[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 64.888176] audit: type=1800 audit(1543404857.932:25): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 64.907304] audit: type=1800 audit(1543404857.932:26): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 64.926893] audit: type=1800 audit(1543404857.962:27): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.38' (ECDSA) to the list of known hosts. 2018/11/28 11:34:33 fuzzer started 2018/11/28 11:34:38 dialing manager at 10.128.0.26:39003 2018/11/28 11:34:38 syscalls: 1 2018/11/28 11:34:38 code coverage: enabled 2018/11/28 11:34:38 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/28 11:34:38 setuid sandbox: enabled 2018/11/28 11:34:38 namespace sandbox: enabled 2018/11/28 11:34:38 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/28 11:34:38 fault injection: enabled 2018/11/28 11:34:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/28 11:34:38 net packet injection: enabled 2018/11/28 11:34:38 net device setup: enabled 11:37:42 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000940)="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", 0x1) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r1, 0x0, 0xffffffffffffffff, 0x0) clone(0x28000000, &(0x7f0000000100), 0x0, &(0x7f0000000240), &(0x7f0000000280)="83d629b24192b85e9597d68edbc70fca6e13a1059a7566c1c7da431131064adcf11e887d3c774993620dbbbe1ef012") ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000300)=0x5) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={r2}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000003c0)='encrypted\x00', &(0x7f0000000400)={'syz'}, 0x0, 0xfffffffffffffffe) request_key(0x0, 0x0, &(0x7f0000000500)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) syzkaller login: [ 269.966775] IPVS: ftp: loaded support on port[0] = 21 [ 272.264136] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.270612] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.279312] device bridge_slave_0 entered promiscuous mode [ 272.417822] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.424366] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.433032] device bridge_slave_1 entered promiscuous mode [ 272.569704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 272.705777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 273.127569] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 273.269502] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:37:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x14, &(0x7f0000000400)="547c9f33bcc4a244475498bfeeeb65461322b855"}) [ 274.132073] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.140442] team0: Port device team_slave_0 added [ 274.249860] IPVS: ftp: loaded support on port[0] = 21 [ 274.281890] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.289975] team0: Port device team_slave_1 added [ 274.539394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.719353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 274.726497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.735586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.892133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.899892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.909028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.154459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 275.162220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.171298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.704094] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.710576] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.719230] device bridge_slave_0 entered promiscuous mode [ 277.734697] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.741215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.748325] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.754895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.763915] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 277.852806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.945330] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.952001] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.960541] device bridge_slave_1 entered promiscuous mode [ 278.152857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.403737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 278.885132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 279.103284] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 279.346742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 279.353898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.528232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 