[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 92.795450] audit: type=1800 audit(1551716828.847:25): pid=10365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 92.814628] audit: type=1800 audit(1551716828.857:26): pid=10365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 92.834075] audit: type=1800 audit(1551716828.867:27): pid=10365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.143' (ECDSA) to the list of known hosts. 2019/03/04 16:27:24 fuzzer started 2019/03/04 16:27:30 dialing manager at 10.128.0.26:34023 2019/03/04 16:27:30 syscalls: 1 2019/03/04 16:27:30 code coverage: enabled 2019/03/04 16:27:30 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/04 16:27:30 extra coverage: extra coverage is not supported by the kernel 2019/03/04 16:27:30 setuid sandbox: enabled 2019/03/04 16:27:30 namespace sandbox: enabled 2019/03/04 16:27:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/04 16:27:30 fault injection: enabled 2019/03/04 16:27:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/04 16:27:30 net packet injection: enabled 2019/03/04 16:27:30 net device setup: enabled 16:30:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x4c) syzkaller login: [ 300.229010] IPVS: ftp: loaded support on port[0] = 21 [ 300.405833] chnl_net:caif_netlink_parms(): no params data found [ 300.482328] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.489013] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.497730] device bridge_slave_0 entered promiscuous mode [ 300.507831] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.514409] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.522892] device bridge_slave_1 entered promiscuous mode [ 300.560172] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 300.572403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 300.606949] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 300.615895] team0: Port device team_slave_0 added [ 300.622524] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.631423] team0: Port device team_slave_1 added [ 300.638823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.647668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.719607] device hsr_slave_0 entered promiscuous mode [ 300.974910] device hsr_slave_1 entered promiscuous mode [ 301.216056] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 301.224130] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 301.257883] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.264557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.272299] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.278989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.379354] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 301.386300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.396829] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.408134] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.420700] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 301.440570] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 301.454595] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 301.460910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.468927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.485212] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 301.491348] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.507822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 301.515234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.525516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.534306] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.540803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.559886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 301.567272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.576116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.584595] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.591089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.608712] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 301.618746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.632158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 301.639748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.657758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 301.666488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.675806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.692146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 301.700278] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.708840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.718063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.735709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 301.748678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 301.759873] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.769712] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.782116] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 301.789877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.798912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.808325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.817627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.827879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.858742] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 