:13:22 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r2, 0x4) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x400402) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@mangle={'mangle\x00', 0x1f, 0x6, 0x518, 0x390, 0x298, 0xc0, 0xc0, 0x390, 0x480, 0x480, 0x480, 0x480, 0x480, 0x6, &(0x7f0000000100), {[{{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x30, 0x40}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x8, 0x20, 0x1, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x598, 0x100000001}}}, {{@ip={@multicast1, @local, 0xff, 0x0, 'bond0\x00', 'yam0\x00', {0xff}, {}, 0x3f, 0x3, 0x10}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0xffffffffffffff9f, 0x3}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x5, 0xffff, 0x1f, 0x7, 0x0, 0xde], 0xdf2, 0x7, 0x8}, {0x8, [0xa0, 0xffffffffffff377e, 0x1000, 0xffffffffffffff5c, 0x4, 0x1a5], 0x100000001, 0x7, 0xf1ce}}}}, {{@ip={@empty, @broadcast, 0x0, 0xffffff00, 'nr0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x7f, 0x1, 0x8}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x204}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x578) r4 = accept4(r3, &(0x7f0000000700)=@nl, &(0x7f0000000780)=0x80, 0x80800) vmsplice(r1, &(0x7f0000000c80)=[{&(0x7f00000007c0)="3e6170f28cf1b138ac854964cf7696260b5a7cbdeb80224856e7235752627729baf121230487cf1d99614f0266ba86eb228a0175fb6e8b7a4ab6b6262b833f5b95e65d385a46baf8479cf9f99ccf05fe04cadf9faca9d688c77c036219378f4ef6a3cc84d9d8814513f47ed1d1c0d04dbb41baf1283d66567bcbe390528893f26f390b9b23c91539cdf4e27bf802ce5a2fd2f8669ac71f466615e88cbfd8e329fb24a30a2e47ff824bed5ff566a7f08e44765c8ee5fcdb", 0xb7}, {&(0x7f0000000880)}, {&(0x7f00000008c0)="5dcda0dc36a2f62a8ecbe1868bd0f1568fa2443d30c346ac532aaef4796bb415a4274fe3ff1a63893abca760079fbed6a71671da0990fc57a453c91906bf710a098d6bfb210745b4bfa47288b6e00622a296592f587c293cc53cd1b0bfdebed1018c14fd140c98a7b352fff865b92fa3ab021d470cadb26f91a83f174428e28a7afe19655d14be042dfa5673f9455304b51de8e33063d268bcbe1b81d2be0e8238d39653ae5833b88a8fc50f3771c39a862fbe7dae72cf7a10dcdb6b62ee344d3148e11fd226bb0bdd44c8e044357978098d5e02add16cea3a1eac7b83393200f7648b9429b59a6b905f2c33222da3e432944da923", 0xf5}, {&(0x7f00000009c0)="c39891a63c8789ff51f53255213e0c8f76963d4d542f99d63cd585ca357ace7331fc74caa7229d7f4a96d3e300e29cbcd7a722304212cc300322e8a093891b0f0704d5989b", 0x45}, {&(0x7f0000000a40)="33d272d1fe4f56b69baa18df1cd65cc9b098ddc0ad7369a51200679cd553233d259b2cb55c708bcb7bee14df0a3737975e5f3239f8521a517d2ef68af3053d51f23536381f8466fbd335a7ba65686052daf93f6b4110eb2a1970576bc89bd672296c5c4a5423efc319f56ba0cb378d84185edef0d06b44b3dbd3e6ac328fc42511b0eab09ed176574a2e753cbb6555eed31d6b6c2148222a96588f7f976b60fdb865224460e62bb3a4326549757cd50206f6695674c86143411827a8368447da73818af075a72335c609ac86250d5949d09fb1740f13664af6cc110931e581226a2f45bfd6d09d98886bca69ac221aa04ea4c6a6", 0xf4}, {&(0x7f0000000b40)="64db1d0d3819cfd2a4142c1e0d449db8630e894fc3f890b317e4c117e82d8c34539264d59396f7cbb99651741362a39df771f486f26cc7a9b2df6ad85c79a21ddef629e28d4abe4cdcbfad4332535cdb550d258ffe29b1dce568640f40c91bdc0a4e9d4eae79d77369e046f4607386c4aacf8bf90e4ccfbe7908839bb5", 0x7d}, {&(0x7f0000000bc0)="b4ffeaa62a7f89098f112c5cf3fd6812f706dbcb4c6561326f282ef8f75d504108008946b9659eefd0eded82c880df4c4f24edcc89c5ea6f151aa04953a8324ee872c0b4380783ff0dd59c4917afa781ecd306275e1afa1ecd0a32fe396345", 0x5f}, {&(0x7f0000000c40)="a2750e75595b8b92b2bf839acb1f448ebe", 0x11}], 0x8, 0x4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/full\x00', 0x200, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000d40)={0xf000, 0xf001, 0x5, 0x1e17, 0x1000}) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000d80)=0x5f, 0x4) fstatfs(r4, &(0x7f0000000dc0)=""/230) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000ec0)=0x10001, &(0x7f0000000f00)=0x4) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000f40)={0x2, 0x0, [{0x80000007, 0x2bca, 0x4, 0x7, 0x48, 0xd48, 0x4}, {0x1, 0x9, 0x5, 0x100000001, 0x100000001, 0x7ff, 0xb868}]}) ioctl$sock_bt_bnep_BNEPCONNDEL(r5, 0x400442c9, &(0x7f0000000fc0)={0xfffffffffffffffa, @remote}) execveat(r3, &(0x7f0000001000)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001040)='}-\x00', &(0x7f0000001080)='/dev/full\x00', &(0x7f00000010c0)='/dev/full\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='ipddp0\x00', &(0x7f0000001180)='\x00', &(0x7f00000011c0)='/dev/midi#\x00', &(0x7f0000001200)='/dev/full\x00', &(0x7f0000001240)="2c3a2540657468312927766d6e6574302cca00"], 0x1000) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f00000012c0)={0x2, 0x41416770, 0x3, @discrete={0x8, 0x8}}) connect$inet(r4, &(0x7f0000001300)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000001340)={@in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x21}, 0x9}}, 0x401, 0x2, 0x10f, "7577d1694571d49ecb312994960b22ec4eed90b19a432f400585a1146faf92e1163176b9b1216dc8b6b6fa8f702e881c8ab49f303358ce9ab28b55be83952fd110be8dcc4a9d16d9f1ba8aa464e31564"}, 0xd8) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$sock_bt_bnep_BNEPCONNDEL(r5, 0x400442c9, &(0x7f0000001440)={0x2, @link_local}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r5, 0xc0845657, &(0x7f0000001480)={0x0, @reserved}) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000001540)={'ipddp0\x00', {0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x16}}}) signalfd4(r5, &(0x7f0000001580)={0x8}, 0x8, 0x800) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f00000015c0), 0x4) statx(r5, &(0x7f0000001600)='./file0\x00', 0x3000, 0x0, &(0x7f0000001640)) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000001740)=r5) mq_notify(r3, &(0x7f0000001780)={0x0, 0x3d, 0x2, @tid=r0}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000001800)={0xaa, 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000001840)=[@in={0x2, 0x4e22, @rand_addr=0x3}, @in={0x2, 0x4e21, @rand_addr=0x400}], 0x20) syz_open_dev$dmmidi(&(0x7f0000001880)='/dev/dmmidi#\x00', 0x6, 0x101000) [ 245.385674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.579299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.953616] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.960661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.041715] IPVS: ftp: loaded support on port[0] = 21 [ 246.494018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 246.502233] team0: Port device team_slave_0 added [ 246.676188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.684341] team0: Port device team_slave_1 added [ 246.890029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.137193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 247.144492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.153576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.445550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.453306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.462737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.743724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.751309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.760495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.041925] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.048432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.055535] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.062065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.070857] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.079424] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.086188] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.094788] device