279.535380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:37:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000100)="050100000500000000000000ffb25ba32f938207", 0x14, 0x0, 0x0, 0x0) [ 280.267778] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 280.276221] team0: Port device team_slave_0 added [ 280.547864] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 280.556243] team0: Port device team_slave_1 added [ 280.818087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 280.843029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 280.852164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.972085] IPVS: ftp: loaded support on port[0] = 21 [ 281.162228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 281.169269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.178430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.443527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 281.451111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.460401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.701510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 281.709249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.718220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.018622] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.025212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.032246] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.038740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.047911] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 285.054553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.570114] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.576769] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.585360] device bridge_slave_0 entered promiscuous mode [ 285.863291] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.869803] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.878356] device bridge_slave_1 entered promiscuous mode [ 286.164722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 286.393381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.138750] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.356991] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 287.660233] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 287.667485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.858854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 287.866128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.242771] 8021q: adding VLAN 0 to HW filter on device bond0 11:38:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 288.707914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 288.716237] team0: Port device team_slave_0 added [ 289.062804] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 289.071146] team0: Port device team_slave_1 added [ 289.405013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 289.412442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 289.421436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.527548] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 289.704732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 289.711998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 289.720691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.790438] IPVS: ftp: loaded support on port[0] = 21 [ 290.016684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 290.024472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.033788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.352433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 290.360094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.369245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.718796] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.725497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.733638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.970901] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.449301] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.455854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.462887] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.469344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.478208] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 294.832892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.546046] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.552734] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.561204] device bridge_slave_0 entered promiscuous mode [ 295.900992] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.907701] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.916535] device bridge_slave_1 entered promiscuous mode [ 296.294006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.637469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 297.726921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 