301.886304] 8021q: adding VLAN 0 to HW filter on device batadv0 16:30:38 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x7f, 0x550629ac0080db6}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x20000040) [ 302.320115] hrtimer: interrupt took 39095 ns 16:30:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0xf0, 0x0) renameat2(r0, &(0x7f0000000140)='./file0/file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) 16:30:39 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc01c7c02, 0x0) 16:30:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) capget(0x0, 0x0) r1 = gettid() rt_sigqueueinfo(0x0, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@generic={0x2}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0xffffffffffffffff) getgid() write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xfffffffffffffde3) ioctl$VT_GETMODE(r2, 0x5601, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) tkill(r1, 0x1000000000016) 16:30:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000300)={0x283}, 0x96) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7}, 0x7) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:30:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfffffffffffffff9, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000100)={0x7229, 0x6, 0x1, 0x4}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x5, 0x2, [0x8, 0x1f]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000200)=r3, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}}, &(0x7f0000000300)=0x84) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x2, 0x1, 0x20000000000000, &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x3}, 0x20) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={{}, {r4, r5/1000+30000}}) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000480)) r6 = semget$private(0x0, 0x0, 0x100) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) getgroups(0x5, &(0x7f0000000700)=[0x0, 0x0, 0xee01, 0xee01, 0xee01]) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000740)={{0x9, r7, r9, r11, r12, 0x8, 0x5}, 0x1, 0x5}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000007c0)={0x3, 0x251000000000}) clock_nanosleep(0x7, 0x0, &(0x7f0000000800)={0x0, 0x989680}, &(0x7f0000000840)) r13 = add_key$user(&(0x7f0000000880)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="d04cfdbd4e9de682f5db748c5ff1e205120e27d12c6a530c73cf2da48ec708894f929e03f6a4f5b3d50473181f0e180fc27fd4b82567db7ae29fc2b69456e749caa8aafe", 0x44, 0xfffffffffffffffb) keyctl$describe(0x6, r13, &(0x7f0000000980)=""/213, 0xd5) prctl$PR_SET_PTRACER(0x59616d61, r8) move_pages(r10, 0x2, &(0x7f0000000a80)=[&(0x7f0000ff1000/0xe000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000ac0)=[0x3, 0x2, 0x3a34, 0x101, 0x1], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) openat$cgroup_int(r2, &(0x7f0000000b40)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000bc0)={r2, 0x3, 0x1, 0xaa1a, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000c00)=@int=0xd9d, 0x4) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000d40)={&(0x7f0000000c40), 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x1c, r14, 0x628, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x80) [ 304.351137] IPVS: ftp: loaded support on port[0] = 21 16:30:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00\x00\x00\x06\x00', 0x20, 0x1, 0x98c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, 0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]}, 0xa00) setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000000)="aef452dc54d21840c2eae9e2e9161760f176dffcce8928f08d55373bd0c0f6072aad69f78e9aa9940f21fda4a9cee38ba8bdfb57e90a441c890a0f21bfdc86d4568b3dc5b65c7e10f3b4aea986f001d31ee9a34795326502354e511bc4ebf1438ff92df0fe3d1688532fb186a08cb3a0983ec23d4d554e87cd1667bcf5a3e1896887792cff89e499a4ba4a8bb8b20d6bf345d24612896d9c1a39a9621bf2e1cf6bd4b5d675323399ca101b9b4aa22e1f8bca8b24abc704472a71cf2a5355c3af9e1155efbcd7ece21309f0801526caabd9647c6b842d86a98d601379a3f618d69d7167765c848461ec321110c37c63919d4d109876f4a2", 0xf7) [ 304.527772] chnl_net:caif_netlink_parms(): no params data found [ 304.560332] kernel msg: ebtables bug: please report to author: Wrong len argument [ 304.591012] kernel msg: ebtables bug: please report to author: Wrong len argument [ 304.622333] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.629123] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.637686] device bridge_slave_0 entered promiscuous mode [ 304.648517] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.655123] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.664220] device bridge_slave_1 entered promiscuous mode [ 304.700037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 304.712015] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:30:40 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x2010, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0), 0x4) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) [ 304.745968] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 304.754797] team0: Port device team_slave_0 added [ 304.763057] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 