Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. [ 56.806839] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 07:16:31 fuzzer started [ 60.748964] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 07:16:35 dialing manager at 10.128.0.26:36867 2018/10/08 07:16:36 syscalls: 1 2018/10/08 07:16:36 code coverage: enabled 2018/10/08 07:16:36 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 07:16:36 setuid sandbox: enabled 2018/10/08 07:16:36 namespace sandbox: enabled 2018/10/08 07:16:36 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 07:16:36 fault injection: enabled 2018/10/08 07:16:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 07:16:36 net packed injection: enabled 2018/10/08 07:16:36 net device setup: enabled [ 65.451629] random: crng init done 07:18:14 executing program 0: [ 161.593848] IPVS: ftp: loaded support on port[0] = 21 [ 163.564789] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.571314] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.579399] device bridge_slave_0 entered promiscuous mode [ 163.685963] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.692461] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.700306] device bridge_slave_1 entered promiscuous mode [ 163.806975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.913601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.246740] bond0: Enslaving bond_slave_0 as an active interface with an up link 07:18:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400), 0x0) sendmmsg$alg(r2, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write(r2, &(0x7f0000000240)="6e9ee8630f8b0ab06df4e884ff9b7707c22dc082ad48de3ba284dc39e025a98f000cbf987c07dd1dbfec5314096fb0f07613f72a7de7a7fbf45caf552135572456fcaf1904d18a1148cd1e9008ca20976624d2e468547b73217854afe6f3390f5076012beb10cbc7373b20c33f9aa5187974956b4f8c3014d93599a029bf6547c2f022e8f125527a2be684ee621c013685da1325f72355bfccc8cb4f2028cdcea004a4d0c05d1ba2816bc613c86e7849c2a12a5b969f243bb70c435792c0492460e07a7904e7e0f96142c45ae0e3fb6676109605643732d5b2e8deaa33078700", 0xe0) recvmmsg(r2, &(0x7f0000005d00)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000400)=""/223, 0xdf}], 0x1, &(0x7f0000000500)=""/198, 0xc6}}], 0x1, 0x0, &(0x7f0000005ec0)) [ 164.359383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.537838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.545808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.015278] IPVS: ftp: loaded support on port[0] = 21 [ 165.211202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.219152] team0: Port device team_slave_0 added [ 165.495036] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.502928] team0: Port device team_slave_1 added [ 165.660353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.667620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.676201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.875032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.882236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.890628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.040003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.047641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.056222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.260863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.268330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.276900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.903071] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.909510] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.917399] device bridge_slave_0 entered promiscuous mode [ 168.070046] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.076549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.083390] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.089795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.098067] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:18:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000009c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000980)={&(0x7f0000000600)=@updpolicy={0xb8, 0x19, 0x203, 0x0, 0x0, {{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 168.177615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.191006] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.197510] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.205460] device bridge_slave_1 entered promiscuous mode [ 168.439480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.660595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 168.869114] IPVS: ftp: loaded support on port[0] = 21 [ 169.327758] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.556035] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 169.709866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 169.716991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.938178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 169.945570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.753121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.761112] team0: Port device team_slave_0 added [ 170.951507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.959569] team0: Port device team_slave_1 added [ 171.160898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.399061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.406291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.414957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.691069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.698734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.707398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.879625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 171.887317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.895904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.460271] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.466970] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.475331] device bridge_slave_0 entered promiscuous mode [ 172.804778] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.811272] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.819305] device bridge_slave_1 entered promiscuous mode [ 173.012362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 173.227403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.018340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.290765] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:18:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r1 = dup(r0) write$P9_RCLUNK(r1, &(0x7f0000000040)={0xfffffffffffffee5}, 0xffffffffffffffc4) [ 174.437104] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.443644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.450951] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.457459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.465635] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 174.584273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.591338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.885448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 174.892946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.343392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.480506] IPVS: ftp: loaded support on port[0] = 21 [ 175.955948] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 175.963921] team0: Port device team_slave_0 added [ 176.311061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 176.318926] team0: Port device team_slave_1 added [ 176.687050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 176.694284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.702975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.948322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 176.955429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.964024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.198687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.206373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.215091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.516543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.524201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.532818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.488331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.547211] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 180.497160] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.503703] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.511767] device bridge_slave_0 entered promiscuous mode [ 180.692188] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 180.698599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.706475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.774933] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.781484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.788372] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.794841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.803706] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.816270] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.822835] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.830834] device