[ 56.784394] audit: type=1800 audit(1539140868.829:28): pid=5988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.345774] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 60.487906] random: sshd: uninitialized urandom read (32 bytes read) [ 60.933052] random: sshd: uninitialized urandom read (32 bytes read) [ 62.828966] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. [ 68.665733] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/10 03:08:02 fuzzer started [ 73.168212] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/10 03:08:07 dialing manager at 10.128.0.26:44001 2018/10/10 03:08:07 syscalls: 1 2018/10/10 03:08:07 code coverage: enabled 2018/10/10 03:08:07 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/10 03:08:07 setuid sandbox: enabled 2018/10/10 03:08:07 namespace sandbox: enabled 2018/10/10 03:08:07 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/10 03:08:07 fault injection: enabled 2018/10/10 03:08:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/10 03:08:07 net packed injection: enabled 2018/10/10 03:08:07 net device setup: enabled [ 78.738551] random: crng init done 03:09:58 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x0) [ 186.761464] IPVS: ftp: loaded support on port[0] = 21 [ 189.117198] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.123751] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.132382] device bridge_slave_0 entered promiscuous mode [ 189.275645] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.282193] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.290537] device bridge_slave_1 entered promiscuous mode [ 189.428854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.566960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 03:10:02 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffbfffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) recvmmsg(r0, &(0x7f0000009ec0)=[{{&(0x7f00000001c0)=@nl=@proc, 0x80, &(0x7f0000001300), 0x0, &(0x7f0000001340)=""/243, 0xf3}}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f00000026c0)=""/236, 0xec}], 0x1, &(0x7f0000003800)=""/18, 0x12}}], 0x2, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 189.990705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.188302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.471284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 190.478442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.929454] IPVS: ftp: loaded support on port[0] = 21 [ 191.053699] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 191.061759] team0: Port device team_slave_0 added [ 191.363064] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 191.371069] team0: Port device team_slave_1 added [ 191.581985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 191.589157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.598150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.796691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 191.803846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.812908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.106039] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.113881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.123059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.306255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 192.313951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.323181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.156233] ip (6270) used greatest stack depth: 53056 bytes left [ 194.294789] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.301286] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.309778] device bridge_slave_0 entered promiscuous mode [ 194.574620] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.581131] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.589890] device bridge_slave_1 entered promiscuous mode [ 194.885138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.086479] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.093073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.099994] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.106686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.115670] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 195.165115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.652412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:10:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket(0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x8) shutdown(r0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 195.958585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.291076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.666931] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 196.678217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.717624] IPVS: ftp: loaded support on port[0] = 21 [ 196.935310] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.942493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.712337] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.720454] team0: Port device team_slave_0 added [ 198.047202] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.055348] team0: Port device team_slave_1 added [ 198.383749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 198.390811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.399760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.757518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 198.764734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.773651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.108017] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.115734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.125149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.336666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.344500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.353482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.467721] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.474496] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.483316] device bridge_slave_0 entered promiscuous mode [ 201.788991] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.795678] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.804218] device bridge_slave_1 entered promiscuous mode [ 202.120321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.365953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.683398] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.689924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.696959] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.703466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.712416] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.173033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.290023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.648678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.913836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 