304.771819] team0: Port device team_slave_1 added [ 304.778298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 304.786951] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 304.868702] device hsr_slave_0 entered promiscuous mode [ 304.876167] sctp: [Deprecated]: syz-executor.0 (pid 10572) Use of int in maxseg socket option. [ 304.876167] Use struct sctp_assoc_value instead [ 304.893071] sctp: [Deprecated]: syz-executor.0 (pid 10572) Use of int in maxseg socket option. [ 304.893071] Use struct sctp_assoc_value instead 16:30:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4e) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1883642bf8156967d43b422dd723560000000000000029000000370000000000000000000000d26ca2c5c35ff944467af796fe8c440859f27c1bea1d456f12217470c5a7c0cd5ed685fa934d14448e6f0da9c1214ac3529d4eb988890ca45d097eba8e1961ba380030f628df24b9eec7f04c5ce2fb0ac29693447b96251f6566e8f82ff381223a61e9466b03820610c399b9be42c23ac7ceb71e92557a2b7ba9f9f88585718fdadd7b1235841a2b3a7cc706c212b76ba7dab993540142d93198cd54b7fdb71ce4f4381c66"], 0x18}}], 0x1, 0x0) [ 304.934442] device hsr_slave_1 entered promiscuous mode [ 304.975102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 304.982870] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 305.050951] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.057668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.064862] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.071393] bridge0: port 1(bridge_slave_0) entered forwarding state 16:30:41 executing program 0: r0 = userfaultfd(0x0) signalfd(r0, &(0x7f0000000000)={0xd}, 0x8) fcntl$setflags(r0, 0x2, 0x0) [ 305.175200] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 305.181356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.238414] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 305.267035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.284762] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.295772] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.315023] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 305.346132] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 305.352272] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.381082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 16:30:41 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast2}}}, 0x98) unshare(0x2000400) [ 305.390983] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.397577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.456869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.465502] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.472004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.481981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.491439] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.548381] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 305.558935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.570655] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 16:30:41 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffc}, 0x0, 0x8) r0 = gettid() timer_create(0x2, &(0x7f0000000000)={0x0, 0x3b, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = geteuid() getgroups(0x2, &(0x7f0000000100)=[0xee00, 0xffffffffffffffff]) write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, 0x7, {{0x0, 0x0, 0x4926, 0x5c, 0x3, 0x9, {0x2, 0x10001, 0x2, 0x23, 0x3, 0x81, 0x0, 0x6, 0x1f, 0x81, 0xafc4, r2, r3, 0xb679, 0x556}}, {0x0, 0x5}}}, 0xa0) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) [ 305.595259] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.604130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.612885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.664696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.689092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 305.718327] 8021q: adding VLAN 0 to HW filter on device batadv0 16:30:41 executing program 0: eventfd2(0x9, 0x0) r0 = socket$inet(0x2, 0x801, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="96", 0x1, 0x3fff, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000380)=""/195, 0xc3, 0x0, 0x0, 0x0) 16:30:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfffffffffffffff9, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000100)={0x7229, 0x6, 0x1, 0x4}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x5, 0x2, [0x8, 0x1f]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000200)=r3, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}}, &(0x7f0000000300)=0x84) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x2, 0x1, 0x20000000000000, &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x3}, 0x20) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={{}, {r4, r5/1000+30000}}) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000480)) r6 = semget$private(0x0, 0x0, 0x100) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) getgroups(0x5, &(0x7f0000000700)=[0x0, 0x0, 0xee01, 0xee01, 0xee01]) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000740)={{0x9, r7, r9, r11, r12, 0x8, 0x5}, 0x1, 0x5}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000007c0)={0x3, 0x251000000000}) clock_nanosleep(0x7, 0x0, &(0x7f0000000800)={0x0, 0x989680}, &(0x7f0000000840)) r13 = add_key$user(&(0x7f0000000880)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="d04cfdbd4e9de682f5db748c5ff1e205120e27d12c6a530c73cf2da48ec708894f929e03f6a4f5b3d50473181f0e180fc27fd4b82567db7ae29fc2b69456e749caa8aafe", 0x44, 0xfffffffffffffffb) keyctl$describe(0x6, r13, &(0x7f0000000980)=""/213, 0xd5) prctl$PR_SET_PTRACER(0x59616d61, r8) move_pages(r10, 0x2, &(0x7f0000000a80)=[&(0x7f0000ff1000/0xe000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000ac0)=[0x3, 0x2, 0x3a34, 0x101, 0x1], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) openat$cgroup_int(r2, &(0x7f0000000b40)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000bc0)={r2, 0x3, 0x1, 0xaa1a, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000c00)=@int=0xd9d, 0x4) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000c80)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000d40)={&(0x7f0000000c40), 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x1c, r14, 0x628, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x80) 16:30:42 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x3) 16:30:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3ff, 0x4401fc) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = eventfd(0x9) fcntl$setlease(r2, 0x400, 0xfffffffffffffffd) write$evdev(r0, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x0, 0x2}], 0xffffff28) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r1, &(0x7f0000000180)="c482e02ed23949123626eaffec203d139fb30c9d65d1203fb721f1a6cd50fd15672bc4b2518ada06cc3236d2fd0ef15bd89cedb619c81f99f4d933022dad3250f2ad6a9cbfcd49494125f806b4d12d0d6bd0ee7cb6989a2527837f2d2ac869433f5b732a3a368a869c1b51bf09fc28d13e1305085befdb9080405c23848391de0a855b22f83e71a438d133805cfded1627", &(0x7f0000000240)=""/234}, 0x18) 16:30:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x4004000, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000000c0)=""/22) 16:30:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) get_thread_area(&(0x7f00000000c0)={0x203, 0x20001000, 0x1000, 0xdc4, 0x128, 0x1, 0x94, 0x7, 0xb70, 0xffffffff7fffffff}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0xfffffffffffffffc, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000080)={0x2a6, 0x0, 0x1, 0x0, 0x0, [{r1, 0x0, 0xff}]}) 16:30:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r1, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000340)=0x100000001) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8001, 0x100) r3 = getuid() sendmsg$nl_netfilter(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, 0x14, 0xf, 0x700, 0x70bd2a, 0x25dfdbfe, {0xa, 0x0, 0x5}, [@typed={0x8, 0x50, @u32=0xfff}, @generic="7755a862050a2dc4af160c38643fb83af8d736471fade4c347cda732ca62dd8bb7b03b6ab110df7bf8de15ed559c0e189ad7ca655b35cf11943db5912488308ffe4301d9a4cac9a8a3cf6fe7", @generic="b47ef4a4fca2c7f63b65caa953869b9722f195c78daabc2afb02689b9ec2883a94abb3331d63cd22ba7dfb502f9a5de10bfec1b3cb73d18ca99d961d7a211ddcd3c12ad8a81acb79bdcc88ac6bb132f299ecff1e51582eb9929c809d9f663fb22bab8f1932a885f33084885f75c8730b4e0f8fb90ad64e4eeaf3bfdd269d0974dffece968dba22cce3b0afd0507b786af11d7080569df454d455da7af8bcdadaaadf434dd18a08e68eb1ed72a09a8af5e8a79cce156550ce99c535d594f910b4a63d1d22f85f1a725988626897126b0cea71cbd445387a8581b0fde770526457b7bfbadee89c02028de6959ee3379ede3410a18b9c93", @typed={0x8, 0x7a, @uid=r3}]}, 0x168}, 0x1, 0x0, 0x0, 0x40}, 0x1) 16:30:42 executing program 0: r0 = socket(0x400200000000010, 0x80000000002, 0x0) memfd_create(&(0x7f0000001080)='\x00', 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000010c0)={0x0, 0x1, 0x2, 0x6, 0xa2fb, 0xa13}, &(0x7f0000001100)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001140)=@assoc_value={r2, 0x4}, &(0x7f0000001180)=0x8) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000011c0)={0x18, 0x0, {0x2, @broadcast, 'bcsh0\x00'}}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000080)=""/4096) write(r0, &(0x7f0000000000)="240000002a007fc34b00000000ed76012c0aaf4bc900ff01000000000000ffff010002bd", 0x3d3) socket(0x8, 0x80006, 0x8) 16:30:42 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'ip6gre0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x5, 0x9, &(0x7f0000000100)="2fbef9486cb2005f0759776cfc583c456d95bbe94b3329282ab1f2449660a6c060345b9f4855a6bea57e929bef3dc32f64", 0x31) 16:30:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) mq_getsetattr(r1, &(0x7f0000000140)={0x8000000, 0x8000, 0xca3, 0x40, 0x8, 0x7fff, 0x8001, 0x2}, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8001, 0x0) connect$tipc(r2, &(0x7f0000000200)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x3}}, 0x10) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9cc, 0x31cc, 0x8000}) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000014c0)="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", 0x4e0}], 0x1, 0x0, 0xfffffffffffffdf6}, 0x0) 16:30:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x37, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80000000, 0x4400) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/189, &(0x7f0000000200)=0xbd) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80200) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl(r1, 0xfff7ffffffffffc8, &(0x7f0000000400)) 