bridge_slave_0 entered promiscuous mode [ 250.294725] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.301217] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.309847] device bridge_slave_1 entered promiscuous mode [ 250.543713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.741289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:13:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000040)=""/162) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x2, {0x2, 0x4e22}, {0x2, 0x4e20, @rand_addr=0xfffffffffffffffb}, {0x2, 0x4e20, @broadcast}, 0x88, 0x2763, 0x3, 0xfffffffffffffff8, 0x401, &(0x7f0000000100)='team0\x00', 0x80, 0x5, 0x5}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000440)={@ipv4={[], [], @multicast1}, 0x4c, r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000480)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000004c0)="309b7429c842541ed7a52924a01844b19a1d12001fd8f59fd3f87f7a57d536c7082f90726135c4394b9a483dc0911b3a034c4030072f0155c8113fb6c4a88cb4a387bdab027cc626814f3e45e3b971973b377f7c558515208041793b13fd0c934ea17e35325e85d0879c47afe9108d8cb7610182842af8e395ed782eeb011947e5dec13ad30bec41cd5920da14cb4e361f77156b2b34b6fc9afd2205a74b3016c2b19bad406f16d98f911e2ede1edaa9e296e30ab41c7f95becd80401f68f6bcb1fa4086a32a56018b2a46b5a72dd1d462e6be016930932361902b11e1fb40532f79a575bf14b93a13a1354e408ff9b75937cba8faff0fe9fe83d88cd3539096") setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x4, 0x9, 0x5, "37b30a688a9b110639274b713a307c52f64699a385fc7634d50c8bb09a1e56cafe2e9f7116d5039725ecbe6a64f8c05487b6138f541ca5babd51f01b73ff1ae07455856a81be7897e25723bf8fba12b7"}, 0xd8) r2 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x9, 0x200200) pselect6(0x40, &(0x7f0000000700)={0xa16, 0xff, 0x1, 0x0, 0x4, 0x5, 0x3, 0x100}, &(0x7f0000000740)={0xffffffffffffff81, 0x7, 0x1, 0x2, 0x4, 0xe73, 0x3f, 0x9}, &(0x7f0000000780)={0x0, 0x4c9, 0x8001, 0xfb5, 0x1, 0x54f, 0x7, 0x9}, &(0x7f00000007c0), &(0x7f0000000840)={&(0x7f0000000800)={0x3}, 0x8}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000880)=r1) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f00000008c0)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$UHID_CREATE(r0, &(0x7f0000000980)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000900)=""/118, 0x76, 0x6, 0x4, 0x1, 0x3ff, 0x7fff}, 0x120) inotify_add_watch(r0, &(0x7f0000000ac0)='./file0\x00', 0x4000000) sendto(r0, &(0x7f0000000b00)="4bf4b9b36cd4ffc257f53f9f12e89520c57e4b035349c4fdc444723266a14c87fca8223d9832ecff3c845acc1bd1e81288aad3e5649e8c7f83fb", 0x3a, 0x40000, &(0x7f0000000b40)=@ll={0x11, 0x1d, r1, 0x1, 0x0, 0x6, @dev={[], 0x15}}, 0x80) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000bc0)={0x0, 0x8, 0x6, 0xffff, 0x5}) setxattr(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000c80)=':$\\\\wlan1-\x00', 0xb, 0x1) fsetxattr$security_ima(r2, &(0x7f0000000cc0)='security.ima\x00', &(0x7f0000000d00)=@md5={0x1, "3c899d1cd04c6c74843acce45a4d9e3b"}, 0x11, 0x2) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000d40)={0x0, @bt={0x7, 0x81, 0x1, 0x3, 0x6, 0x40, 0x3, 0x9, 0x7, 0x8001, 0x7, 0x5, 0x5, 0x40, 0x14, 0x2c}}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000e00)={&(0x7f0000ffe000/0x2000)=nil, 0x3f, 0x5, 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x101}) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000e40)=0x80, &(0x7f0000000e80)=0x2) write$vnet(r0, &(0x7f0000000f80)={0x1, {&(0x7f0000000ec0)=""/126, 0x7e, &(0x7f0000000f40)=""/62, 0x3, 0x1}}, 0x68) fstat(r2, &(0x7f0000001000)) sendto$inet(r0, &(0x7f0000001080)="c8c5eb2f0d1ab0c3ac75ee91894ade37ab69c75a52aa773d10e0a9db9c", 0x1d, 0x40, &(0x7f00000010c0)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000001100)={0x5, 0x0, [{0x7, 0x6, 0x0, 0x0, @msi={0x3f, 0x101, 0x9}}, {0x8001, 0x3, 0x0, 0x0, @irqchip={0x2c0e800000000, 0x4}}, {0x81, 0x7, 0x0, 0x0, @adapter={0x7fffffff, 0x7, 0x4, 0x5, 0x101}}, {0x80000001, 0x3, 0x0, 0x0, @irqchip={0x4, 0x200}}, {0x8001, 0x3, 0x0, 0x0, @sint={0x7, 0x1}}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001200)=[@in6={0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0x19}, 0xffff}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, @in6={0xa, 0x4e20, 0x1, @local, 0x2}, @in6={0xa, 0x4e20, 0x5, @remote, 0x3}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e20, 0xfffffffffffff001, @mcast2, 0x9}, @in6={0xa, 0x4e21, 0x101, @mcast1, 0x91}, @in6={0xa, 0x4e23, 0x180000000000000, @loopback, 0x2}, @in={0x2, 0x4e22, @loopback}], 0xd8) r3 = inotify_init() fsync(r3) [ 251.052007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.491082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.787507] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.008398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.016629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.110447] IPVS: ftp: loaded support on port[0] = 21 [ 252.247776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.260454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.144694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.152828] team0: Port device team_slave_0 added [ 253.467526] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.475588] team0: Port device team_slave_1 added [ 253.807490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.814728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.823681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.098595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.105832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.114618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.323954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.331817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.340606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.616230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 254.623970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.633341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.883882] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.890347] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.898922] device bridge_slave_0 entered promiscuous mode [ 257.181955] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.188436] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.197025] device bridge_slave_1 entered promiscuous mode [ 257.560143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 257.708794] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.715401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.722452] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.728981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.737711] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.848482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 258.413588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.822093] bond0: Enslaving bond_slave_0 as an active interface with an up