298.013831] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:38:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7}) [ 298.355252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 298.363384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.819877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 298.827114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 299.153659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.717728] IPVS: ftp: loaded support on port[0] = 21 [ 299.970610] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.978964] team0: Port device team_slave_0 added 11:38:13 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xec1106b2) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x204181f, 0x0) unlink(&(0x7f00000001c0)='./file0\x00') [ 300.403775] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.412406] team0: Port device team_slave_1 added [ 300.781432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.788787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.797830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.906312] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 301.147914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 301.155125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.163992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.538206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 301.546012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.554904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:38:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0xa0, "93ae3578ad8ba65008be58bbfdb69e56626b4c61c1693ff50e24ad409b893db9e182986547ed2a4483431dc30e15b150ef9d329a8db3772dd886ca33717deec0566364837143012048d3d15bd0b745044e88f8a3bc5c5bf9440e016b5dce2cb84d6898fa76a0f4b1655183ee659364f7375fe8760e3881aa64d272863caa69f51f5d050e997b5761f7fadbbf07fdbd7ee7260cdc2ac05749d84bcf01773803a4"}, &(0x7f0000000000)=0xa8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x3c1, 0x1, 0x188, [0x20000600], 0x0, &(0x7f00000000c0), &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'lo\x00', 'bridge0\x00', 'gre0\x00', @dev, [], @link_local, [], 0x70, 0xa8, 0xf8}, [@arpreply={'arpreply\x00', 0x10, {{@remote}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x200) [ 301.895187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 301.903155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.912093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.481205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 302.487667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.496096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:38:15 executing program 0: syz_emit_ethernet(0x7e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000700000000000019078ac1414bbac1414110b04907800000000450000000000000000330000ac7014aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000000a1"], &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1f, 0x100) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xba55, 0x400000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000200)=0x18, 0x4) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000240)=ANY=[@ANYBLOB="070000009a0800d7b443b4dd00050400000000f6800000000000000000070000000000000001000000ffffffffffffffff00000000060000c9000000000000000000000000010400000000000063460000000000000500f2ffffff000002000000000000000100008000000000360000000000000001000038f2000000"]) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 11:38:16 executing program 0: r0 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2=0xe0006c02}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}, 0x9f783104a14e79fe}) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x8}, 0x8) 11:38:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x12) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)}) 11:38:16 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x959, 0x450001) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) dup3(r1, r0, 0x0) sendmmsg(r2, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x50ba00) [ 304.220307] 8021q: adding VLAN 0 to HW filter on device team0 11:38:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89fc, &(0x7f0000000080)={'irlan0\x00', @ifru_settings={0xfffffffffffffffe, 0x7ff, @te1=&(0x7f0000000000)={0x80000001, 0x4, 0x7f, 0xb3}}}) 11:38:17 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x7) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x7fff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000080)="a21748476e314f81cc0a3b45930f9cbaba29af81f9f7ed25c8378c5b2d4bfbd84dedbcd35068393a2e72d0fbbc049063a4bdc9ad353b338f70ba6dfe", 