203.920978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 03:10:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001900010200000000000000001d0100002c000300217b266c2e2c47504c276370757365746eab6465762128a2609653901f401b3123bf5e5b00aae40fffd1242f87a5bcda8d1653390ad31e94590e9837080dd8392d9b"], 0x1}}, 0x0) [ 204.240248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.248017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.280669] IPVS: ftp: loaded support on port[0] = 21 [ 205.438753] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.447207] team0: Port device team_slave_0 added [ 205.802614] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.810754] team0: Port device team_slave_1 added [ 206.203903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.210965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.220091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.543331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.550365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.559086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.842718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.850267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.859383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.217285] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.224997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.234374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.609859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.005469] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.388340] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.394866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.402914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.180634] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.187250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.194267] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.200714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.209777] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.387652] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.394297] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.402929] device bridge_slave_0 entered promiscuous mode [ 211.682431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.799003] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.805622] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.814227] device bridge_slave_1 entered promiscuous mode [ 211.911306] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.071323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.425508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 03:10:25 executing program 4: creat(&(0x7f000078dff8)='./file0\x00', 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', &(0x7f0000000180)=""/134, 0x86) [ 213.670103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.012773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.388490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.395847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.701420] IPVS: ftp: loaded support on port[0] = 21 [ 214.865492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.872680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.103736] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.111724] team0: Port device team_slave_0 added [ 216.522334] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.530441] team0: Port device team_slave_1 added [ 216.933167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.940315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.949258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.377324] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.384508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.395419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.853920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.861856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.870834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.074327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.240823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.248758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.257909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.784402] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.170462] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.177125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.185380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:10:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'bridge0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@remote, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000006, r3}) [ 222.128651] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.135316] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.143788] device bridge_slave_0 entered promiscuous mode 03:10:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x2ed3, 0x1, 0x0, 0x1}, 0x2ab) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000)="fb", &(0x7f0000000140)=""/160}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7, 0x40000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={r1, &(0x7f00000003c0)="ab67060f4677d4ea34c76c7358578819a6add221f0dda78bcfd31876402d4b0dc79438f04cdf4072ff490feabc3360251f012e4cb852beea44eaffd0926613ac2870"}, 0x10) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000002c0)=0xfffffffffffffffd, &(0x7f0000000300)=0x4) r2 = openat(r1, &(0x7f0000000340)='./file0\x00', 0x280001, 0x4) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000380)=0x9f4a3ea) select(0x40, &(0x7f0000000080)={0x2, 0x5, 0x2, 0x3, 0x10001, 0x4, 0x80, 0x1}, &(0x7f00000000c0)={0x1ff, 0x8001, 0x101, 0x5, 0x200, 0x2, 0x6, 0x8}, &(0x7f0000000200)={0x4, 0x7f, 0x7ff, 0xfffffffffffffffe, 0x4, 0x60f, 0x80008000000000, 0x2}, &(0x7f0000000240)={0x77359400}) [ 222.589943] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.596619] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.605167] device bridge_slave_1 entered promiscuous mode 03:10:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)=',,mime_typenodev):%wlan0$)wlan0*\x00', 0x3) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x1) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000680)=[{0x10, 0x0, 0x1}], 0x10}}], 0x1, 0x0) [ 