link 23:13:35 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x81, 0x40000) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/4096) statx(r0, &(0x7f00000010c0)='./file0\x00', 0x800, 0x100, &(0x7f0000001100)) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000001200)=0x400, 0x4) mkdirat(r0, &(0x7f0000001240)='./file0\x00', 0x102) r1 = semget(0x2, 0x0, 0x302) semctl$IPC_INFO(r1, 0x7, 0x3, &(0x7f0000001280)=""/60) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000012c0)={0x35, 0x35, 0x17, 0x17, 0xa, 0x3, 0x2, 0xb7, 0x1}) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001300)={'syz_tun\x00', 0x200}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000001340)={0x4, 0x80000000}) fsetxattr$security_smack_entry(r0, &(0x7f0000001380)='security.SMACK64EXEC\x00', &(0x7f00000013c0)='selinux:\x00', 0x9, 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000001440)={&(0x7f0000001400)=[0x8001, 0x3, 0xd0, 0xfffffffffffffc00, 0xfffffffffffffffa], 0x5, 0x4, 0x4, 0x9, 0x9d, 0x6000000, {0x5, 0x6, 0x4, 0x7, 0x8000000000, 0x0, 0x5, 0xf14, 0x10000, 0x7fff, 0x5, 0x10000000000, 0xfffffffffffff6cb, 0x2, "e524ac74fa30380f8ca0a7bc6bb99d06e448b9ee5dcdb2bae2b28a21979ded69"}}) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000014c0)='trusted.overlay.origin\x00', &(0x7f0000001500)='y\x00', 0x2, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000001680)=0xe8) r3 = getegid() chown(&(0x7f0000001540)='./file0\x00', r2, r3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000016c0)={{0x3, 0x400}, {0x3f80000000000000, 0x3}, 0x8, 0x2, 0x41}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001780)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000001880)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x2000042}, 0xc, &(0x7f0000001840)={&(0x7f00000017c0)={0x5c, r4, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1a, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001980)='/dev/dsp\x00', 0x80400, 0x0) fcntl$notify(r0, 0x402, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000019c0)=0x0) fcntl$setownex(r5, 0xf, &(0x7f0000001a00)={0x0, r6}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000001a40)={{0x7fffffff, 0x6c51, 0x6, 0x20}, 'syz1\x00', 0x8}) write$FUSE_ENTRY(r5, &(0x7f0000001ac0)={0x90, 0xfffffffffffffff5, 0x8, {0x0, 0x3, 0x47, 0xffffffffffffffff, 0x7, 0x8, {0x4, 0x0, 0x7fffffff, 0x73c, 0x3, 0x7f, 0xe8c8, 0xffff, 0xa12, 0x1, 0xfffffffffffffffe, r2, r3, 0x8000, 0x1ff}}}, 0x90) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000001b80)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000001bc0)={r7, 0x2}) [ 259.195449] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 259.515785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 259.523241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.835933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 259.843060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.150299] IPVS: ftp: loaded support on port[0] = 21 [ 260.897384] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.905569] team0: Port device team_slave_0 added [ 261.269788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.277988] team0: Port device team_slave_1 added [ 261.617535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 261.624789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.633990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.928181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 261.935539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.944485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.274002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.281915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.290811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.454262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.646624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.654401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.663283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.854917] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.047621] ip (6740) used greatest stack depth: 53264 bytes left [ 265.198169] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.204759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.212969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.084803] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.091288] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.099919] device bridge_slave_0 entered promiscuous mode [ 266.506324] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.513027] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.521970] device bridge_slave_1 entered promiscuous mode [ 266.586018] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.807142] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.813734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.820695] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.827356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.836249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.858617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 267.144617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 267.422826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.051334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.400852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.743509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 268.750634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.997388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.004807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:13:46 executing program 4: r0 = semget$private(0x0, 0x1, 0x280) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0xfffffffffffffffa, 0x5, 0x7, 0x1, 0xfffffffffffffff8]) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fcntl$setown(r1, 0x8, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x4, 0x7, 0x4, 0x0, 0x7, [{0x8001, 0x4}, {0xff, 0xfffffffffffffeff, 0x3, 0x0, 0x0, 0x200}, {0x7fffffff, 0x8, 0x599, 0x0, 0x0, 0x200}, {0xff, 0x0, 0x0, 0x0, 0x0, 0x8}, {0xfc66, 0x6, 0x0, 0x0, 0x0, 0x100}, {0x7, 0x80000001, 0x9, 0x0, 0x0, 0xb04}, {0x9, 0x9, 0x1000, 0x0, 0x0, 0x800}]}) semget$private(0x0, 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000300)=0x5) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000400)={'veth1_to_bond\x00', 0x1}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000004c0)={0x9, 0x6, 0x4, 0x40, {r5, r6/1000+30000}, {0x7, 0x0, 0x9, 0x20, 0x8, 0x80, "fffcc329"}, 0x0, 0x1, @planes=&(0x7f0000000480)={0xfffffffffffff556, 0x3, @mem_offset=0x7, 0x4}, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000540)={0x6, 0x0, 0x1, 0x47d56b13}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000580)={0x8000, r7, 0x2, 0x4}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x4e20, 0x4, @empty, 0x8}}}, &(0x7f0000000680)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000006c0)={r8, 0x2, 0xe, "4de80ca7316ccf7bc9a42d2a4a2d"}, 0x16) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x3) capset(&(0x7f0000000700)={0x20071026, r2}, &(0x7f0000000740)={0x9, 0x6, 0x7fffffff, 0x6, 0x1, 0x5}) fanotify_init(0x0, 0x181002) r9 = eventfd(0x100000000) fremovexattr(r9, &(0x7f0000000780)=@random={'trusted.', '\x00'}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000007c0)={r8, 0x3, "e21a4b"}, &(0x7f0000000800)=0xb) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x1d3400, 0x0) accept(r10, &(0x7f0000000880)=@hci={0x1f, 0x0}, &(0x7f0000000900)=0x80) setsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@loopback, 0x4e20, 0xb5c, 0x4e21, 0xfffffffffffffe01, 0xa, 0x80, 0x80, 0x29, r11, r3}, {0x1, 0x3fe6, 0x9, 0x2, 0x49aa, 0x86b6, 0x60, 0x1}, {0x0, 0x60f, 0x1, 0x80000001}, 0x7, 0x0, 0x1, 0x1, 0x2}, {{@in6, 0x4d3, 0xff}, 0x2, @in=@loopback, 0x0, 0x4, 0x1, 0x8000, 0x7c99, 0x9, 0x800}}, 0xe8) ioctl$EVIOCGKEYCODE(r10, 0x80084504, &(0x7f0000000a40)=""/134) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r10, &(0x7f0000000c80)={0x1f8, 0xfffffffffffffff5, 0x2, [{{0x3, 0x2, 0x3f, 0x5, 0x134d, 0x1, {0x0, 0x4, 0x5, 0x81, 0xcee1, 0x1, 0xfffffffffffffffa, 0xbcad, 0x3, 0x8, 0x4, r12, r13, 0x5, 0xa937}}, {0x6, 0x9, 0x8, 0x7fff, 'trusted.'