[ 51.095529] audit: type=1800 audit(1545315134.151:25): pid=6319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.650169] kauditd_printk_skb: 3 callbacks suppressed [ 52.650199] audit: type=1800 audit(1545315135.701:29): pid=6319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 52.675034] audit: type=1800 audit(1545315135.721:30): pid=6319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts. 2018/12/20 14:12:30 fuzzer started 2018/12/20 14:12:34 dialing manager at 10.128.0.26:46613 2018/12/20 14:12:34 syscalls: 1 2018/12/20 14:12:34 code coverage: enabled 2018/12/20 14:12:34 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/20 14:12:34 setuid sandbox: enabled 2018/12/20 14:12:34 namespace sandbox: enabled 2018/12/20 14:12:34 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/20 14:12:34 fault injection: enabled 2018/12/20 14:12:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/20 14:12:34 net packet injection: enabled 2018/12/20 14:12:34 net device setup: enabled 14:12:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) syzkaller login: [ 91.331312] IPVS: ftp: loaded support on port[0] = 21 [ 92.675109] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.681855] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.690095] device bridge_slave_0 entered promiscuous mode [ 92.774922] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.781449] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.789713] device bridge_slave_1 entered promiscuous mode [ 92.871909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 92.952353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 93.200491] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 93.284296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 93.366893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 93.373983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.456665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 93.463699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.705183] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 93.713637] team0: Port device team_slave_0 added [ 93.791528] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 93.800339] team0: Port device team_slave_1 added [ 93.878743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.963667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.043644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 94.051318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.060941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.143360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 94.150889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.159970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.469633] ip (6560) used greatest stack depth: 53840 bytes left 14:12:57 executing program 1: unshare(0x20400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) [ 95.180521] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.187229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.194465] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.201006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.210143] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 95.298168] IPVS: ftp: loaded support on port[0] = 21 [ 95.322094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.418907] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.425570] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.433864] device bridge_slave_0 entered promiscuous mode [ 97.581025] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.587811] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.595928] device bridge_slave_1 entered promiscuous mode [ 97.754036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 97.903745] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 98.333838] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 98.479891] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 99.073115] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 99.081923] team0: Port device team_slave_0 added [ 99.221274] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 99.229889] team0: Port device team_slave_1 added [ 99.410580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:13:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) [ 99.567171] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.759638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 99.767408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.776476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.913432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 99.921033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.930274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.139020] IPVS: ftp: loaded support on port[0] = 21 [ 101.224249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.707929] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.714674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.721833] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.728534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.738245] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 101.744965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.776405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.432388] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.438729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.446808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.049164] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.055970] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.064325] device bridge_slave_0 entered promiscuous mode [ 103.135653] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.280750] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.287373] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.295669] device bridge_slave_1 entered promiscuous mode [ 103.476989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.625787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 104.072100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.201184] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.289401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 104.297878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 104.827636] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 104.836432] team0: Port device team_slave_0 added [ 105.015447] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 105.023948] team0: Port device team_slave_1 added [ 105.207820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 105.214939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.223937] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.395538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 105.402687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.411552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.560685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.568557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.577345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.734753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 105.742413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.751383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:13:09 executing program 3: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) [ 107.198630] IPVS: ftp: loaded support on port[0] = 21 14:13:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) [ 