223.006373] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.125936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.332443] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.338958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.346012] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.352602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.361158] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:10:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e, 0xf0ffffffffffff}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="1000005e9066d228cf2f"], &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r3, 0x6, 0x1000}, 0x8) [ 223.556725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.617712] bridge_slave_0: FDB only supports static addresses [ 223.674586] bridge_slave_0: FDB only supports static addresses [ 223.973471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:10:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom(r0, &(0x7f0000000000)=""/84, 0x54, 0x10100, &(0x7f0000000080)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sm4\x00'}, 0x80) 03:10:36 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x200008930, &(0x7f0000000480)="153f448e0dfd7a64aa1a70a15e353a") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x101000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000000c0)=0xff) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="03000400080000020000"], 0xa, 0x0) 03:10:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x0, 0x10000) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x82, 0x0) socketpair$inet(0x2, 0x80000, 0x3, &(0x7f0000000200)) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000140)={0x4000000000000000, 0x0, 0x100, 0x1, 0x1c}) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=0x8) ioctl$KDDISABIO(r3, 0x4b37) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000080)={0xea2, 0x6, 0x8, 0x9}, 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, &(0x7f0000000100)=r4, 0x3) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, &(0x7f0000000180)={0x70, ""/112}) [ 224.994986] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.432518] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:10:37 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x2, 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000000)=""/174) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000000c0)={0x300a, 0x399d, 0xfffffffffffffffd, 0xc0}) [ 225.885901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.893195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.294102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.301196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.100957] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.109320] team0: Port device team_slave_0 added [ 227.421534] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.429972] team0: Port device team_slave_1 added [ 227.794631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.801680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.810650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.983614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.071576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.078826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.087519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.307353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.315138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.324026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.668792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.676467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.685456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.094785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.295229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.319597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.327914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:10:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 231.503918] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.752757] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.759247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.766283] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.772801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.781108] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.787809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.291248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.116591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 03:10:48 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8100000008b0f, &(0x7f0000000040)={'veth0\x00', @ifru_mtu=0x6a}) [ 236.989992] hrtimer: interrupt took 44616 ns [ 237.060170] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.066654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.074701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.695469] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.745862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.289347] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.835289] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.841721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.849630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:10:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000f40)=0x0) io_submit(r1, 0x1, &(0x7f0000000900)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x100, 0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x9}]) [ 241.427226] 8021q: adding VLAN 0 to HW filter on device team0 03:10:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x53}}, 0x18) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000140)="0501000005000000fffff000ffa2ada33f93820fd903378c", 0x18, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x8000000000004, @dev}, 0x1c) 03:10:55 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x1fffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x18) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x800, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x34228550, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) 03:10:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sessionid\x00') clock_gettime(0x0, &(0x7f0000006780)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000006500)=[{{&(0x7f0000000040)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/92, 0x5c}], 0x1, 0x0, 0x0, 0x9b5}, 0x401}, {{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/15, 0xf}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2, &(0x7f0000001200)=""/88, 0x58, 0x4}, 0x2}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/58, 0x3a}, {&(0x7f00000012c0)=""/247, 0xf7}, {&(0x7f00000013c0)=""/28, 0x1c}, {&(0x7f0000001400)=""/38, 0x26}, {&(0x7f0000001440)=""/228, 0xe4}, {&(0x7f0000001540)=""/137, 