0x3c}, {&(0x7f0000000180)="41223bd24a1549dbb42cf29ebe2051043c86aad2387ad1125c648e6c605b55dce307387e9bd2ab7fd996c75d3a479a7750cfd27a6955d1b6fc4ab2b8200a822932cada91e05d9e5f32b3cd2175a36f1d44e515494e5305e99e8ec0b5", 0x5c}, {&(0x7f0000000200)="0333e0fcf8e846a50712f0cba997c7fb329a8939c0219df0e5173f2a57dc8532ad093f5fc0f06906cd0cebc9b40895dacbfdb8bf6a404b49ed590593009eee1d07ff624d5950221fdaa65007998dcf1ed5e0ef8fbe2ef88a15608e6635686eaf610a388f582735dbfafd5a65994610803af661183e5297d861e38a103807228e7647427ebae86e30fe24d32749faa2f118ea9c10c96e", 0x96}, {&(0x7f00000000c0)="25a6a0ef898f53db445e3c9b143fa92b9604d75aa1", 0x15}, {&(0x7f00000002c0)="c23a7a0cd1fe09626dc298ffe226698f3f2bb04065a32e5648c877e8e50163eb849c8c00ef324f7d96b04d75605f4d7109612e9f1da26ea17cb8e3be9e8ee511010ddc91f2460392d0250c1b01f3a44a5e21fe32155216ee21a8f721302656a17f3394a8978bf57a772551c8740e9f9201703cb9863a0c0e22a97d5eec370bab621f38e20c565140e3db38a52956d164ebf3b5351aa1835b6925b60a3989645c4900aee0ebf580de0dc045d0ef963d0105cb0f1dc585a6e5298c562ab68d0ce307534e61b116a692a0cff3e02186d4cc31199d02afabdabdb8ac489a47f5a99201336ad6f957d4149101d18e1ac1a5b39c77b535126ce9", 0xf7}, {&(0x7f00000003c0)="07218fef64863c3612b5fcf836650923bec13df1cfc999d982c17b024e8a2f78fede93f2c2244969da31395d90541f8055d31530fc3c3971596050576c89ac0981483165efb116c72adbd559d5fe113626", 0x51}, {&(0x7f0000000440)}, {&(0x7f0000000480)="3cdf26a63b21b7bec2c3ca3c53f7e0d108f337ade7647352af14577d85033aa8b7b2307a420bce103f838b0f0f86ef61d3eba5", 0x33}, {&(0x7f00000004c0)="0858d4619e686e613e763cb1183faab583f3b1fcad4999731549003d0388208b22e929dbc084d08d973c46f8962690fd93ced869dd97eac9d78a3f8c31bab66bbe2553e433b0e83a162266133fcbb8e3b37d6983fb75fc52d185f083de4df89833c34bade68964fda9f54f8dbaf918317a65999a5e5d399686a22b36e32e9d82498792866f903e506fbfcc8f3aead8f334c06ebd04d2be2bc52ab118d559536331143fb1050022680a67c823c2a06a5bb52747c950750748e7d84a3bc80e946d922f4cf80ad88540341052623e1b7f846c03e890c766aa00ac61ad49b125b09d8f7a57c2a6f1a6e2370c814958dadb3e", 0xf0}, {&(0x7f00000005c0)="98fa58e07187d735b8a162c9c0a17f5eb4e4eb5d818f50907309487ef96dc13b93002d4e7f634b52cea35f433c86a900ccfda0ede4d136483253569f0faccae14b0be6db710ccad1ef8f221b0b75b920a0deeb377dca48c7f8126bc7c48d67a3b1d06bbb949d355a481f951df8c78eb50ead5247603dc53a259e80d15401587a55e670edc147a9a32f78b07af63e3aaa698af59b3a9c51b249fc69d583abd6ddbc3cfd9d2257c30d2e4050916a9303b34fde8ba68a5cdec7b3c78133111bde5cdaf8fbaab56a3dd19f", 0xc9}], 0xa, &(0x7f0000000780)=ANY=[@ANYBLOB="700000000000000018010000010000008e7f4d34f78c99e3376e88fa3d0b7d6a23085e3752e58d8fc2aaceb835739986e46ec5b3733acc0778355699b3ca2ca0e6b32de91cb43cacb0ee712782b66b2f5d2d919dae2a551cabf8319509f9ce536dab01a7e549da0e97567a6c49621e7d"], 0x70}, 0x4) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x24, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) r3 = socket(0x800000000000a, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000100)={'bridge_slave_0\x00', 0x7b}) fcntl$notify(r0, 0x402, 0x4) socket$inet(0x2, 0xe, 0x800) [ 306.308151] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.314743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.321802] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.328290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.337052] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 306.416421] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.422987] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.431514] device bridge_slave_0 entered promiscuous mode [ 306.796351] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.803048] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.811616] device bridge_slave_1 entered promiscuous mode [ 306.818961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.187160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 307.534786] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 308.548454] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 308.885811] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 309.330854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 309.338178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.660680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 309.667967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.475528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.705981] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 310.714356] team0: Port device team_slave_0 added [ 311.048088] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 311.057090] team0: Port device team_slave_1 added [ 311.342403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 311.349466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 311.358498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.598381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 