16:30:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1b9343, 0x0) getpeername$tipc(r1, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0xf401, 0x1f4, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 307.116593] IPVS: length: 189 != 8 [ 307.131478] IPVS: length: 189 != 8 16:30:43 executing program 0: clock_gettime(0x0, &(0x7f00000042c0)={0x0, 0x0}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x121100, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000040c0)=[{{&(0x7f0000000440)=@nfc, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/132, 0x84}, {&(0x7f0000000580)=""/126, 0x7e}, {&(0x7f0000000600)=""/79, 0x4f}, {&(0x7f0000000680)}], 0x4, &(0x7f0000000700)=""/43, 0x2b}, 0x3f}, {{&(0x7f0000000740)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/63, 0x3f}, {&(0x7f0000001800)=""/22, 0x16}, {&(0x7f0000001840)=""/218, 0xda}, {&(0x7f0000001940)=""/43, 0x2b}, {&(0x7f0000001980)=""/234, 0xea}], 0x6, &(0x7f0000001b00)=""/113, 0x71}, 0x100000001}, {{&(0x7f0000001b80)=@nl=@unspec, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c00)=""/116, 0x74}, {&(0x7f0000001c80)=""/39, 0x27}], 0x2, &(0x7f0000001d00)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002d00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f0000003140)=[{&(0x7f0000002d80)=""/254, 0xfe}, {&(0x7f0000002e80)=""/142, 0x8e}, {&(0x7f0000002f40)=""/249, 0xf9}, {&(0x7f0000003040)=""/229, 0xe5}], 0x4, &(0x7f0000003180)=""/86, 0x56}, 0x6}, {{&(0x7f0000003200)=@caif=@dgm, 0x80, &(0x7f0000003540)=[{&(0x7f0000003280)=""/139, 0x8b}, {&(0x7f0000003340)=""/178, 0xb2}, {&(0x7f0000003400)=""/135, 0x87}, {&(0x7f00000034c0)=""/107, 0x6b}], 0x4, &(0x7f0000003580)=""/239, 0xef}, 0x8}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000003680)=""/212, 0xd4}, {&(0x7f0000003780)=""/225, 0xe1}], 0x2, &(0x7f00000038c0)=""/83, 0x53}, 0xfff}, {{&(0x7f0000003940)=@nfc, 0x80, &(0x7f0000003cc0)=[{&(0x7f00000039c0)=""/71, 0x47}, {&(0x7f0000003a40)=""/215, 0xd7}, {&(0x7f0000003b40)=""/165, 0xa5}, {&(0x7f0000003c00)=""/175, 0xaf}], 0x4, &(0x7f0000003d00)=""/106, 0x6a}, 0x81a0}, {{&(0x7f0000003d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003e00)}, {&(0x7f0000003e40)=""/85, 0x55}, {&(0x7f0000003ec0)=""/186, 0xba}, {&(0x7f0000003f80)=""/236, 0xec}], 0x4}, 0x1f}], 0x8, 0x2000, &(0x7f0000004300)={r0, r1+10000000}) accept$unix(r2, 0x0, &(0x7f0000004340)) r3 = socket$l2tp(0x18, 0x1, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x154, r5, 0x720, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4252}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x7bef}}, {0x14, 0x2, @in={0x2, 0x4e23}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x247}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl(r3, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4010, r6, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) ioprio_get$uid(0x100000080005, r7) 16:30:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0366f301001800000000000000000000001800000000000000009349a7970bd0fd3ef7c48b5e61aacd37fda8096127928e976f94f5887e5ceef3f513e8626b8d4c52225bdbb300edec1b6d79bc1431b9223d1096c9"], 0x0, 0x5e}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a06", 0x12}], 0x1) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)={0x44000000, 0x6e7, 0x6}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000180)=0xffffffffffffff86) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:30:43 executing program 0: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fcntl$setpipe(r0, 0x407, 0x0) unshare(0x20400) close(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) 16:30:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000100)) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r0, r2, 0x0, 0x2000000000b) 16:30:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001180), 0x245, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) dup3(r0, r0, 0x80000) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 16:30:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="01015604000000bf", 0x8) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x3, 0x0, 0x3ff}) 16:30:44 executing program 1: r0 = socket$inet(0x10, 0x0, 0x5) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000300001d85687f0000000400ff7e280000000c0a43ba5d8060000000060000000029ec2400020cd37ed01cc0730ec279b287bf4042d1", 0x4c}], 0x1}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80000, 0x0) 16:30:44 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000440)={0x10800000015, 0x4000000001, 0x0, "e5d6643b1bdf5e920cdfc27cd42875146ee351a0813de92acc3400"}) ioctl$KDENABIO(r0, 0x4b36) 16:30:44 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000200)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x44}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 16:30:44 executing program 1: mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x120013, r0, 0x0) getsockname$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) 16:30:44 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/4096, 0x1000) setsockopt$sock_attach_bpf(r0, 0x84, 0x14, &(0x7f0000000180), 0x8) 16:30:45 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000cab5b3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000d6af50)={{0x80}, 'port0\x00'}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc058, 