0x89}], 0x6, &(0x7f0000001680)=""/201, 0xc9, 0x7}, 0x19}, {{&(0x7f0000001780)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001800)=""/40, 0x28}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/132, 0x84}, {&(0x7f0000002900)=""/252, 0xfc}, {&(0x7f0000002a00)=""/75, 0x4b}, {&(0x7f0000002a80)=""/251, 0xfb}, {&(0x7f0000002b80)=""/169, 0xa9}], 0x7, &(0x7f0000002cc0)=""/68, 0x44, 0x7}, 0x100000000}, {{&(0x7f0000002d40)=@l2, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002dc0)=""/6, 0x6}, {&(0x7f0000002e00)=""/229, 0xe5}, {&(0x7f0000002f00)=""/23, 0x17}, {&(0x7f0000002f40)=""/9, 0x9}], 0x4, 0x0, 0x0, 0x3}, 0xfffffffffffffffa}, {{&(0x7f0000002fc0)=@nfc, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003040)=""/208, 0xd0}, {&(0x7f0000003140)=""/196, 0xc4}, {&(0x7f0000003240)=""/158, 0x9e}, {&(0x7f0000003300)=""/29, 0x1d}, {&(0x7f0000003340)=""/105, 0x69}, {&(0x7f00000033c0)=""/246, 0xf6}, {&(0x7f00000034c0)=""/193, 0xc1}, {&(0x7f00000035c0)=""/222, 0xde}, {&(0x7f00000036c0)=""/255, 0xff}], 0x9, 0x0, 0x0, 0x346}, 0x5}, {{&(0x7f0000003880)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003900)=""/50, 0x32}, {&(0x7f0000003940)=""/115, 0x73}, {&(0x7f00000039c0)=""/69, 0x45}, {&(0x7f0000003a40)=""/133, 0x85}, {&(0x7f0000003b00)=""/150, 0x96}, {&(0x7f0000003bc0)=""/165, 0xa5}], 0x6, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f0000005e40)=[{&(0x7f0000003d00)=""/52, 0x34}, {&(0x7f0000003d40)=""/253, 0xfd}, {&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/4096, 0x1000}], 0x4, &(0x7f0000005e80)=""/46, 0x2e}}, {{&(0x7f0000005ec0)=@ipx, 0x80, &(0x7f00000060c0)=[{&(0x7f0000005f40)=""/171, 0xab}, {&(0x7f0000006000)=""/118, 0x76}, {&(0x7f0000006080)=""/58, 0x3a}], 0x3, &(0x7f0000006100)=""/250, 0xfa, 0xfffffffffffffffb}, 0x4}, {{&(0x7f0000006200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006280)=""/92, 0x5c}, {&(0x7f0000006300)=""/205, 0xcd}, {&(0x7f0000006400)=""/87, 0x57}], 0x3, &(0x7f00000064c0), 0x0, 0x10001}, 0x3}], 0xa, 0x10000, &(0x7f00000067c0)={r1, r2+10000000}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000006800)={r3}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000006840)={0x5}) r5 = msgget(0x1, 0x400) msgrcv(r5, &(0x7f0000006880)={0x0, ""/4096}, 0x1008, 0x1, 0x1800) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000078c0)={0x0, r0, 0x4, 0x0, 0xa8b, 0x10000}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r6 = getpid() ptrace$setsig(0x4203, r6, 0x3ff, &(0x7f0000007900)={0x26, 0x3, 0x2, 0x9}) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) fstat(r4, &(0x7f00000079c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() mount$fuse(0x0, &(0x7f0000007940)='./file0\x00', &(0x7f0000007980)='fuse\x00', 0x20008, &(0x7f0000007a40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@pcr={'pcr', 0x3d, 0x40}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}}) write$UHID_CREATE(r0, &(0x7f0000007c00)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000007b40)=""/132, 0x84, 0x81, 0x1d1f07de, 0x80000000, 0x7f, 0x5}, 0x120) perf_event_open(&(0x7f0000007d40)={0x1, 0x70, 0x7fffffff, 0x9, 0x8, 0x2b, 0x0, 0x0, 0x4, 0x2, 0x9, 0x5, 0x4277, 0x2, 0x3, 0x7, 0x6523, 0x49, 0x2, 0x8c, 0x7, 0x4, 0x6, 0xffffffff, 0x6, 0x5, 0x0, 0x5, 0x6, 0xa, 0x10000, 0x0, 0x9, 0x100000000, 0x7, 0x400, 0x0, 0x100000001, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x100000001}, 0x20911, 0x3, 0x0, 0x3, 0x3, 0x7, 0x9}, r6, 0x1, 0xffffffffffffffff, 0xa) openat$uhid(0xffffffffffffff9c, &(0x7f0000007dc0)='/dev/uhid\x00', 0x526d92251913b279, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_CREATE_OPEN(r0, &(0x7f0000007e00)={0xa0, 0xfffffffffffffffe, 0x6, {{0x3, 0x1, 0x2d, 0x7, 0x7fffffff, 0x9, {0x1, 0x7fff, 0x4, 0x6, 0x72, 0xfffffffffffffff9, 0x157, 0x3, 0xf7, 0x7, 0x7, r7, r8, 0x6, 0xffffffff}}, {0x0, 0x1}}}, 0xa0) fcntl$addseals(r0, 0x409, 0x8) r9 = syz_open_dev$dspn(&(0x7f0000007ec0)='/dev/dsp#\x00', 0x1, 0x600001) write$USERIO_CMD_REGISTER(r0, &(0x7f0000007f00)={0x0, 0xfffffffffffffffb}, 0x2) readahead(r4, 0xffffffffffffff7f, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000007f40)={r4}) ioctl$sock_inet_SIOCSIFNETMASK(r9, 0x891c, &(0x7f0000007f80)={'ip6_vti0\x00', {0x2, 0x4e21, @loopback}}) getpid() getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000007fc0)={0x7, 0xf40, 0x8005, 0xeb, 0x0, 0xfffffffffffffff8, 0x3d, 0x8, 0x0}, &(0x7f0000008000)=0x20) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000008040)={r10, 0x9d, "19d2cdcb9557b4100fe8bb11da13b2370e1c32785b0a444b4796d1792ca4a9473e94a975562bcec8b4bd39dfd49760f433e5476530cc8ab333130a785452e2172d75a43ec16e2d726244243623da782534e1e274f2552a424c252802bb568a41d7e24cd70fa00d5c81ebbd969647db4fe44dd7dd72ba2961b7e2431c2ecb8d3981f18708345f01dad9da1ceea79a223a41e4cb8bf98696ef3eb4edef7f"}, &(0x7f0000008100)=0xa5) 03:10:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xfffffffffffffffd}, 0x14}}, 0x0) 03:10:55 executing program 2: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/udplite\x00') ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000380)=@get={0x1, &(0x7f0000000300)=""/88, 0x4}) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000140)={@multicast1, @loopback, @broadcast}, 0xc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000009d40)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x100000000) sendfile(r1, r2, 0x0, 0x0) 03:10:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote, 0x0, 0xff}, 0x0, @in=@local, 0x0, 0x1}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) [ 243.477137] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:10:55 executing program 4: creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f0000227f74)=""/140, 0x14) [ 243.539864] skbuff: bad partial csum: csum=0/65535 len=14 03:10:55 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8100000008b0f, &(0x7f0000000040)={'veth0\x00', @ifru_mtu}) 03:10:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x20000000105, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) 03:10:56 executing program 1: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/udplite\x00') ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000380)=@get={0x1, &(0x7f0000000300)=""/88, 0x4}) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000140)={@multicast1, @loopback, @broadcast}, 0xc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000009d40)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x100000000) sendfile(r1, r2, 0x0, 0xa5cc554) 03:10:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001900010200000000000000001d0100002c000300217b266c6f6c64657621285d76626f786e65743123bf5e5b00000000000000000000000000000000"], 0x1}}, 0x0) 