}}, {{0x6, 0x3, 0xb6, 0x40, 0x400, 0x7, {0x2, 0x88, 0xb34d, 0x7, 0x0, 0x8, 0x3f, 0x8, 0x3f, 0x1, 0x0, r3, r4, 0x1, 0xb85d}}, {0x2, 0x800, 0xa, 0x0, '/dev/null\x00'}}, {{0x2, 0x0, 0x3, 0xec9b, 0x3, 0x0, {0x6, 0x0, 0x5b42, 0x1, 0x3ff, 0x100000000, 0x8, 0x8dc, 0x46e, 0x2, 0x8001, r12, r4, 0x80000000, 0x6}}, {0x4, 0x81, 0x1, 0x11a, '\x00'}}]}, 0x1f8) [ 270.301457] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.309841] team0: Port device team_slave_0 added [ 270.658659] IPVS: ftp: loaded support on port[0] = 21 [ 270.735811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 270.744094] team0: Port device team_slave_1 added [ 271.139264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 271.146570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.155787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.506589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 271.513835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.522590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.959778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 271.967598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.976738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.374121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.381941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.390887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.812248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.600202] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.340670] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.347340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.355171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:13:53 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4000, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz0\x00', {0x7, 0x100000001, 0x7ff, 0x2}, 0x9, [0xc23, 0x101, 0x0, 0x9, 0x2, 0x2, 0x2, 0x44, 0x0, 0x4, 0x2, 0x3ff, 0x3, 0x6, 0x101, 0x8, 0x80000001, 0x0, 0x9, 0x3, 0x1000, 0xffffffff7fffffff, 0xca7c, 0x7fff, 0xff, 0x1, 0x854, 0x4, 0x3, 0x3, 0x80000000, 0x2, 0xa4, 0xb32, 0x5, 0x0, 0x6, 0xa29, 0x6, 0x4fb, 0x3, 0xd8cd, 0xdf, 0x7, 0x7, 0xffffffff, 0x3, 0x5, 0x9, 0x8, 0x3, 0x1ff, 0x7, 0x401, 0x145, 0x7ff, 0x10001, 0xfffffffffffffffc, 0x7fff, 0x13, 0x89ce, 0xad9, 0x1, 0x7fff], [0x7f, 0x3, 0x4972, 0x38000, 0x3f, 0xffffffffffffffff, 0x3c, 0x7, 0x5, 0xffffffffffffff81, 0x9, 0x6, 0x2, 0x200, 0x75, 0xfffffffffffffffc, 0x1, 0x0, 0x3, 0x401, 0x1, 0x7, 0x7, 0x80000001, 0x6, 0x7, 0x5, 0xfaf9, 0x1, 0x0, 0xbbd2, 0x22fd, 0x8, 0xfffffffffffffffa, 0x8, 0x8, 0x7fff, 0x1, 0x5, 0x3, 0x8001, 0x8000, 0x914, 0x0, 0x7fffffff, 0x8, 0x2, 0xffffffff, 0xff, 0x3f, 0x400, 0x3, 0xb72, 0x4, 0xc0000000, 0x5, 0x6, 0x3ff, 0x9, 0xffffffff, 0x5, 0x7fff, 0x149, 0x1c000000], [0x85d, 0x9, 0xff, 0x1cb, 0x0, 0x0, 0x7ff, 0x80000000, 0x4a, 0x9, 0x514, 0x3, 0x1c98, 0x0, 0x7, 0x1, 0x20, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x5, 0x8000, 0x400, 0x5, 0x7fffffff, 0x401, 0x6, 0x1, 0x8, 0x100000000, 0x5, 0x200, 0xfffffffffffffffa, 0x3, 0x4, 0x6170, 0x3, 0x62b9, 0x1, 0x20, 0x7ff, 0x81, 0x0, 0x8, 0x8000, 0x5, 0x0, 0x600, 0xbb, 0x7, 0x6, 0x1b67, 0x1, 0x7f, 0x7, 0xfffffffffffffff9, 0x8, 0x5, 0x3e, 0xffffffff, 0x0, 0x10000, 0xffffffffffffffff], [0x5, 0x1, 0x3ff, 0x10001, 0x80, 0x5, 0x2, 0x9, 0x4121, 0x5, 0x1f, 0x4, 0x6, 0x400, 0x2, 0x2, 0x8, 0x0, 0x5, 0x67c, 0xfff, 0xfff, 0x8, 0xfffffffffffffc01, 0x6b, 0x7f, 0x2, 0x1f, 0x101, 0xc64, 0x0, 0x1, 0x7b17, 0x6, 0x7fff, 0xa69, 0x2a929a35, 0x20f4dd6c, 0x0, 0x0, 0x5, 0x7f, 0x3, 0x7a, 0x9e3, 0x4, 0x7, 0x0, 0x9, 0x8001, 0x90, 0x400000000, 0xfffffffffffffff7, 0x400, 0x7fff, 0x8, 0xffffffffffff0000, 0x40, 0x0, 0x101, 0x100000000, 0xffffffffffff1254, 0x1, 0x1ff]}, 0x45c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000240)={0x3, 0xa2c6}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000140)) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11], [], @remote}}]}]}, 0x2c}}, 0x0) getsockopt$inet6_int(r1, 0x28, 0x0, &(0x7f0000000740), &(0x7f0000000000)=0x38af0c09) [ 277.196480] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.203043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.209977] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.216588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.225092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 23:13:54 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4000, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz0\x00', {0x7, 0x100000001, 0x7ff, 0x2}, 0x9, [0xc23, 0x101, 0x0, 0x9, 0x2, 0x2, 0x2, 0x44, 0x0, 0x4, 0x2, 0x3ff, 0x3, 0x6, 0x101, 0x8, 0x80000001, 0x0, 0x9, 0x3, 0x1000, 0xffffffff7fffffff, 0xca7c, 0x7fff, 0xff, 0x1, 0x854, 0x4, 0x3, 0x3, 0x80000000, 0x2, 0xa4, 0xb32, 0x5, 0x0, 0x6, 0xa29, 0x6, 0x4fb, 0x3, 0xd8cd, 0xdf, 0x7, 0x7, 0xffffffff, 0x3, 0x5, 0x9, 0x8, 0x3, 0x1ff, 0x7, 0x401, 0x145, 0x7ff, 0x10001, 0xfffffffffffffffc, 0x7fff, 0x13, 0x89ce, 0xad9, 0x1, 0x7fff], [0x7f, 0x3, 0x4972, 0x38000, 0x3f, 0xffffffffffffffff, 0x3c, 0x7, 0x5, 0xffffffffffffff81, 0x9, 0x6, 0x2, 0x200, 0x75, 0xfffffffffffffffc, 0x1, 0x0, 0x3, 0x401, 0x1, 0x7, 0x7, 0x80000001, 0x6, 0x7, 0x5, 0xfaf9, 0x1, 0x0, 0xbbd2, 0x22fd, 0x8, 0xfffffffffffffffa, 0x8, 0x8, 0x7fff, 0x1, 0x5, 0x3, 0x8001, 0x8000, 0x914, 0x0, 0x7fffffff, 0x8, 0x2, 0xffffffff, 0xff, 0x3f, 0x400, 0x3, 0xb72, 0x4, 0xc0000000, 0x5, 0x6, 0x3ff, 0x9, 0xffffffff, 0x5, 0x7fff, 0x149, 0x1c000000], [0x85d, 0x9, 0xff, 0x1cb, 0x0, 0x0, 0x7ff, 0x80000000, 0x4a, 0x9, 0x514, 0x3, 0x1c98, 0x0, 0x7, 0x1, 0x20, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x5, 0x8000, 0x400, 0x5, 0x7fffffff, 0x401, 0x6, 0x1, 0x8, 0x100000000, 0x5, 0x200, 0xfffffffffffffffa, 0x3, 0x4, 0x6170, 0x3, 0x62b9, 0x1, 0x20, 0x7ff, 0x81, 0x0, 0x8, 0x8000, 0x5, 0x0, 0x600, 0xbb, 0x7, 0x6, 0x1b67, 0x1, 0x7f, 0x7, 0xfffffffffffffff9, 0x8, 0x5, 0x3e, 0xffffffff, 0x0, 0x10000, 0xffffffffffffffff], [0x5, 0x1, 0x3ff, 0x10001, 0x80, 0x5, 0x2, 0x9, 0x4121, 0x5, 0x1f, 0x4, 0x6, 0x400, 0x2, 0x2, 0x8, 0x0, 0x5, 0x67c, 0xfff, 0xfff, 0x8, 0xfffffffffffffc01, 0x6b, 0x7f, 0x2, 0x1f, 0x101, 0xc64, 0x0, 0x1, 0x7b17, 0x6, 0x7fff, 0xa69, 0x2a929a35, 0x20f4dd6c, 0x0, 0x0, 0x5, 0x7f, 0x3, 0x7a, 0x9e3, 0x4, 0x7, 0x0, 0x9, 0x8001, 0x90, 0x400000000, 0xfffffffffffffff7, 0x400, 0x7fff, 0x8, 0xffffffffffff0000, 