107.675065] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.681870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.689000] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.695581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.704861] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 107.711328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:13:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) [ 108.677629] 8021q: adding VLAN 0 to HW filter on device bond0 14:13:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) [ 109.484668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 110.031148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 110.037514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.045466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.397306] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.403988] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.412020] device bridge_slave_0 entered promiscuous mode [ 110.611953] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.618495] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.626911] device bridge_slave_1 entered promiscuous mode [ 110.651584] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.856141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.009028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.463339] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 111.644665] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 111.819421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 111.826478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.978948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 111.986026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.514516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 112.523225] team0: Port device team_slave_0 added [ 112.652381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 112.661035] team0: Port device team_slave_1 added [ 112.885686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 112.893038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.902033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.025240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.032280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.041060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.139798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.147928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.156974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.339750] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.347468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.356468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.281488] 8021q: adding VLAN 0 to HW filter on device bond0 14:13:17 executing program 1: unshare(0x20400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) [ 114.933015] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 115.306250] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.312857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.320038] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.326686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.335608] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.342171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.542447] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 115.549030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.557072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.995623] 8021q: adding VLAN 0 to HW filter on device team0 14:13:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) [ 120.180954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.341205] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.500102] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.506379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.514055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.671341] 8021q: adding VLAN 0 to HW filter on device team0 14:13:25 executing program 3: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:25 executing program 1: unshare(0x20400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) 14:13:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000006c0), 0x1) 14:13:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) 14:13:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) 14:13:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) 14:13:25 executing program 1: unshare(0x20400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) 14:13:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:26 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0x8) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="57ac0e", 0x3}], 0x1, &(0x7f0000000840)=ANY=[]}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={&(0x7f0000000240)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "733fd573a93056ff3fcf9e74869b68d86a7c26c55cedb7ba673275b4496673568d9c7ded324b6e33bd664dc165b1ab54bec4798b9980070c8486fc72644cd18c"}, 0x48}}, 0x4008080) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f00000032c0)=@can, 0x80, &(0x7f0000001c00)}}], 0x1, 0x0, &(0x7f0000001d80)) 14:13:26 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) [ 123.383363] IPVS: ftp: loaded support on port[0] = 21 [ 123.386665] IPVS: ftp: loaded support on port[0] = 21 14:13:26 executing program 3: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0xc008aeba, 0x0) [ 123.576672] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 14:13:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0xc008aeba, 0x0) [ 125.004065] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.010586] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.018560] device bridge_slave_0 entered promiscuous mode [ 125.095938] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.102485] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.110710] device bridge_slave_1 entered promiscuous mode [ 125.184822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.199100] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.205707] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.214220] device bridge_slave_0 entered promiscuous mode [ 125.261533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.289296] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.295958] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.304430] device bridge_slave_1 entered promiscuous mode [ 125.380358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.456146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.496005] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.577826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.693242] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.727469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.734444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.773506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.853718] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 125.860712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.933357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.940291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.973025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.981626] team0: Port device team_slave_0 added [ 126.063796] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.072559] team0: Port device team_slave_1 added [ 126.148820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.191550] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.200083] team0: Port device team_slave_0 added [ 126.230707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.277885] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.286412] team0: Port device team_slave_1 added [ 126.311558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.321425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.330703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.362990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.408275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.415984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.425167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.448970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.519529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.527264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.536427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.617764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.625452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.634493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.323775] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.330329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.337517] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.344023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.352011] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.585956] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.592454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.599333] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.605913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.614845] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.671866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.679684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.716044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.951588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.039344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.247479] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.330078] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.336986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.345066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.553829] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.560191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.568175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.660607] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.876105] 8021q: adding VLAN 0 to HW filter on device team0 14:13:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000006c0), 0x1) 14:13:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0xc008aeba, 0x0) 14:13:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) 14:13:36 executing program 2: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:36 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:36 executing program 3: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 14:13:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0xc008aeba, 0x0) 14:13:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000006c0), 0x1) 14:13:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) 14:13:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000006c0), 0x1) 14:13:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x2}, 0x1c) listen(r1, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r3, &(0x7f0000000080), 0x1c) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$inet6_int(r3, 0x29, 0x46, &(0x7f0000000100), 0x4) accept4(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x2}, 0x1c) close(r0) [ 134.086580] ================================================================== [ 134.094053] BUG: KMSAN: uninit-value in __siphash_aligned+0x512/0xae0 [ 134.100742] CPU: 1 PID: 8149 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #8 [ 134.107893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.117274] Call Trace: [ 134.119887] dump_stack+0x173/0x1d0 [ 134.123616] kmsan_report+0x120/0x290 [ 134.127469] kmsan_internal_check_memory+0x9a7/0xa20 [ 134.132651] __msan_instrument_asm_load+0x8a/0x90 [ 134.137510] __siphash_aligned+0x512/0xae0 [ 134.141828] secure_ipv6_port_ephemeral+0x110/0x220 [ 134.146884] inet6_hash_connect+0x11f/0x1a0 [ 134.151252] tcp_v6_connect+0x20ba/0x2890 [ 134.155447] ? __msan_poison_alloca+0x1e0/0x270 [ 134.160151] ? tcp_v6_pre_connect+0x130/0x130 [ 134.164684] __inet_stream_connect+0x2f9/0x1340 [ 134.169431] inet_stream_connect+0x101/0x180 [ 134.173911] __sys_connect+0x664/0x820 [ 134.177860] ? __inet_stream_connect+0x1340/0x1340 [ 134.182825] ? prepare_exit_to_usermode+0x114/0x420 [ 134.187880] ? syscall_return_slowpath+0x50/0x650 [ 134.192781] __se_sys_connect+0x8d/0xb0 [ 134.196801] __x64_sys_connect+0x4a/0x70 [ 134.200917] do_syscall_64+0xbc/0xf0 [ 134.204658] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 134.209862] RIP: 0033:0x457669 [ 134.213098] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.232120] RSP: 002b:00007f6209381c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 134.239888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 134.247202] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000007 [ 134.254494] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.261790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f62093826d4 [ 134.269072] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 134.276351] [ 134.277989] Local variable description: ----combined@secure_ipv6_port_ephemeral [ 134.285449] Variable was created at: [ 134.289163] secure_ipv6_port_ephemeral+0x6a/0x220 [ 134.294138] inet6_hash_connect+0x11f/0x1a0 [ 134.298474] [ 134.300092] Bytes 2-7 of 8 are uninitialized [ 134.304486] Memory access of size 8 starts at ffff88815bd6f9f0 [ 134.310466] ================================================================== [ 134.317836] Disabling lock debugging due to kernel taint [ 134.323283] Kernel panic - not syncing: panic_on_warn set ... [ 134.329216] CPU: 1 PID: 8149 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #8 [ 134.337816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.347156] Call Trace: [ 134.349736] dump_stack+0x173/0x1d0 [ 134.353403] panic+0x3ce/0x961 [ 134.356616] kmsan_report+0x285/0x290 [ 134.360428] kmsan_internal_check_memory+0x9a7/0xa20 [ 134.365567] __msan_instrument_asm_load+0x8a/0x90 [ 134.370426] __siphash_aligned+0x512/0xae0 [ 134.374691] secure_ipv6_port_ephemeral+0x110/0x220 [ 134.379808] inet6_hash_connect+0x11f/0x1a0 [ 134.384236] tcp_v6_connect+0x20ba/0x2890 [ 134.388409] ? __msan_poison_alloca+0x1e0/0x270 [ 134.393082] ? tcp_v6_pre_connect+0x130/0x130 [ 134.397569] __inet_stream_connect+0x2f9/0x1340 [ 134.402337] inet_stream_connect+0x101/0x180 [ 134.406805] __sys_connect+0x664/0x820 [ 134.410743] ? __inet_stream_connect+0x1340/0x1340 [ 134.415676] ? prepare_exit_to_usermode+0x114/0x420 [ 134.420705] ? syscall_return_slowpath+0x50/0x650 [ 134.425565] __se_sys_connect+0x8d/0xb0 [ 134.429575] __x64_sys_connect+0x4a/0x70 [ 134.433655] do_syscall_64+0xbc/0xf0 [ 134.437413] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 134.442602] RIP: 0033:0x457669 [ 134.445849] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.464792] RSP: 002b:00007f6209381c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 134.472513] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 134.479816] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000007 [ 134.487105] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 134.494402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f62093826d4 [ 134.501722] R13: 00000000004bdc27 R14: 00000000004cd678 R15: 00000000ffffffff [ 134.510001] Kernel Offset: disabled [ 134.513629] Rebooting in 86400 seconds..