03:10:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={"626f6e643000000000000000bba400", &(0x7f0000000000)=ANY=[@ANYBLOB="01"]}) 03:10:56 executing program 3: 03:10:56 executing program 2: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/udplite\x00') ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000380)=@get={0x1, &(0x7f0000000300)=""/88, 0x4}) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000140)={@multicast1, @loopback, @broadcast}, 0xc) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000009d40)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x100000000) sendfile(r1, r2, 0x0, 0x0) [ 244.946979] IPVS: ftp: loaded support on port[0] = 21 [ 246.598300] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.604774] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.612529] device bridge_slave_0 entered promiscuous mode [ 246.691278] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.697751] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.705901] device bridge_slave_1 entered promiscuous mode [ 246.781068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.916327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.210731] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.293147] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.373073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.380008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.459428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.466508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.700231] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.707948] team0: Port device team_slave_0 added [ 247.783921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.791437] team0: Port device team_slave_1 added [ 247.868683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.949462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.027260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.034609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.043663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.123367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.130723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.139744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.991802] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.998261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.005200] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.011662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.020617] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.312250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.167044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.453054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.739008] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.745311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.753109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.038100] 8021q: adding VLAN 0 to HW filter on device team0 03:11:06 executing program 5: 03:11:06 executing program 4: 03:11:06 executing program 0: 03:11:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000040), &(0x7f0000000440)) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vfat\x00', 0x4000002801080, 0x0) 03:11:06 executing program 1: r0 = socket(0x2000000010, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_getaddr={0x2c, 0x16, 0x405, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 03:11:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5406, 0x8000000000a86) 03:11:07 executing program 0: 03:11:07 executing program 4: 03:11:07 executing program 2: 03:11:07 executing program 3: 03:11:07 executing program 5: 03:11:07 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x0) 03:11:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x53}}, 0x18) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000140)="0501000005000000fffff000ffa2ada33f93820fd903378c", 0x18, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x8000000000004, @dev}, 0x1c) 03:11:07 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffbfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) dup2(r0, r1) [ 255.746791] skbuff: bad partial csum: csum=0/65535 len=14 03:11:07 executing program 2: r0 = socket$inet6(0xa, 0x1040000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={"6c6f00ec08562fe8b02b434e00"}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="000020000000000014000300c66970365f683a693000000000000000000c000100aaaaaaaaaa0000e2af16c45d4a6427c274d9ee65ffc93b882f5fbf327be1141556f35b6d86ba065d788f0693959b3f5951e7f4d5abbf360f2c0c273e7c6cd31b97fc58736de0fd23edc1a5f5f1a9d85973b5690f20233f56fc1f7b5ec59ad80ba51b"], 0x1}}, 0x0) [ 255.797919] skbuff: bad partial csum: csum=0/65535 len=14 03:11:07 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:07 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000640)={'nat\x00'}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000003c0)={0x2, 0x4, 0xfffffffffffffff8, 0xfffffffffffffe00, 'syz0\x00', 0x40}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="002717af5543d05d160604030000000000000000000000000000ffff00000000000002a96e138cb86473000000000001fe"], 0x1) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') write$P9_RATTACH(r1, &(0x7f0000000140)={0xa, 0x69, 0x0, {0x0, 0x0, 0x8}}, 0x14) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x90) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 03:11:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x40000000000014f, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001a00014d04000000000000000000dc00"], 0x1}}, 0x0) 03:11:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f00000001c0)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:11:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140), 0x0) 03:11:08 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'ipddp0\x00', 0x5}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:11:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001700)='\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a80)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ffff9e000a000200ffff0000aaaa000006334e50aabd3d194c2ae980e1d0689edb9f4e87f3083172515e95470dd0e9beae16f4b5290c9ad74712a6f8fceae6f83f30baadf7518dff2ee3766a6628759af9b376b003db3f1a"], 0x1}}, 0x0) 03:11:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f00000001c0)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:11:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ffff9e000a000200ffff0000aaaa000006334e50aabd3d194c2ae980e1d0689edb9f4e87f3083172515e95470dd0e9beae16f4b5290c9ad74712a6f8fceae6f83f30baadf7518dff2ee3766a6628759af9b376b003db3f1a"], 0x1}}, 0x0) 03:11:09 