0x40, 0x0, 0x101, 0x100000000, 0xffffffffffff1254, 0x1, 0x1ff]}, 0x45c) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000240)={0x3, 0xa2c6}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000140)) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x4, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x11], [], @remote}}]}]}, 0x2c}}, 0x0) getsockopt$inet6_int(r1, 0x28, 0x0, &(0x7f0000000740), &(0x7f0000000000)=0x38af0c09) 23:13:54 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x141000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffffffffff8, 0x1ff, "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", 0x6a, 0x4, 0x200, 0x5, 0x3b, 0x4, 0x1}, r1}}, 0x128) syz_emit_ethernet(0x2c5, &(0x7f00000002c0)=ANY=[@ANYBLOB="0180c2000000ffffffffffff0800460002b7000000000001907800000000ffffffffcf0200000c20880b00a700026e50b76c4c76b58fa82f820d1849e6ff3769d095351047b4738bc6cc55fa0bf7c67875b0d119dc8fa4af1bf8d6585a3768927c09c05e90684400453778c6de25e4e8095e5cfd56d2c70cb6fd03029d9cca2cdea312e472fe46b5897c98cb91ccc31a037c4ef13f88bf93fe2d00ce4a8755efd1acd2cd1c53273854a90bdd97e764c654e8303a6e59af7930fe6dda7623623e8d2af79228dad901e103baec16c931349b60878aca0400080091dba3c01d65241dcea37e427a65f33a38cf759f351cd89a1b77c576d4ff141a818305010086ddc66e1dae0b9745f95d793726cfd837d3ac647867da941f6e49bbdee33fefe9964dc207e113c5bc7ceca5c395aad9af33db63c264e6fa57a6a88a5a431f03a1ed664416e2416771cf12110418872f43267ed86989b869531adcf0c53b4991918690366e2dfa5b3dfc0399564a8d7fc9641a350afec5def273e9d75a5d372cd1e929e4a29ab4da8fda14cb837858ba60249e6ec7a0c0fb22b74033ee26f027f246a02a888bcb9cbd0a76a058d664af6b339daa07f2f18ce2df5e2ba5002a149fdc73b35b397fdf74a92aba78b379659909a0829b02f13651b9b71cc4e6501c14801e57b67b2bb6ac0b1df634080088be0000000411f775010100000000000001080022eb0000000228030d01020000000000000300007f0308006558000000016e93747f00cdebca3f0e0d9366ffafa3af58432397629f9474b49169348930c35ad0b3f1c9b71a7788ff516367b7866a67eccf4cd62fa989e588226e84162d9e5bd8014c355f7b4d19d7638a2894e8a73dcbbbe063f77630aa2bbf68333d28e77882c4edeef9722e6ed00d8978f10bc6d0c4e8037946723fe6b6990f5c854df5a10aa15d0f8966c755d2a8c1f29fc9d3c1b5b90318a6000235462864ab967ef071cb081d68ce"], &(0x7f00000000c0)={0x1, 0x4, [0x497, 0x3f7, 0xa3c, 0x16e]}) [ 277.770016] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.776781] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.785278] device bridge_slave_0 entered promiscuous mode [ 277.804356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.929860] 8021q: adding VLAN 0 to HW filter on device team0 23:13:55 executing program 0: r0 = open(&(0x7f0000000280)='./file0\x00', 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10) r1 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x996, @dev={0xfe, 0x80, [], 0xc}, 0xffffffffffffff81}, @in6={0xa, 0x4e20, 0x8000, @remote, 0xff}, @in6={0xa, 0x4e24, 0x2, @loopback, 0x8001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, @in6={0xa, 0x4e24, 0xfe51235, @ipv4={[], [], @broadcast}, 0x3}], 0x80) sendmsg$key(r1, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, &(0x7f00000001c0)=0x10, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bic\x00', 0x4) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000240)) [ 278.405661] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.412406] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.420860] device bridge_slave_1 entered promiscuous mode 23:13:55 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4040, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x6) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080046000020000400000000907800000000ffffffff0003850000009078ac1414bb52c63aff78ecee195eb6f6f2d43fb862516a8172430392f682729af440c15c82b6df6f"], &(0x7f00000001c0)) [ 278.834733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 23:13:56 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x20000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0xd5bd, 0xd8, 0x1, 0x9, 0x7f}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) r2 = fcntl$dupfd(r1, 0x4, r1) futimesat(r2, 0x0, 0x0) [ 279.254659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:13:56 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x3, 0x1ff, 0x6}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x53, r0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x100000, 0x0, 0x19013, r0, 0x0) 23:13:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote, 0x7ff}, 0x1c, &(0x7f00000014c0), 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x4bf6, @mcast1, 0x100000001}}, [0x3, 0x9, 0x3f, 0x0, 0x2, 0x20, 0x1ff, 0x1, 0x7, 0x100000000, 0x30, 0x4, 0x3000000000000000, 0x4, 0xad8]}, &(0x7f00000002c0)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r1, 0x2, 0xc1, "d5d906105afde29c7c7bb23b0b6656702f7fc356392f91b4f2f7f571cdfc44204ce4b06adc632fc141888335a89e4dda462f233d99066db72567f16309e51e961b9dd14c4437ab70a6efdc7da22ae5da2f2cc4ad5d0b0fb74c80403322058f2a40dc8f157565469a92582e5a0e73d7eeb108e03699554785ffccdaa021afcf39655ad8df6bd160539027d0d407d37a9825a1975453246f7d952e54f6a89280566913ad486279977b393615d53301bc23c894abcb1f66348fa33c654d397cfa5d0d"}, 0xc9) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1000, 0x101000) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0xad8}) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000140)={0xffff, 0x100, 0x24, 0xfff, 0x5, 0x7}) [ 280.614633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 280.920441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.240630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 281.247831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.516518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.523782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.316981] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.325268] team0: Port device team_slave_0 added [ 282.596404] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.604748] team0: Port device team_slave_1 added [ 282.904124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 282.911341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.920835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.233443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 283.240506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.249395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.460150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.553561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 283.561431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.570580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.862914] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 283.870765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.879688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.490081] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.517737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.524262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.532388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:14:03 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/75, 0x4b) [ 