0x200800) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000c03000)={{0x20000000000080}, '\nL\xea\xa0]\xad\x12n\x00\x00\x00\x02\xa1V\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xd5vX\x97\x01\xa4', 0x77, 0x10000a}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r2, r0) 16:30:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00\xf8\xff\xff\xaf\xb1\xf96\x1d\xaf[g', 0x4007}) ioctl$TUNSETOFFLOAD(r0, 0x400454de, 0x8000000000000000) modify_ldt$write2(0x11, &(0x7f0000000000)={0xc544, 0x0, 0x400, 0x6, 0x8b, 0x80000001, 0x21eb, 0x0, 0x5, 0xfff}, 0x10) 16:30:45 executing program 1: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x40000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x40, 0x6, @local}, 0xe) write$binfmt_aout(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="080100007d020000ad0300009b010000320000000000000008000000000000001906ce3bea8825ff8b0efabd32e6944771f1e01cf68b7dcb3f97e626eb79d01073cf3b67bb700fb56f275e0d9fcfd1f94bf6e1b57bb42c3c95f45eab578067bf66d9fd89"], 0x64) 16:30:45 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x20ffffffdff7fffa, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f000020d000/0x1000)=nil, 0x1000, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000080)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x10000) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x7fffffff, 0x9, 0xffffffffffff7fff, 0x5, 0x3, 0x401, 0x5}, 0x1c) 16:30:45 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x80000000002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xb8216b89defd5158, 0x6, 0x0, @buffer={0x0, 0x1b, &(0x7f0000000200)=""/27}, &(0x7f0000000240)='\x00\x00\x00\x00\x00\x00', &(0x7f0000000140)=""/126, 0x0, 0x0, 0x0, &(0x7f00000002c0)}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/79, 0x4f}], 0x1) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000380)=0x1) r2 = getpgrp(0x0) capget(&(0x7f0000000080)={0x39980732, r2}, &(0x7f0000000100)={0x9, 0x2, 0x4, 0x79e6, 0x0, 0x10000}) 16:30:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040415c03b3e50570b0000000000000400c0073510fbff0000b408000100fa9771172100000020"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xfe94}], 0x1}, 0x0) 16:30:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000000000)=""/11, 0x6) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000140)=@buf) socketpair(0xa, 0xa, 0x98, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) socketpair(0x12, 0x5, 0x100000000, &(0x7f00000000c0)) r3 = dup3(r1, r2, 0x80000) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) syz_execute_func(&(0x7f0000000200)="3666440f9bf56664400f9f3241c3c4e2c9975842c481c27d794e00000f11581010198c7f7fcd04af6e0f01db") 16:30:45 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) add_key(&(0x7f0000000340)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="9a", 0x1}], 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@dellink={0x60, 0x11, 0x222, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, 0x120, 0x2000}, [@IFLA_LINK_NETNSID={0x8}, @IFLA_PROMISCUITY={0x8, 0x1e, 0xfffffffffffffffa}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x1ff}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x3}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x8}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_IF_NETNSID={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x9}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4008081) getuid() ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000400)={{0x1, 0x2, 0xdd, 0x1, 0x1000}, 0x5, 0x10001, 'id1\x00', 'timer1\x00', 0x0, 0x5, 0x2b97, 0x3, 0xfff}) 16:30:45 executing program 0: socketpair(0x1f, 0x7, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)='`', 0x1}], 0x1) [ 309.854436] sg_write: process 43 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. 16:30:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) write$uinput_user_dev(r0, &(0x7f0000000980)={'syz0\x00'}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x80b) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000000)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x18000000]}, 0x45c) [ 310.056290] input: syz0 as /devices/virtual/input/input8 [ 310.097560] input: syz0 as /devices/virtual/input/input9 16:30:46 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x84000, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x72c5450f, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000080)) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {0x3, 0x8001, 0x9, 0xd8b1}, 0x12, [0x5, 0x8, 0x9, 0x0, 0x4, 0x8, 0x8, 0x5, 0x0, 0xffffffffffff5000, 0x8, 0x9, 0x3, 0x0, 0x2, 0x5, 0x0, 0x9, 0xf6f5, 0x100000, 0xffffffffffffffff, 0x10000, 0x484b51b8, 0x0, 0x80, 0x2, 0x1, 0x400, 0x231, 0x400, 0x7, 0x8, 0x100, 0x3ff, 0xf3, 0x3, 0x200, 0x9, 0x400, 0x4, 0x1ffc000000, 0x4, 0xffff, 0x400, 0xc6e, 0x7, 0x20, 0x4, 0x6, 0x4, 0x6, 0x5, 0x3ff, 0x9, 0x4, 0x0, 0x7fff, 0x10001, 0x77c, 0x3, 0x7, 0x401, 0x5, 0x3], [0xc0, 0x1f, 0x0, 0x33, 0xfffffffffffffffd, 0xffffffffffffffff, 0x9, 0x7, 0x7, 0x8, 0x4, 0x2, 0x1, 0x217, 0xffffffff, 0x7ff, 0xfffffffffffffff7, 0x7, 0x3, 0x6, 0x81, 0x3, 0x9, 0xb6, 0x0, 0x2, 0x1000, 0x800, 0x10, 0x7fffffff, 0x100000000, 0x3f, 0x62ffb1ec, 0x100000000, 