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ffff9e000a000200ffff0000aaaa000006334e50aabd3d194c2ae980e1d0689edb9f4e87f3083172515e95470dd0e9beae16f4b5290c9ad74712a6f8fceae6f83f30baadf7518dff2ee3766a6628759af9b376b003db3f1a"], 0x1}}, 0x0) 03:11:09 executing program 2: r0 = socket$inet(0x2, 0x4000000803, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) getsockname(r0, &(0x7f00000036c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003780)={r1, @rand_addr, @dev}, 0xc) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 03:11:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='Rp'], 0x2) sendfile(r0, r0, &(0x7f0000000140), 0xd1) 03:11:11 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000640)={'nat\x00'}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000003c0)={0x2, 0x4, 0xfffffffffffffff8, 0xfffffffffffffe00, 'syz0\x00', 0x40}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="002717af5543d05d160604030000000000000000000000000000ffff00000000000002a96e138cb86473000000000001fe"], 0x1) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') write$P9_RATTACH(r1, &(0x7f0000000140)={0xa, 0x69, 0x0, {0x0, 0x0, 0x8}}, 0x14) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x90) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 03:11:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34060}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000002f002908000000000000000004000000180000001400010006000100000000000000000000000001"], 0x1}}, 0x0) 03:11:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) 03:11:11 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r1, r0) read(r2, &(0x7f0000000100)=""/132, 0x162) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) clone(0x6102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) 03:11:11 executing program 1: 03:11:11 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000640)={'nat\x00'}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000003c0)={0x2, 0x4, 0xfffffffffffffff8, 0xfffffffffffffe00, 'syz0\x00', 0x40}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="002717af5543d05d160604030000000000000000000000000000ffff00000000000002a96e138cb86473000000000001fe"], 0x1) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') write$P9_RATTACH(r1, &(0x7f0000000140)={0xa, 0x69, 0x0, {0x0, 0x0, 0x8}}, 0x14) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x90) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 03:11:11 executing program 4: 03:11:11 executing program 0: 03:11:11 executing program 4: 03:11:11 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000640)={'nat\x00'}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000003c0)={0x2, 0x4, 0xfffffffffffffff8, 0xfffffffffffffe00, 'syz0\x00', 0x40}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="002717af5543d05d160604030000000000000000000000000000ffff00000000000002a96e138cb86473000000000001fe"], 0x1) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') write$P9_RATTACH(r1, &(0x7f0000000140)={0xa, 0x69, 0x0, {0x0, 0x0, 0x8}}, 0x14) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x90) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 03:11:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='R'], 0x1) sendfile(r0, r0, &(0x7f0000000140), 0xd1) 03:11:12 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) write(r1, &(0x7f0000000840), 0xff98) 03:11:12 executing program 1: 03:11:12 executing program 0: [ 260.977694] dccp_xmit_packet: Payload too large (65432) for featneg. 03:11:14 executing program 2: 03:11:14 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000640)={'nat\x00'}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000003c0)={0x2, 0x4, 0xfffffffffffffff8, 0xfffffffffffffe00, 'syz0\x00', 0x40}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="002717af5543d05d160604030000000000000000000000000000ffff00000000000002a96e138cb86473000000000001fe"], 0x1) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') write$P9_RATTACH(r1, &(0x7f0000000140)={0xa, 0x69, 0x0, {0x0, 0x0, 0x8}}, 0x14) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8, 0xffffffff]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x90) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 03:11:14 executing program 0: 03:11:14 executing program 1: 03:11:14 executing program 4: 03:11:14 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 03:11:14 executing program 1: 03:11:14 executing program 4: 03:11:14 executing program 2: 03:11:14 executing program 0: 03:11:14 executing program 4: 03:11:14 executing program 1: 03:11:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x4e22, @remote}, {0x0, @dev}, 0x0, {0x2, 0x0, @dev}, 'irlan0\x00'}) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x5, 0x20000) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x100003f00}, 0x2c) dup2(r0, 0xffffffffffffffff) 03:11:15 executing program 3: 03:11:15 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) tkill(r0, 0x14) 03:11:15 executing program 0: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x2) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000380)=@get={0x1, &(0x7f0000000300)=""/88, 0x4}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000009d40)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) fchown(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x100000000) 03:11:15 executing program 4: 03:11:15 executing program 2: 03:11:15 executing program 1: 03:11:15 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000240), 0x100000080000000) 03:11:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffff11, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) 03:11:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1, 0x0) 03:11:15 executing program 1: r0 = socket$inet(0x2, 0x4000000803, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) getsockname(r0, &(0x7f00000036c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003780)={r1, @rand_addr, @dev}, 0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 263.862800] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 263.985732] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 [ 264.005181] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 03:11:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="d0", 0x1}], 0x1, &(0x7f0000000100)}], 0x1, 0x4008000) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x11, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:11:16 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) tkill(r0, 0x14) 03:11:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:16 executing program 1: r0 = socket$inet(0x2, 0x4000000803, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) getsockname(r0, &(0x7f00000036c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003780)={r1, @rand_addr, @dev}, 