286.631934] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.895574] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.902150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.909097] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.915713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.924123] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 286.932616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.160825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.843247] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.770674] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.777354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.785310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.492723] 8021q: adding VLAN 0 to HW filter on device team0 23:14:08 executing program 2: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x110111, r0, 0x0) [ 294.708068] 8021q: adding VLAN 0 to HW filter on device bond0 23:14:12 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000000)=0x1c, 0x4) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000240)=[{0x28, 0x29, 0x2, "2b07df2fd0846bc0964f4ffde3d917e30d"}], 0x28}}], 0x1, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000040)) [ 295.332853] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 295.722805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 295.729060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.737095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.028842] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.884766] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 23:14:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000022ff1)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) exit(0x6) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 23:14:15 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@remote, 0x25, r1}) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = socket$netlink(0x10, 0x3, 0xb) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000180)="10fe1105e9dd26ee0bd835b9a7edbef1d28bd9571c9427fbe1fc771fc435dfc0b4e5a1d8fa7f1f6bd6bdd0941acd293311ff46809c3194476aa5f11a67f8ba2d4136a1d062bc8a44760b26f3e68b3120164e32ad4f82c16e9bed6f9731da715b6cfbd1c6de50c254b85bea4f49367f8fba691c773bf368afaf6640ac31724be6d6f6240f34ac1b3331d7cd828a555879fcccab750a3309d75b2932bd0bd256c9", 0xa0}], 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x9, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000300)={r3, 0xee, 0x10, 0x4, 0x7fffffff}, &(0x7f0000000340)=0x18) r5 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x15e, 0x0) write$P9_RVERSION(r0, &(0x7f00000003c0)={0x13, 0x65, 0xffff, 0x9, 0x6, '9P2000'}, 0x13) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={r4, @in6={{0xa, 0x4e24, 0x81, @ipv4={[], [], @rand_addr=0x3}, 0x80000000}}, [0x8, 0xc23, 0x438e, 0x0, 0x350d, 0x5, 0x0, 0x1, 0xfffffffffffffff9, 0x1, 0x1, 0x7, 0x9, 0x7, 0x7]}, &(0x7f0000000580)=0x100) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000005c0)={'nat\x00', 0xa0, "f90468fab7ed8ac35f999461d12ce1d46d8dc3a993bd269b7c4e4c1b9dee5a7212953c88d55521c4ea6d455894bf3010175caff43e2e07b90df0a142978c1f1c45fbd5c269df96e26031c740645d83eed650bf1ec8fdbc6d9c0db8749a7d232076d8740fc984c41ee19e521c897badf74aea7a2ecb80b577dc7a7ed50cc00e1c65b183a20ec571770ccaa56f1f6d104400fa47754272ef3e7dec10e53a7fb646"}, &(0x7f00000006c0)=0xc4) write$P9_RWRITE(r5, &(0x7f0000000700)={0xb, 0x77, 0x2, 0x6}, 0xb) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000740)={r4, @in={{0x2, 0x4e21, @multicast1}}}, 0x84) ioctl$KDSETMODE(r0, 0x4b3a, 0x8) ioctl$SG_GET_NUM_WAITING(r5, 0x227d, &(0x7f0000000800)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000840)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000880)={0x9, 0x8, 0x3, 0x3, [], [], [], 0x1000, 0x7f, 0x2, 0x4, "9fa907f2bb19c7d59772fc4490f7d23a"}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000a00)={0x9, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e21, @loopback}, 0x1, 0x8001, 0xb55, 0xfffffffffffffffe, 0xffffffffffffffff, &(0x7f00000009c0)='ip6gre0\x00', 0x8c, 0x20, 0x5}) ioctl$KVM_GET_NESTED_STATE(r5, 0xc080aebe, &(0x7f0000000a80)={0x0, 0x0, 0x2080}) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0xf25) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x1000, 0xfffffffffffffbff, 0x0, 0x4, 0x19, 0x0, "43d724be44347e85e28f0b55f8488ea1995424a882e8d7884f63978666d3ca7b7abdc1f686bdb4d4a79e9f840fcc19d4cbc313e2765c09301fc975fd5c92741b", "41b7f5aabba169cfb98c0b0a90202e77468e8b95796bef66c839a36f69a1ce6d85363ab22298e988cfa4af51cda296f46480501ea792de0915a80138d9ddad08", "67607c7665ba8fb29d4567935553fd5e78a76172b36deb62e90ee9ca195dda46", [0x124, 0x7fffffff]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000002c00)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c80)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r5, &(0x7f0000002d40)={&(0x7f0000002c40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002d00)={&(0x7f0000002cc0)={0x24, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000002d80)={0x2513, 0xffffffffffffff00, 0x6a}) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000002dc0)={r3, 0x8, 0xffffffff, 0x0, 0x7, 0xca8, 0x7, 0x8, {0x0, @in={{0x2, 0x4e20, @local}}, 0x3, 0x1000, 0x1, 0x2, 0x4}}, &(0x7f0000002e80)=0xb0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000002ec0)={0x3, 0x5}) 23:14:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$netlink(r1, &(0x7f0000000140)=@proc, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r3 = dup(r2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000040)={0x0, 0xfffffffffffffff9}) 23:14:15 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="84790c408437496d69b47700207578000040a000000000000000000022ca808f857dc918b05a30748cf8cfb382f56a4bdc9c91f85818d14225112cc70c3070ad283dfb34477260d491251d2ad4f331667bc14f6637b1a06131ec18b83b1db08d62677dee7eab05656d2fcb15ffff9dfac9e6cbaf2b5ef585da2907af9ae452eea47e1496931c098e6521db3298a6938ce6226ffe408c31dbe55edf3a43a631470f583cab299f09e897f6fb95e54b7624cbf74d4ce4cc095e3bcbf60b5c3de843feb1c96008102346901b96765755b16496f400b8779e0794cf8b25f5ba0b14c4680b03d3d3813b53ff06aa39c4202ea4d338d68af785372f427816173fa1a8bd8393a5f5c67e0419d1a3d841a69a147386ccb40a29a0e1525c5d280f928886d465ae1c9866eafc9e6820fc9ebe8f00979531b6ccbebc0676dd51dd5ead073f53753d527ed7c35de8"], 0x13) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x408080, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xb, 0xfffffffffffffff7, 0x8001, 0x46e2}, 0x7}, 0xffffffffffffff97, 0x1, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) quotactl(0x8, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000003c0)) 23:14:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0), 0x228, 0x0, 0xfffffffffffffdab}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000040)=@ax25={0x3, {"9505497aae7605"}, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="147e20df2941ee970ac36e73eee8a673a41c969cb062db8cb6bd469094999d830aaf3957a79839567969e4c65e10d6f13aba5de7eddb6dc54dce2287f2ec9086b8691cc5cc9794", 0x47}, {&(0x7f0000000140)="c91f0fbabf87", 0x6}, {&(0x7f0000000180)="243ac42abe290dbe5e7b3ca92142d33bf67a56b5b4fcffef3918dd7adbf13fd0597752ba81d833a055e57f0e237e9f522b1e3ccc2072c3bfcfebab90651df3b87b4c8393f5f8e08c947f1205a1e7da05ec0e5fb610477a564087a9c280fbc098625248544a95b2d0e5b8d184606bd917031c918e7c0a6f8ce7e47135e08e7cf46254cfbdd462f308e88b883cf7c26f7a5f5a9592d6be80e397df8cba69b62202745b6d232711c0bad727015d69575fe908709d7fab5a0be557ea9dbaacc162817f9818e18902b43529501c9aafd10e4cbbfcbadf6f2021f4229b285d722d2f94534b", 