0x6, 0x3f, 0x1, 0xffffffffffff8600, 0x89, 0x100, 0x8000, 0x3ff, 0x1000, 0x83d9, 0x7fffffff, 0x7fffffff, 0xd, 0x0, 0x1, 0x4, 0xb1bc, 0x7, 0x3, 0x8, 0xb0c, 0x81, 0xfff, 0x4, 0x0, 0xffffffffffffff01, 0x6, 0x1, 0x7, 0x6], [0x2, 0x7ff, 0x2, 0x2, 0x8, 0x2, 0x7, 0x4, 0x5332, 0x8, 0x7fff, 0x5, 0x9, 0x6, 0x1, 0x8000, 0x100000001, 0x2, 0x800000000000000, 0x6, 0x4, 0x4, 0xa67, 0x2, 0x4c, 0x9, 0x8, 0x1b9e98ba, 0x7eacdbc0, 0x7, 0x5, 0x1715, 0x0, 0x4, 0x6, 0x7fff, 0xf59, 0x5, 0x13, 0xffffffff, 0x6, 0x9, 0x9, 0x5389dcb0, 0x9, 0x31479216, 0x7, 0x5, 0x7f, 0x8, 0x7, 0x1, 0x0, 0xfff, 0x2, 0xffff, 0x80, 0xce25, 0x7, 0xffffffffffff414d, 0x7, 0x8001, 0xaf, 0x4], [0x9, 0x7, 0x4faaa361, 0x1, 0x5, 0xffffffffffff0001, 0x1, 0x7, 0x9, 0x1, 0x1, 0x7, 0xe0ac, 0x1ff, 0x400, 0x1, 0x9, 0x100000000, 0x9, 0x1, 0x8766, 0x6, 0x7, 0xbea1, 0x4, 0x10000, 0x3f, 0xef9f, 0x6, 0x9, 0x3, 0x100000001, 0x5, 0x6, 0x6, 0x800, 0x0, 0x2, 0x4, 0x100000000, 0x2, 0x9, 0x0, 0xca, 0xfffffffffffffffc, 0x3, 0x4800000000000, 0x40, 0x4, 0xfff, 0x401, 0x4, 0x2, 0x7fff, 0x7060, 0x400, 0x1000, 0x6c, 0x0, 0x908, 0x80, 0x9, 0x80000001, 0xd37]}, 0x45c) getsockname$netlink(r0, &(0x7f00000005c0), &(0x7f0000000600)=0xc) read$alg(r0, &(0x7f0000000640)=""/254, 0xfe) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000740)='yeah\x00', 0x5) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000780)=0x1, 0x4) fallocate(r0, 0x0, 0xac5c, 0x10001) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) fstat(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000007c0)='/dev/loop0\x00', &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='fuseblk\x00', 0x8000, &(0x7f0000000ac0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions='default_permissions'}], [{@fsuuid={'fsuuid', 0x3d, {[0x77, 0x66, 0x34, 0x0, 0x64, 0x7d, 0x36, 0x30], 0x2d, [0x76, 0x77, 0x32, 0x77], 0x2d, [0x77, 0x37, 0x34, 0x61], 0x2d, [0x33, 0x67, 0x79, 0x38], 0x2d, [0x33, 0x79, 0x7f, 0x35, 0x77, 0x38, 0x37]}}}, {@fowner_lt={'fowner<', r5}}, {@appraise='appraise'}]}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) write$FUSE_LSEEK(r0, &(0x7f0000000c80)={0x18, 0x0, 0x1, {0x4}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000cc0)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x1, 0x0, 0x0, 0x5, 0xfffffffffffffffd}, &(0x7f0000000d80)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000dc0)={r7, @in6={{0xa, 0x4e23, 0x80, @remote, 0x7ff}}, [0x675, 0x40, 0x2, 0x101, 0x3, 0x9, 0x9, 0x8, 0x4, 0x7ff, 0x401, 0x29, 0xfffffffffffffffe, 0x8, 0x81]}, &(0x7f0000000ec0)=0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000f40)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000f00)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000f80)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7fff, @rand_addr="dc4f5000ef535dcfc59de92b59ece2ef", 0x1}, {0xa, 0x4e22, 0x2, @remote, 0x5}, r8, 0x3}}, 0x48) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000001000)=0x3) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000001040)={0x8, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000010c0)={0x0, 0x1f, 0x4, &(0x7f0000001080)=0x7fff}) write$FUSE_DIRENT(r0, &(0x7f0000001100)={0x80, 0x0, 0x2, [{0x0, 0x0, 0x6, 0xd31, ')nodev'}, {0x5, 0x1, 0x5, 0x7f5, 'syz0\x00'}, {0x4, 0x0, 0x12, 0x80, '/proc/capi/capi20\x00'}]}, 0x80) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001180)=""/229) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000001280)=0x5) fsetxattr$system_posix_acl(r0, &(0x7f00000012c0)='system.posix_acl_access\x00', &(0x7f0000001300)={{}, {0x1, 0x2}, [{0x2, 0x0, r3}, {0x2, 0x1, r2}, {0x2, 0x4, r3}, {0x2, 0x2, r2}, {0x2, 0x3, r3}], {0x4, 0x2}, [{0x8, 0x1, r4}, {0x8, 0x7, r6}, {0x8, 0x1, r4}, {0x8, 0x0, r4}, {0x8, 0x3, r4}, {0x8, 0x2, r4}, {0x8, 0x4, r6}, {0x8, 0x5, r4}, {0x8, 0x1, r6}], {0x10, 0x1}, {0x20, 0x2}}, 0x94, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000013c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000014c0)=0xe8) ioctl$int_in(r0, 0x0, &(0x7f0000001500)=0x946) sendto(r0, &(0x7f0000001540)="6d6ecfd79b3e0bba30e0b2e6c6f93efbb4f050010e5e6b3589a2579acca437f07e3eeb7499e787827fb4615b345b98dad81f4b2ac4fa384e39a0de2a", 0x3c, 0x2004c884, &(0x7f0000001580)=@ll={0x11, 0xf, r9, 0x1, 0x7f}, 0x80) 16:30:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000084000000050000042000400000000000b901f7fe5b09c9abdc17ce369c2585c134f2241e38b3b589e3b97c3898bbacc59f1fb9373a43f243b0cf6b94c738f99df44289508498c8d8810b353c"], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e22, 0x4, @remote, 0x1}}, 0x2, 0xfffffffffffffffa}, &(0x7f0000000100)=0x90) 16:30:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl(r1, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x4}, 0x10) 16:30:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'pecurity.