0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 264.399583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.406518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.498184] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 03:11:16 executing program 0: 03:11:16 executing program 1: r0 = socket$inet(0x2, 0x4000000803, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) getsockname(r0, &(0x7f00000036c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003780)={r1, @rand_addr, @dev}, 0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 03:11:16 executing program 0: [ 264.846487] ip_tunnel: non-ECT from 9.0.0.0 with TOS=0x1 03:11:17 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) tkill(r0, 0x14) 03:11:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) [ 265.724606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') dup2(r0, r1) 03:11:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xb, 0x4010, r0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240), &(0x7f0000000280)=0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8923, &(0x7f0000000380)={"627071300037000003a5000000faff00", r3}) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001940)={0xffffffffffffffff}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000001840)=""/228, &(0x7f00000007c0)=0xe4) sendmsg$inet_sctp(r5, &(0x7f00000006c0)={&(0x7f0000000140)=@in6={0xa, 0x4e23, 0xfff, @remote, 0x3}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000500)="a2b329d46e010ca74c8e245478cf6611582efc930ffd09ef12f8c20c332f0521b781b8ee6974f6deee52326f37db0b3e7222491b5f93417113d6c60fde879fd19c1f88105cb51374cda190164f1efa61c2414a3086d51c72e7084f973009ed3f1b326ea1598d7a0da77521496d53843a1aa667824e12615fc306d72dcd182ea3da7bbe237d4178fe6a5a1a2630b6734ddac13f7b59a98376137de16bd78971b62e2f98dbf60ae420f46b11a66f1791ffab01", 0xb2}], 0x1, &(0x7f0000001a40)=ANY=[], 0x0, 0x4040000}, 0x8000) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000006c0)}], 0x1}, 0x0) 03:11:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x100003f00}, 0x2c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:11:17 executing program 1: 03:11:18 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) [ 266.606522] : renamed from bpq0 03:11:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x100003f00}, 0x2c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:11:18 executing program 1: 03:11:18 executing program 2: 03:11:18 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:19 executing program 2: [ 266.999968] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:19 executing program 1: 03:11:19 executing program 3: 03:11:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x100003f00}, 0x2c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:11:19 executing program 2: 03:11:19 executing program 3: 03:11:19 executing program 1: 03:11:20 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:20 executing program 2: 03:11:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x100003f00}, 0x2c) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:11:20 executing program 3: 03:11:20 executing program 1: 03:11:20 executing program 0: 03:11:20 executing program 1: [ 268.523025] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:20 executing program 3: 03:11:20 executing program 2: 03:11:20 executing program 1: 03:11:20 executing program 0: 03:11:21 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_0\x00', 0x0}) getpeername$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000200), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_deladdr={0x2c, 0x15, 0x701, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @mcast1}]}, 0x2c}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) 03:11:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:21 executing program 0: 03:11:21 executing program 2: 03:11:21 executing program 3: 03:11:21 executing program 2: [ 269.963608] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:22 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:22 executing program 0: 03:11:22 executing program 3: 03:11:22 executing program 2: 03:11:22 executing program 1: 03:11:22 executing program 2: 03:11:22 executing program 0: 03:11:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) socket$nl_route(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:23 executing program 3: 03:11:23 executing program 1: 03:11:23 executing program 2: 03:11:23 executing program 0: 03:11:23 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:23 executing program 1: 03:11:23 executing program 0: 03:11:23 executing program 2: 03:11:23 executing program 3: 03:11:23 executing program 0: 03:11:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:23 executing program 1: 03:11:24 executing program 2: 03:11:24 executing program 3: 03:11:24 executing program 5: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x14) 03:11:24 executing program 0: 03:11:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)) 03:11:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000003e40)=[{{&(0x7f0000000500)=@rc, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/165, 0xa5}}], 0x1, 0x0, &(0x7f0000003680)={0x77359400}) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 03:11:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0bc5351, &(0x7f0000000200)={0x2000000021, @time}) [ 272.438701] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:24 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) 03:11:24 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') readv(r0, &(0x7f00000021c0)=[{&(0x7f0000000140)=""/79, 0x4f}], 0x1) 03:11:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) [ 273.013189] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:25 executing program 5: r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0xf, &(0x7f0000000080)={&(0x7f0000000000)="41abc462f922a95c8e3618c4a2c19c8dd67f000067f326470f37c423790580ec24b3530affc5c44255bff4c4e11d6cd9447d32c4e1fb12d1", {}, 0x0, &(0x7f0000000040)="c461755de2c4a3c96f27653dfec737d0c482ad912cae0fd9f3450fa4e968c4e2218c363e2ef3490f2abe000080206641d9f4c401f929ff"}, &(0x7f00000001c0)={&(0x7f00000000c0)="66470f109cd53e7f0000c421dd5e17653e0fba766b75c4635d4a310f8f2978e1e0c4017c28fac4e2f1b7dd440f4133c422f924a06c1b2a2945dcfc", {}, 0x0, &(0x7f0000000100)="47dd647045c4c10971d60d0f1deac48279185376c4427d358962ab0000c4c17973d00066460ff4d8c4827dbd5cd100c4e1b5e836c441e96c83df7be349"}, 0x8, &(0x7f0000000200)) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz'}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) 03:11:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x2}, 0x1c) recvfrom(r0, &(0x7f00000002c0)=""/236, 0xec, 