311.651458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 311.658717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.667729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.974869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 311.982580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.991557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.301402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 312.309156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.318254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:38:25 executing program 1: [ 312.638392] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 312.645105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.653055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.490020] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.746621] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.753195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.760187] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.766842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.775467] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 314.782217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.844581] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.513454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 318.393851] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 318.400223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.408218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:38:31 executing program 2: [ 319.093463] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.539310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.032398] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 11:38:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 322.558767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 322.565074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.572995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.843445] 8021q: adding VLAN 0 to HW filter on device team0 11:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7}) 11:38:37 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x7) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x7fff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000080)="a21748476e314f81cc0a3b45930f9cbaba29af81f9f7ed25c8378c5b2d4bfbd84dedbcd35068393a2e72d0fbbc049063a4bdc9ad353b338f70ba6dfe", 0x3c}, {&(0x7f0000000180)="41223bd24a1549dbb42cf29ebe2051043c86aad2387ad1125c648e6c605b55dce307387e9bd2ab7fd996c75d3a479a7750cfd27a6955d1b6fc4ab2b8200a822932cada91e05d9e5f32b3cd2175a36f1d44e515494e5305e99e8ec0b5", 0x5c}, {&(0x7f0000000200)="0333e0fcf8e846a50712f0cba997c7fb329a8939c0219df0e5173f2a57dc8532ad093f5fc0f06906cd0cebc9b40895dacbfdb8bf6a404b49ed590593009eee1d07ff624d5950221fdaa65007998dcf1ed5e0ef8fbe2ef88a15608e6635686eaf610a388f582735dbfafd5a65994610803af661183e5297d861e38a103807228e7647427ebae86e30fe24d32749faa2f118ea9c10c96e", 0x96}, {&(0x7f00000000c0)="25a6a0ef898f53db445e3c9b143fa92b9604d75aa1", 0x15}, {&(0x7f00000002c0)="c23a7a0cd1fe09626dc298ffe226698f3f2bb04065a32e5648c877e8e50163eb849c8c00ef324f7d96b04d75605f4d7109612e9f1da26ea17cb8e3be9e8ee511010ddc91f2460392d0250c1b01f3a44a5e21fe32155216ee21a8f721302656a17f3394a8978bf57a772551c8740e9f9201703cb9863a0c0e22a97d5eec370bab621f38e20c565140e3db38a52956d164ebf3b5351aa1835b6925b60a3989645c4900aee0ebf580de0dc045d0ef963d0105cb0f1dc585a6e5298c562ab68d0ce307534e61b116a692a0cff3e02186d4cc31199d02afabdabdb8ac489a47f5a99201336ad6f957d4149101d18e1ac1a5b39c77b535126ce9", 0xf7}, {&(0x7f00000003c0)="07218fef64863c3612b5fcf836650923bec13df1cfc999d982c17b024e8a2f78fede93f2c2244969da31395d90541f8055d31530fc3c3971596050576c89ac0981483165efb116c72adbd559d5fe113626", 0x51}, {&(0x7f0000000440)}, {&(0x7f0000000480)="3cdf26a63b21b7bec2c3ca3c53f7e0d108f337ade7647352af14577d85033aa8b7b2307a420bce103f838b0f0f86ef61d3eba5", 0x33}, {&(0x7f00000004c0)="0858d4619e686e613e763cb1183faab583f3b1fcad4999731549003d0388208b22e929dbc084d08d973c46f8962690fd93ced869dd97eac9d78a3f8c31bab66bbe2553e433b0e83a162266133fcbb8e3b37d6983fb75fc52d185f083de4df89833c34bade68964fda9f54f8dbaf918317a65999a5e5d399686a22b36e32e9d82498792866f903e506fbfcc8f3aead8f334c06ebd04d2be2bc52ab118d559536331143fb1050022680a67c823c2a06a5bb52747c950750748e7d84a3bc80e946d922f4cf80ad88540341052623e1b7f846c03e890c766aa00ac61ad49b125b09d8f7a57c2a6f1a6e2370c814958dadb3e", 0xf0}, {&(0x7f00000005c0)="98fa58e07187d735b8a162c9c0a17f5eb4e4eb5d818f50907309487ef96dc13b93002d4e7f634b52cea35f433c86a900ccfda0ede4d136483253569f0faccae14b0be6db710ccad1ef8f221b0b75b920a0deeb377dca48c7f8126bc7c48d67a3b1d06bbb949d355a481f951df8c78eb50ead5247603dc53a259e80d15401587a55e670edc147a9a32f78b07af63e3aaa698af59b3a9c51b249fc69d583abd6ddbc3cfd9d2257c30d2e4050916a9303b34fde8ba68a5cdec7b3c78133111bde5cdaf8fbaab56a3dd19f", 