0xe2}], 0x3, &(0x7f0000000380)=[{0x58, 0x109, 0x5, "e7a75ff419e95246912d4e0592b0319d50d05ae0ba5acdb4b913dee950d5e42a40411ec10f75a063fa024fdbc3f57303fe7cb5d5184acedd1ede47aa0ab50b33904611"}, {0x98, 0x110, 0x1, "edd2fc01660381541d4caee64f3b334f35364e8a28557f87eb294b121cdb0ad3abb46f08bf8c97b6924d9b4fbee5beccd111b8731d8b805579cfdc74ae866e4900b32f44b0309bd4695b8e6135395aee46d516b001fa8a6f34236ec5459078e706ef6394f1d063bb66db8ea74524dea0d22ae9cfaee5631da36413ab8cf673633cce"}, {0x88, 0x101, 0xffffffffffff216b, "8c5a36575ff384c126a79ff88fadb05765d4c48fe4464e24b9c69833f9e78e05aab414409ebdbc18717afc37b0d0aa448d6255d6fa5f75f5de11f5584ad9c4b0be30fa9cce516590232c01c790c37a01c1dcf1819d9b2c5daa8a96e97847ff223c55244d0f6ec338c1e43c5880fbf0c5907834ed82e849"}], 0x178, 0x4000000}, 0x800) 23:14:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400000000, 0x52000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000006004000058020000000000000000000078fa3d00780300007803000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f000001e0000001080000000000000000000000ac1414aaffffff0000000000c08b1c99a501000000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffff0000000000000000000000000a65fffe000400ff00080004766c616e3000000000000000000000006270713000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000400000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000104000000008000009f000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4b0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000580)={0x0, 0x35}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000600)={r2, 0x7400000000000, 0x30}, &(0x7f0000000640)=0xc) syz_emit_ethernet(0x1019f, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x7fe545227c00, 0x11, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff88]}, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000000000)) 23:14:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x1, 0x0, 0x2, {0x0, 0x0, 0xbd, 0xfffffffffffffff7}}) 23:14:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc0cc5605, &(0x7f0000000000)={0x1}) 23:14:15 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x1, 0x0, 0x2}) 23:14:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xff4c) 23:14:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x103d}, 0x2c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000000), 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 23:14:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000001500)="6f6f6d5f73636f72655f61646a00586ee09e054e6422112e867a3f713427a5fde609c23bc7922eb1487c12593871ef8525481f058abc0bea5716d559674c67fc7a825ce4abaebc53fd717cb5afd5ae") lseek(r0, 0x0, 0x1) 23:14:16 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x1, 0x2}) [ 299.373747] IPVS: ftp: loaded support on port[0] = 21 [ 300.677649] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.684167] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.692120] device bridge_slave_0 entered promiscuous mode [ 300.769968] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.776470] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.784467] device bridge_slave_1 entered promiscuous mode [ 300.861869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 300.939558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 301.170634] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.252947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 301.404462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 301.411447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.644695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.652873] team0: Port device team_slave_0 added [ 301.731085] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 301.738788] team0: Port device team_slave_1 added [ 301.818010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.898641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.981749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 301.989095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.998315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.070305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.077658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.086787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.954080] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.960494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.967507] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.973969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.982093] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 303.351832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.261704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.562913] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 306.856515] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 306.862798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.870458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.167381] 8021q: adding VLAN 0 to HW filter on device team0 23:14:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0xc1105518, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "1ef4bc48491acd5e0c4b976cba7eef36c40efce39f2b9c125ba7a77d8dd019d6041e65648e7f165944391be5"}) 23:14:26 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x400000085, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x4020000000) 23:14:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000200)=0x4) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x80003, 0x100000001) ioperm(0x8000071b97d07, 0xa0e, 0xb6) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 23:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="58000000140019233a834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb178}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x3) 23:14:26 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={"6e6174000000000000000000000000000000000000000000000000001000"}, &(0x7f0000000200)=0x54) 23:14:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000014010a0002000000000000000000"], 0x1}}, 0x0) [ 309.166525] IPVS: ftp: loaded support on port[0] = 21 [ 309.265406] hrtimer: interrupt took 41559 ns 23:14:26 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000180)=@l2={0x1f, 0xffffdd86, {0x9}}, 0x80}, 0x0) 23:14:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r3 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x200000) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000340)=0x6, 0x2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2004002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x6c, r4, 0x0, 0x0, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x200000) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000000)={'team_slave_0\x00'}) [ 309.574913] IPVS: ftp: loaded support on port[0] = 21 23:14:26 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000002c0)={0x0, @reserved}) 23:14:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f00000013c0)=0x401, 