0x0, &(0x7f0000000040)=@generic={0x0, "4808799681fa488f31035498aed461bcc615a1fc6de435f93b6a31b09b8d8fc6d997f6bd596b5083d30e00661a4314c031dbbbbca0284257d7a845db4a4ed627468ce2bd70d7e61d9712eab95c84cce4cf1e708081b154b4c5f581225eba59bdd9abbe386efbe77e860eb5b2f6b7438cfccb5121702a534ee2b2bea384ae"}, 0x80) 03:11:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000340)=0x1, 0x231) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000000300)={0x2, 0x4004e23}, 0x10) 03:11:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x1f, 0x31, &(0x7f00000000c0)="c6c7b1e3f58623b42f23e0aeb1ab133f195ff3dad3560097971a912605e7a65cb20817255cb8af56e1b256ac688d26d307"}) fchdir(r0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0xfb, [], 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000200)=""/251}, &(0x7f0000000380)=0x78) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./control\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) 03:11:25 executing program 5: r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000700)={@void, @val={0x0, 0x83, 0x0, 0x6, 0x0, 0x80000001}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 03:11:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000080)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x80050002, 0x0, 0x0, 0x300220}) [ 273.791611] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000340)=0x1, 0x231) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000000300)={0x2, 0x4004e23}, 0x10) [ 273.983230] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:11:26 executing program 5: r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2000800007, 0x4}) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40) fsync(r2) 03:11:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000340)=0x1, 0x231) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000000300)={0x2, 0x4004e23}, 0x10) 03:11:26 executing program 1: io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000240)) close(r1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x0, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 03:11:26 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:27 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) ptrace(0x10, r0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x14) 03:11:27 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000340)=0x1, 0x231) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000340), 0x0, 0x20000000, &(0x7f0000000300)={0x2, 0x4004e23}, 0x10) [ 275.430289] Not allocated shadow for addr ffff880122d17348 (page ffffea0006d0e8a0) [ 275.438069] Attempted to access 8 bytes [ 275.442094] ------------[ cut here ]------------ [ 275.446871] kernel BUG at mm/kmsan/kmsan.c:1091! [ 275.451701] invalid opcode: 0000 [#1] SMP [ 275.455878] CPU: 0 PID: 6492 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #65 [ 275.463078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.472465] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 275.478115] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c bc 57 8b 31 c0 4c [ 275.497041] RSP: 0018:ffff8801577ef780 EFLAGS: 00010046 [ 275.502429] RAX: 000000000000001b RBX: 0000000000000000 RCX: 571c182a495df200 [ 275.509720] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 275.517044] RBP: ffff8801577ef7b0 R08: 0000000000000000 R09: ffff88021fc38f50 [ 275.524339] R10: 0000000000000000 R11: ffffffff862594e0 R12: 0000000000000001 [ 275.531643] R13: ffff880122d17348 R14: 0000000000000001 R15: 0000000000000008 [ 275.538963] FS: 0000000001cd6940(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 275.547210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 275.553114] CR2: 0000000000706158 CR3: 00000001577b4000 CR4: 00000000001406f0 [ 275.560424] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 275.567708] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 275.574987] Call Trace: [ 275.577616] kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 275.582853] kmsan_unpoison_shadow+0x72/0xd0 [ 275.587296] vunmap_page_range+0x828/0xc20 [ 275.591595] remove_vm_area+0x39b/0x450 [ 275.595619] __vunmap+0x34c/0x5d0 [ 275.599122] vfree+0x79/0x170 [ 275.602265] do_arpt_get_ctl+0xddb/0xe80 [ 275.606385] ? compat_do_arpt_set_ctl+0x2e90/0x2e90 [ 275.611436] nf_getsockopt+0x481/0x4e0 [ 275.615369] ip_getsockopt+0x2b1/0x470 [ 275.619298] ? compat_ip_setsockopt+0x380/0x380 [ 275.623990] tcp_getsockopt+0x1c6/0x1f0 [ 275.628010] ? tcp_get_timestamping_opt_stats+0x1810/0x1810 [ 275.633748] sock_common_getsockopt+0x13f/0x180 [ 275.638451] ? sock_recv_errqueue+0x990/0x990 [ 275.642983] __sys_getsockopt+0x48c/0x550 [ 275.647180] __se_sys_getsockopt+0xe1/0x100 [ 275.651546] __x64_sys_getsockopt+0x62/0x80 [ 275.655896] do_syscall_64+0xbe/0x100 [ 275.659727] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 275.664936] RIP: 0033:0x45a0aa [ 275.668158] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 88 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 88 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 275.687076] RSP: 002b:0000000000a3f648 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 275.694810] RAX: ffffffffffffffda RBX: 0000000000a3f750 RCX: 000000000045a0aa [ 275.702103] RDX: 0000000000000061 RSI: 0000000000000000 RDI: 0000000000000003 [ 275.709394] RBP: 0000000000000003 R08: 0000000000a3f65c R09: 000000000000000a [ 275.716689] R10: 0000000000a3f750 R11: 0000000000000212 R12: 0000000000000000 [ 275.723988] R13: 00000000000430cd R14: 000000000000001d R15: 0000000000000003 [ 275.731294] Modules linked in: [ 275.734538] ---[ end trace 7ac83f82435aa8f8 ]--- [ 275.739331] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 275.744982] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c bc 57 8b 31 c0 4c [ 275.764381] RSP: 0018:ffff8801577ef780 EFLAGS: 00010046 [ 275.769758] RAX: 000000000000001b RBX: 0000000000000000 RCX: 571c182a495df200 [ 275.777044] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 275.784306] RBP: ffff8801577ef7b0 R08: 0000000000000000 R09: ffff88021fc38f50 [ 275.791570] R10: 0000000000000000 R11: ffffffff862594e0 R12: 0000000000000001 [ 275.798848] R13: ffff880122d17348 R14: 0000000000000001 R15: 0000000000000008 [ 275.806129] FS: 0000000001cd6940(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 275.814350] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 275.820233] CR2: 0000000000706158 CR3: 00000001577b4000 CR4: 00000000001406f0 [ 275.827524] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 275.834804] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 275.842077] Kernel panic - not syncing: Fatal exception [ 275.848487] Kernel Offset: disabled [ 275.852129] Rebooting in 86400 seconds..