0xc9}], 0xa, &(0x7f0000000780)=ANY=[@ANYBLOB="700000000000000018010000010000008e7f4d34f78c99e3376e88fa3d0b7d6a23085e3752e58d8fc2aaceb835739986e46ec5b3733acc0778355699b3ca2ca0e6b32de91cb43cacb0ee712782b66b2f5d2d919dae2a551cabf8319509f9ce536dab01a7e549da0e97567a6c49621e7d"], 0x70}, 0x4) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x24, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) r3 = socket(0x800000000000a, 0x80005, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000100)={'bridge_slave_0\x00', 0x7b}) fcntl$notify(r0, 0x402, 0x4) socket$inet(0x2, 0xe, 0x800) 11:38:37 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000040)={0x6, 0xbd, [], {0x0, @bt={0xc249, 0x6, 0x1, 0x3, 0xd4ec, 0x8, 0x81, 0x46, 0x400, 0xffffffffffffff46, 0xfff, 0x80000001, 0xbb3, 0x2, 0x2, 0x4}}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x1, 0x8, {0x6, 0x3, 0x301f, 0x6, 0x0, 0x7, 0x0, 0x1}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000240)={0x0, 0x5, [], {0x0, @bt={0x100, 0x4, 0x0, 0x0, 0x42, 0x8, 0x7, 0x1, 0x5, 0x0, 0x1, 0x7, 0x7f, 0x0, 0x10, 0x1}}}) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000300)) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000340)={0x73, @multicast2, 0x4e20, 0x0, 'lc\x00', 0x2, 0x2, 0x20}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9a9) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x40001) set_tid_address(&(0x7f0000000500)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000005c0)={0x5043, 0xffffffff, 0x79, &(0x7f0000000540)="8e4cb1714ea95016132fea2ed7f9f42276ee17de4716f2e5b3bb324d3b66d99a981f2efc841b49716e24bdcd0a875225230b0e030080312401c042ef50b355b2bc1b667011076861c5ade0922c964b91d1a3a74c24009ce104962d5b2e3f6210e9aa979d98f69a678f5115b9fae05c11a6de44437c515d8510"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000600)={0x3, 0x0, @ioapic={0xd000, 0x8, 0x80000001, 0x4820, 0x0, [{0xaf7e, 0x1, 0x7, [], 0x4}, {0x1ff, 0x0, 0x0, [], 0x7e0}, {0x2, 0x1ff, 0x3, [], 0x3}, {0x1, 0x63f0, 0x7, [], 0x4}, {0x6, 0xfff, 0x1, [], 0xd4}, {0x4, 0x8, 0x10000, [], 0x3}, {0xf7e, 0x9e, 0x2, [], 0x8}, {0x6, 0x2, 0x5, [], 0x3}, {0x8000, 0x0, 0x3, [], 0x3}, {0xffff, 0x9, 0x8, [], 0x1}, {0x8, 0x7f, 0x8, [], 0x33}, {0xffffffff, 0x1, 0x6, [], 0x39}, {0x0, 0x0, 0xfffffffffffffffb, [], 0x3}, {0x7f, 0x2, 0x6, [], 0x2}, {0x2, 0x1, 0x6, [], 0xbb}, {0x6, 0x301, 0x1, [], 0x7}, {0x7, 0x20, 0x5, [], 0x4}, {0x400, 0x8, 0xc9, [], 0x1}, {0x3, 0x5, 0x0, [], 0x483c}, {0x40, 0xfff, 0x4, [], 0x101}, {0x0, 0x100, 0x800, [], 0x7f}, {0x3b59, 0x1, 0xffff, [], 0x3}, {0x3ff, 0x3, 0x0, [], 0x4}, {0x8, 0x20, 0x7, [], 0x7ff}]}}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12010, r0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000700)={0x3f, "227ce0ea866a0077d43f97ee89c7c2341ef36f64b02eb1073ee831058eb93f88", 0x1, 0x1}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000740)={0xfd, 0x9}, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000780)='/dev/uhid\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)={'#! ', './file0', [{0x20, "ef"}, {0x20, 'lc\x00'}, {0x20, 'bdev.^prockeyringposix_acl_access#em0security+&/'}, {0x20, '-wlan1\'('}, {0x20, 'cpusetselinux%%+[(+'}, {}, {0x20, 'proc'}], 0xa, "cdc9fce56e28640b6706f9ab60aeba1303ce4f9ea851fa87f7579cca3025d1cf400cb91f7624dd10456219590eedb4901039e9aabd854fd43d3bc8284167748bff6384b6f813d5d2cda9997492b3a8bbed5f246d684c2987bf5d93473a7a15b14973baa69b9f9d0f1522f111951e76a6d9c54523889d7d32b77f"}, 0xdf) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000940)={0x0, 0x4c, &(0x7f00000008c0)=[@in6={0xa, 0x4e21, 0x7, @local, 0x5}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @rand_addr=0xfffffffffffffffd}, @in={0x2, 0x4e20}]}, &(0x7f0000000980)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000009c0)={r2, 0x4, 0x5cf8}, 0x8) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000a00)={0x0, @bt={0xfffffffffffffffa, 0xfffffffffffffff7, 0x1, 0x1, 0x6, 0x47e, 0x4, 0x1ff, 0x6b, 0xfffffffffffffff8, 0xffffffffffffffc0, 0x6, 0x100000001, 0x9, 0x0, 0x20}}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000ac0)={r2, 0xfffffffffffff000}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000b00)={'raw\x00', 0xe, "5ac2299a8937e160678806faee56"}, &(0x7f0000000b40)=0x32) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000b80)={r2, 0x2a, "6d79d0942db775c78d09e0065f4ad34d88a052ad379d16f48215a487be167201c17230a5d901543c6775"}, &(0x7f0000000bc0)=0x32) ioctl$TIOCNXCL(r0, 0x540d) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000c40)={0x100000001, 0x7b57, 0x2, [], &(0x7f0000000c00)=0x40}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c80)={0x0}, &(0x7f0000000cc0)=0xc) ptrace$setregs(0xd, r3, 