0x4) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r0, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 23:14:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x801, 0x0) io_setup(0xc02, &(0x7f0000000200)=0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)={0x1ff, 0x0, 0x0, {0x0, 0x989680}}) io_submit(r3, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2}]) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000040)}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), 0x0) io_submit(r3, 0x1, &(0x7f0000000680)=[&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000540)}]) 23:14:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0x2) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000000)="6e65742f72617700f0e2") sendfile(r1, r2, &(0x7f0000000180), 0x100000001) 23:14:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000080)="f4ded40fe2ac68000fc799070066b8000000000f23d00f21f86635000000080f23f80f01ca660f380745000f01df647ff166b8010000000f01c1", 0x3a}], 0x1, 0x0, &(0x7f00000000c0), 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0x8000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000002c0)={r4}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000000c0)="66b9490b000066b8a800000066ba000000000f30440f20c066350c000000440f22c0360f01590066b9800000c00f326635000100000f30660f383f4b070f01ddf20f58b601000f201f3e0f21d90fd3dc", 0x50}], 0x1, 0x5c, &(0x7f0000000180), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000300)="ad0f01c2660ffe93c7000f08660f0ff4960fc75decdc7700ba4300b81df9ef0f00190f2168", 0x25}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000280)={0x0, 0x0, 0x100000001, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 310.217302] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:14:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) 23:14:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0xf0ffffff}, [@NDA_LLADDR={0xa, 0x2, @empty=[0xf0ffffff]}]}, 0x28}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) [ 310.556004] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 310.860053] ================================================================== [ 310.867497] BUG: KMSAN: uninit-value in memcmp+0x117/0x180 [ 310.873152] CPU: 0 PID: 8022 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #72 [ 310.880364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.889737] Call Trace: [ 310.892374] dump_stack+0x306/0x460 [ 310.896059] ? memcmp+0x117/0x180 [ 310.899591] kmsan_report+0x1a2/0x2e0 [ 310.903444] __msan_warning+0x7c/0xe0 [ 310.907291] memcmp+0x117/0x180 [ 310.910631] dev_mc_add_excl+0x165/0x770 [ 310.914746] rtnl_fdb_add+0xe83/0x12a0 [ 310.918730] ? rtnl_dump_all+0x540/0x540 [ 310.922834] rtnetlink_rcv_msg+0xa53/0x1590 [ 310.927232] ? __msan_poison_alloca+0x17a/0x210 [ 310.931946] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.936850] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.941737] ? kmsan_set_origin+0x83/0x140 [ 310.946026] netlink_rcv_skb+0x394/0x640 [ 310.950180] ? rtnetlink_bind+0x120/0x120 [ 310.954390] rtnetlink_rcv+0x50/0x60 [ 310.958142] netlink_unicast+0x166d/0x1720 [ 310.962430] ? rtnetlink_net_exit+0x90/0x90 [ 310.966825] netlink_sendmsg+0x1391/0x1420 [ 310.971130] ___sys_sendmsg+0xe47/0x1200 [ 310.975232] ? netlink_getsockopt+0x1560/0x1560 [ 310.979955] ? __fget+0x8f7/0x940 [ 310.983471] ? __fdget+0x318/0x430 [ 310.987063] __se_sys_sendmsg+0x307/0x460 [ 310.991276] __x64_sys_sendmsg+0x4a/0x70 [ 310.995377] do_syscall_64+0xbe/0x100 [ 310.999219] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.004462] RIP: 0033:0x457569 [ 311.007683] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.026613] RSP: 002b:00007f1b55aabc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 311.034398] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 311.041700] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005 [ 311.048989] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 23:14:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) [ 311.056288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b55aac6d4 [ 311.063578] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 00000000ffffffff [ 311.070857] [ 311.072485] Uninit was created at: [ 311.076056] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 311.081187] kmsan_kmalloc+0xa4/0x120 [ 311.085012] kmsan_slab_alloc+0x10/0x20 [ 311.089011] __kmalloc_node_track_caller+0xb43/0x1400 [ 311.094249] __alloc_skb+0x422/0xe90 [ 311.097999] netlink_sendmsg+0xcaf/0x1420 [ 311.102177] ___sys_sendmsg+0xe47/0x1200 [ 311.106275] __se_sys_sendmsg+0x307/0x460 23:14:28 executing program 2: r0 = memfd_create(&(0x7f0000000100)="885d292b00", 0x0) write(r0, &(0x7f0000000080)=')', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0xa00002) sendfile(r0, r0, &(0x7f0000000140), 0xff8) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000003400)='./bus\x00') [ 311.110450] __x64_sys_sendmsg+0x4a/0x70 [ 311.114537] do_syscall_64+0xbe/0x100 [ 311.118378] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.123585] ================================================================== [ 311.130964] Disabling lock debugging due to kernel taint [ 311.136434] Kernel panic - not syncing: panic_on_warn set ... [ 311.136434] [ 311.143842] CPU: 0 PID: 8022 Comm: syz-executor3 Tainted: G B 4.19.0-rc8+ #72 [ 311.152440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.161816] Call Trace: [ 311.164440] dump_stack+0x306/0x460 [ 311.168119] panic+0x54c/0xafa [ 311.171395] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 311.176885] kmsan_report+0x2d3/0x2e0 [ 311.180737] __msan_warning+0x7c/0xe0 [ 311.184586] memcmp+0x117/0x180 [ 311.187928] dev_mc_add_excl+0x165/0x770 [ 311.192039] rtnl_fdb_add+0xe83/0x12a0 [ 311.195999] ? rtnl_dump_all+0x540/0x540 [ 311.200097] rtnetlink_rcv_msg+0xa53/0x1590 [ 311.204489] ? __msan_poison_alloca+0x17a/0x210 [ 311.209197] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.214108] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.219013] ? kmsan_set_origin+0x83/0x140 [ 311.223302] netlink_rcv_skb+0x394/0x640 [ 311.227397] ? rtnetlink_bind+0x120/0x120 [ 311.231587] rtnetlink_rcv+0x50/0x60 [ 311.235341] netlink_unicast+0x166d/0x1720 [ 311.239630] ? rtnetlink_net_exit+0x90/0x90 [ 311.244007] netlink_sendmsg+0x1391/0x1420 [ 311.248318] ___sys_sendmsg+0xe47/0x1200 [ 311.252428] ? netlink_getsockopt+0x1560/0x1560 [ 311.257136] ? __fget+0x8f7/0x940 [ 311.260736] ? __fdget+0x318/0x430 [ 311.264326] __se_sys_sendmsg+0x307/0x460 [ 311.268543] __x64_sys_sendmsg+0x4a/0x70 [ 311.272642] do_syscall_64+0xbe/0x100 [ 311.276476] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.281690] RIP: 0033:0x457569 [ 311.284918] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.303854] RSP: 002b:00007f1b55aabc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 311.311609] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 311.318912] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005 [ 311.326209] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.333510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b55aac6d4 [ 311.340804] R13: 00000000004c3afc R14: 00000000004d5bd0 R15: 00000000ffffffff [ 311.349187] Kernel Offset: disabled [ 311.352917] Rebooting in 86400 seconds..