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl(r1, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x4}, 0x10) [ 311.013873] IPVS: ftp: loaded support on port[0] = 21 16:30:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000180)=0x8) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000000), 0xffffffffffffff3f}}, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xa7}) [ 311.268179] chnl_net:caif_netlink_parms(): no params data found 16:30:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x1000000000002, 'bridge_slave_0\x00'}, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x118b, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), 0x4) [ 311.366141] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.372694] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.381256] device bridge_slave_0 entered promiscuous mode [ 311.426026] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.432587] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.441331] device bridge_slave_1 entered promiscuous mode [ 311.482999] ================================================================== [ 311.490432] BUG: KMSAN: uninit-value in gue6_err+0x475/0xc40 [ 311.496247] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0-rc1+ #9 [ 311.502922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.512281] Call Trace: [ 311.514902] dump_stack+0x173/0x1d0 [ 311.518564] kmsan_report+0x12e/0x2a0 [ 311.522396] __msan_warning+0x82/0xf0 [ 311.526227] gue6_err+0x475/0xc40 [ 311.529734] ? fou6_build_header+0x640/0x640 [ 311.534155] __udp6_lib_err+0x18d0/0x2590 [ 311.538385] udpv6_err+0x118/0x130 [ 311.541961] icmpv6_notify+0x462/0x9f0 [ 311.545875] ? udpv6_rcv+0x70/0x70 [ 311.549439] icmpv6_rcv+0x18ac/0x3fa0 [ 311.553322] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.558535] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 311.562706] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 311.567682] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.572924] ip6_input+0x2b6/0x350 [ 311.576494] ? ip6_input+0x350/0x350 [ 311.580229] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 311.585436] ip6_rcv_finish+0x4e7/0x6d0 [ 311.589443] ipv6_rcv+0x34b/0x3f0 [ 311.592928] ? local_bh_enable+0x40/0x40 [ 311.597010] process_backlog+0x756/0x10e0 [ 311.601197] ? ip6_rcv_finish+0x6d0/0x6d0 [ 311.605373] ? rps_trigger_softirq+0x2e0/0x2e0 [ 311.609977] net_rx_action+0x78b/0x1a60 [ 311.613997] ? net_tx_action+0xca0/0xca0 [ 311.618076] __do_softirq+0x53f/0x93a [ 311.621909] ? ksoftirqd_should_run+0x30/0x30 [ 311.626423] run_ksoftirqd+0x26/0x50 [ 311.630157] smpboot_thread_fn+0x4d0/0x9f0 [ 311.634437] kthread+0x4a1/0x4e0 [ 311.637832] ? cpu_report_death+0x190/0x190 [ 311.642175] ? schedule_tail+0x1b2/0x410 [ 311.646258] ? kthread_blkcg+0xf0/0xf0 [ 311.650172] ret_from_fork+0x35/0x40 [ 311.653909] [ 311.655534] Uninit was created at: [ 311.659086] kmsan_internal_poison_shadow+0x92/0x150 [ 311.664201] kmsan_kmalloc+0xa6/0x130 [ 311.668013] kmsan_slab_alloc+0xe/0x10 [ 311.671915] __kmalloc_node_track_caller+0xe9e/0xff0 [ 311.677031] __alloc_skb+0x309/0xa20 [ 311.680757] alloc_skb_with_frags+0x1c7/0xac0 [ 311.685265] sock_alloc_send_pskb+0xafd/0x10a0 [ 311.689862] sock_alloc_send_skb+0xca/0xe0 [ 311.694110] __ip6_append_data+0x42ed/0x5dc0 [ 311.698530] ip6_append_data+0x3c2/0x650 [ 311.702598] icmp6_send+0x2f5c/0x3c40 [ 311.706409] icmpv6_send+0xe5/0x110 [ 311.710049] ip6_link_failure+0x5c/0x2c0 [ 311.714122] ndisc_error_report+0x106/0x1a0 [ 311.718460] neigh_invalidate+0x359/0x8e0 [ 311.722617] neigh_timer_handler+0xdf2/0x1280 [ 311.727124] call_timer_fn+0x285/0x600 [ 311.731019] __run_timers+0xdb4/0x11d0 [ 311.734916] run_timer_softirq+0x2e/0x50 [ 311.738991] __do_softirq+0x53f/0x93a [ 311.742789] ================================================================== [ 311.750171] Disabling lock debugging due to kernel taint [ 311.755629] Kernel panic - not syncing: panic_on_warn set ... [ 311.761531] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.0.0-rc1+ #9 [ 311.769587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.778947] Call Trace: [ 311.781565] dump_stack+0x173/0x1d0 [ 311.785222] panic+0x3d1/0xb01 [ 311.788483] kmsan_report+0x293/0x2a0 [ 311.792316] __msan_warning+0x82/0xf0 [ 311.796148] gue6_err+0x475/0xc40 [ 311.799659] ? fou6_build_header+0x640/0x640 [ 311.804085] __udp6_lib_err+0x18d0/0x2590 [ 311.808316] udpv6_err+0x118/0x130 [ 311.811895] icmpv6_notify+0x462/0x9f0 [ 311.815830] ? udpv6_rcv+0x70/0x70 [ 311.819394] icmpv6_rcv+0x18ac/0x3fa0 [ 311.823276] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.828496] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 311.832664] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 311.837643] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 311.842892] ip6_input+0x2b6/0x350 [ 311.846464] ? ip6_input+0x350/0x350 [ 311.850200] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 311.855404] ip6_rcv_finish+0x4e7/0x6d0 [ 311.859407] ipv6_rcv+0x34b/0x3f0 [ 311.862895] ? local_bh_enable+0x40/0x40 [ 311.866983] process_backlog+0x756/0x10e0 [ 311.871171] ? ip6_rcv_finish+0x6d0/0x6d0 [ 311.875351] ? rps_trigger_softirq+0x2e0/0x2e0 [ 311.879947] net_rx_action+0x78b/0x1a60 [ 311.883968] ? net_tx_action+0xca0/0xca0 [ 311.888048] __do_softirq+0x53f/0x93a [ 311.891892] ? ksoftirqd_should_run+0x30/0x30 [ 311.896405] run_ksoftirqd+0x26/0x50 [ 311.900140] smpboot_thread_fn+0x4d0/0x9f0 [ 311.904416] kthread+0x4a1/0x4e0 [ 311.907798] ? cpu_report_death+0x190/0x190 [ 311.912141] ? schedule_tail+0x1b2/0x410 [ 311.916230] ? kthread_blkcg+0xf0/0xf0 [ 311.920141] ret_from_fork+0x35/0x40 [ 311.924664] Kernel Offset: disabled [ 311.928297] Rebooting in 86400 seconds..