0x3, &(0x7f0000000d00)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d80)={r0, 0x28, &(0x7f0000000d40)}, 0x10) bind$inet6(r0, &(0x7f0000000dc0)={0xa, 0x4e24, 0x9, @ipv4={[], [], @local}}, 0x1c) 11:38:37 executing program 2: 11:38:37 executing program 1: 11:38:37 executing program 3: 11:38:37 executing program 3: 11:38:37 executing program 2: 11:38:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='jfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x14) wait4(0x0, 0x0, 0x0, 0x0) 11:38:38 executing program 0: r0 = socket$inet6(0xa, 0x800000005, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r1, &(0x7f0000000300), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r1, &(0x7f00000005c0)='7', 0x0}, 0x18) 11:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) 11:38:38 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) getpgrp(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 11:38:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0x29c) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x2f, 0x4) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x104, 0x0, 0x0, 0x1bb) 11:38:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) clone(0x2102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") sendmmsg(r1, &(0x7f0000007200)=[{{&(0x7f00000002c0)=@rc, 0x80, 0x0}}], 0x1, 0x20000000) write$P9_RLERRORu(r1, 0x0, 0x0) [ 325.474713] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.698397] ================================================================== [ 325.705828] BUG: KMSAN: uninit-value in gre_rcv+0x11a3/0x1900 [ 325.711738] CPU: 1 PID: 8307 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #95 [ 325.718938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.728302] Call Trace: [ 325.730897] [ 325.733099] dump_stack+0x32d/0x480 [ 325.736760] ? gre_rcv+0x11a3/0x1900 [ 325.740513] kmsan_report+0x12c/0x290 [ 325.744371] __msan_warning+0x76/0xc0 [ 325.748240] gre_rcv+0x11a3/0x1900 [ 325.751805] ? raw_local_deliver+0xa0/0x1890 [ 325.756237] ? ip_local_deliver_finish+0x28c/0xff0 [ 325.761243] ? erspan_xmit+0x35d0/0x35d0 [ 325.765345] gre_rcv+0x2e6/0x3c0 [ 325.768740] ? gre_parse_header+0x1470/0x1470 [ 325.773260] ip_local_deliver_finish+0x8d8/0xff0 [ 325.778078] ip_local_deliver+0x44b/0x510 [ 325.782270] ? ip_local_deliver+0x510/0x510 [ 325.786623] ? ip_call_ra_chain+0x7a0/0x7a0 [ 325.790967] ip_rcv+0x6b6/0x740 [ 325.794292] ? ip_rcv_core+0x1370/0x1370 [ 325.798389] process_backlog+0x82b/0x11e0 [ 325.802572] ? ip_local_deliver_finish+0xff0/0xff0 [ 325.807575] ? rps_trigger_softirq+0x2e0/0x2e0 [ 325.812186] net_rx_action+0x98f/0x1d50 [ 325.816211] ? net_tx_action+0xf20/0xf20 [ 325.820300] __do_softirq+0x721/0xc7f [ 325.824147] ? smp_reschedule_interrupt+0x1b8/0x670 [ 325.829202] do_softirq_own_stack+0x49/0x80 [ 325.833543] [ 325.835827] __local_bh_enable_ip+0x228/0x260 [ 325.840361] local_bh_enable+0x36/0x40 [ 325.844281] ip_finish_output2+0x1430/0x1560 [ 325.848754] ip_finish_output+0xd93/0x10f0 [ 325.853045] ip_mc_output+0xf25/0x10f0 [ 325.856993] ? ip_mc_finish_output+0x440/0x440 [ 325.861621] ? ip_build_and_send_pkt+0xe60/0xe60 [ 325.866402] raw_sendmsg+0x438a/0x45c0 [ 325.870369] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.875782] ? raw_getfrag+0x580/0x580 [ 325.879700] ? __sys_sendto+0x940/0xb80 [ 325.883701] ? compat_raw_ioctl+0x100/0x100 [ 325.888071] inet_sendmsg+0x4e9/0x800 [ 325.891913] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.897322] ? security_socket_sendmsg+0x1bd/0x200 [ 325.902301] ? inet_getname+0x490/0x490 [ 325.906310] __sys_sendto+0x940/0xb80 [ 325.910177] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 325.915657] ? prepare_exit_to_usermode+0x182/0x4c0 [ 325.920712] __se_sys_sendto+0x107/0x130 [ 325.924818] __x64_sys_sendto+0x6e/0x90 [ 325.928818] do_syscall_64+0xcf/0x110 [ 325.932656] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.937882] RIP: 0033:0x457569 [ 325.941106] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.960048] RSP: 002b:00007fde9b547c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 325.967775] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 325.975103] RDX: 0000000000000104 RSI: 0000000020000080 RDI: 0000000000000003 [ 325.976481] IPVS: ftp: loaded support on port[0] = 21 [ 325.982397] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000000001bb [ 325.982410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde9b5486d4 [ 325.982424] R13: 00000000004c406f R14: 00000000004d68f8 R15: 00000000ffffffff [ 325.982484] [ 326.011181] Uninit was stored to memory at: [ 326.015545] kmsan_internal_chain_origin+0x13d/0x240 [ 326.020668] kmsan_memcpy_memmove_metadata+0x1a9/0xf70 [ 326.025964] kmsan_memcpy_metadata+0xb/0x10 [ 326.030317] __msan_memcpy+0x61/0x70 [ 326.034069] pskb_expand_head+0x436/0x1d20 [ 326.038318] ip_tunnel_xmit+0x35a3/0x3d90 [ 326.042501] erspan_xmit+0x1bce/0x35d0 [ 326.046423] dev_hard_start_xmit+0x6dc/0xde0 [ 326.050850] sch_direct_xmit+0x59b/0x890 [ 326.054927] __qdisc_run+0x1bac/0x3600 [ 326.058843] __dev_queue_xmit+0x2131/0x3e00 [ 326.063190] dev_queue_xmit+0x4b/0x60 [ 326.067052] neigh_resolve_output+0xab7/0xb50 [ 326.071566] ip_finish_output2+0x141a/0x1560 [ 326.076048] ip_finish_output+0xd93/0x10f0 [ 326.080301] ip_mc_output+0xf25/0x10f0 [ 326.084256] raw_sendmsg+0x438a/0x45c0 [ 326.088170] inet_sendmsg+0x4e9/0x800 [ 326.091986] __sys_sendto+0x940/0xb80 [ 326.095811] __se_sys_sendto+0x107/0x130 [ 326.099900] __x64_sys_sendto+0x6e/0x90 [ 326.103916] do_syscall_64+0xcf/0x110 [ 326.107733] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.112925] [ 326.114565] Uninit was created at: [ 326.118125] kmsan_internal_poison_shadow+0x6d/0x130 [ 326.123272] kmsan_kmalloc+0xa1/0x100 [ 326.127093] kmsan_slab_alloc+0xe/0x10 [ 326.130989] __kmalloc_node_track_caller+0xf62/0x14e0 [ 326.136201] __alloc_skb+0x42b/0xeb0 [ 326.139942] alloc_skb_with_frags+0x1c9/0xa80 [ 326.144451] sock_alloc_send_pskb+0xeb3/0x14c0 [ 326.149071] sock_alloc_send_skb+0xca/0xe0 [ 326.153368] raw_sendmsg+0x2671/0x45c0 [ 326.157290] inet_sendmsg+0x4e9/0x800 [ 326.161111] __sys_sendto+0x940/0xb80 [ 326.164942] __se_sys_sendto+0x107/0x130 [ 326.169066] __x64_sys_sendto+0x6e/0x90 [ 326.173084] do_syscall_64+0xcf/0x110 [ 326.176911] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.182136] ================================================================== [ 326.190055] Disabling lock debugging due to kernel taint [ 326.195544] Kernel panic - not syncing: panic_on_warn set ... [ 326.201451] CPU: 1 PID: 8307 Comm: syz-executor4 Tainted: G B 4.20.0-rc3+ #95 [ 326.210077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.219474] Call Trace: [ 326.222081] [ 326.224289] dump_stack+0x32d/0x480 [ 326.227973] panic+0x624/0xc08 [ 326.231248] kmsan_report+0x28a/0x290 [ 326.235086] __msan_warning+0x76/0xc0 [ 326.238922] gre_rcv+0x11a3/0x1900 [ 326.242488] ? raw_local_deliver+0xa0/0x1890 [ 326.246916] ? ip_local_deliver_finish+0x28c/0xff0 [ 326.251927] ? erspan_xmit+0x35d0/0x35d0 [ 326.256009] gre_rcv+0x2e6/0x3c0 [ 326.259443] ? gre_parse_header+0x1470/0x1470 [ 326.263960] ip_local_deliver_finish+0x8d8/0xff0 [ 326.268760] ip_local_deliver+0x44b/0x510 [ 326.272957] ? ip_local_deliver+0x510/0x510 [ 326.277314] ? ip_call_ra_chain+0x7a0/0x7a0 [ 326.281657] ip_rcv+0x6b6/0x740 [ 326.285320] ? ip_rcv_core+0x1370/0x1370 [ 326.289419] process_backlog+0x82b/0x11e0 [ 326.293604] ? ip_local_deliver_finish+0xff0/0xff0 [ 326.298587] ? rps_trigger_softirq+0x2e0/0x2e0 [ 326.303202] net_rx_action+0x98f/0x1d50 [ 326.307258] ? net_tx_action+0xf20/0xf20 [ 326.311356] __do_softirq+0x721/0xc7f [ 326.315242] ? smp_reschedule_interrupt+0x1b8/0x670 [ 326.320307] do_softirq_own_stack+0x49/0x80 [ 326.324641] [ 326.326901] __local_bh_enable_ip+0x228/0x260 [ 326.331452] local_bh_enable+0x36/0x40 [ 326.335359] ip_finish_output2+0x1430/0x1560 [ 326.339808] ip_finish_output+0xd93/0x10f0 [ 326.344095] ip_mc_output+0xf25/0x10f0 [ 326.348041] ? ip_mc_finish_output+0x440/0x440 [ 326.352646] ? ip_build_and_send_pkt+0xe60/0xe60 [ 326.357418] raw_sendmsg+0x438a/0x45c0 [ 326.361379] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.366792] ? raw_getfrag+0x580/0x580 [ 326.370702] ? __sys_sendto+0x940/0xb80 [ 326.374704] ? compat_raw_ioctl+0x100/0x100 [ 326.379046] inet_sendmsg+0x4e9/0x800 [ 326.382900] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.388278] ? security_socket_sendmsg+0x1bd/0x200 [ 326.393253] ? inet_getname+0x490/0x490 [ 326.397248] __sys_sendto+0x940/0xb80 [ 326.401101] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 326.406583] ? prepare_exit_to_usermode+0x182/0x4c0 [ 326.411623] __se_sys_sendto+0x107/0x130 [ 326.415741] __x64_sys_sendto+0x6e/0x90 [ 326.419731] do_syscall_64+0xcf/0x110 [ 326.423560] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.428762] RIP: 0033:0x457569 [ 326.431965] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.450898] RSP: 002b:00007fde9b547c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 326.458619] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 326.465899] RDX: 0000000000000104 RSI: 0000000020000080 RDI: 0000000000000003 [ 326.473178] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000000001bb [ 326.480475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde9b5486d4 [ 326.487757] R13: 00000000004c406f R14: 00000000004d68f8 R15: 00000000ffffffff [ 326.496096] Kernel Offset: disabled [ 326.499735] Rebooting in 86400 seconds..