bridge_slave_1 entered promiscuous mode [ 181.051863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.190013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.441936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 181.832858] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.259263] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.511510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.781361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.788596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.093101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.100119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:18:36 executing program 4: r0 = epoll_create(0x6) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) [ 184.076014] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.084032] team0: Port device team_slave_0 added [ 184.431197] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.439105] team0: Port device team_slave_1 added [ 184.545715] IPVS: ftp: loaded support on port[0] = 21 [ 184.880664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.887816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.896507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.284986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.292360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.300870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.640534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.649333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.657942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.961092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.968943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.977585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.155137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.607246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.036139] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.042603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.050392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.270166] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.276724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.283692] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.290124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.298180] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 07:18:43 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 07:18:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100), &(0x7f0000000140)=0x8) sendto(r0, &(0x7f0000000000)="4708df93a1354651e0d677907ba86098c0d17634d850cc20943b346d1ee2ecb2ddc24c930f30d382d25120828b8d4b6a9cb891a8d8ee34baec4155b970d7b512e87eb922de47269b96c66b", 0x4b, 0x0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x0, 0x3, 0x1, {0xa, 0x4e23, 0x2, @ipv4={[], [], @multicast1}}}}, 0x80) [ 190.852493] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.858980] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.867444] device bridge_slave_0 entered promiscuous mode [ 191.061916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.279532] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.286132] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.294446] device bridge_slave_1 entered promiscuous mode [ 191.458499] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.670499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 192.031082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 07:18:45 executing program 0: r0 = memfd_create(&(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0) lseek(r0, 0xfffffffffffffffd, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xa29) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000002c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000300)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) getsockname$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a00)={&(0x7f0000000000), 0xc, &(0x7f00000009c0)={&(0x7f0000000740)={0x274, r1, 0x708, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x258, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x809}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7, 0x7, 0x6, 0xec74}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x274}, 0x1, 0x0, 0x0, 0x40040}, 0x4) 07:18:45 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x200000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)={0x6, [0x7, 0x8000, 0x0, 0xfffffffffffffff8, 0xffffffff, 0xffffffffffffd23c]}, 0x10) write$P9_RMKDIR(r2, &(0x7f0000000240)={0x14, 0x49, 0x1, {0x20, 0x0, 0x2}}, 0x14) recvmsg(r0, &(0x7f00000048c0)={&(0x7f00000033c0)=@hci, 0x80, &(0x7f0000004740), 0x0, &(0x7f0000000140)=""/251, 0xfb}, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x423, &(0x7f000018f000)=ANY=[@ANYBLOB="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"], 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@in={0x2, 0x4e21}, 0x80}, 0x0) 07:18:46 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)="2f70726f632f76657273696f6e005aa2ac0000b8b5a28a29aecbf843385a51250398ce12d984f52a149eaf9866f3c33828fe73d4f319528bbd89fcefb625adac46df7522ebb23c98ad69bdc82509df6f43791702000000ca02988905b672c3a20d10f890b9f57724340b384eca6136eae4fd4a015e073076b8f1cde45eea0f0f0c3ca64ebdd0cefc0d9e8ea91d0bbba500000000000000000000000000000000", 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0) [ 193.097449] bond0: Enslaving bond_slave_0 as an active interface with an up link 07:18:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8, 0x7ff}, {0x0, 0x7ff}, {0x8, 0x9}, {0x0, 0x51fb}], 0x4) [ 193.448530] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:18:46 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200803, 0x0) unshare(0x40400) fchown(r0, 0x0, 0x0) [ 193.860860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.868088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:18:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x6}, 0x4) syslog(0xb, &(0x7f00000001c0), 0x0) getpeername(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 194.230389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.237629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.048306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.280611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.288590] team0: Port device team_slave_0 added [ 195.565537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.573648] team0: Port device team_slave_1 added [ 195.891853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.898920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.907484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.940994] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.151168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 196.158295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.166785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.429426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.437186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.446377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.729556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.737303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.746035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.057426] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.063918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.071567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.023823] 8021q: adding VLAN 0 to HW filter on device team0 07:18:52 executing program 1: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) [ 199.467579] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.474122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.480991] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.487559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.495739] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.502410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.225411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.912372] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.649828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.657073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.664668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:18:55 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x70, 0x0) close(r0) [ 203.327226] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.683383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.074150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 07:18:59 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='GPL\x00', 0x8, 0x247, &(0x7f0000000900)=""/187, 0x0, 0x0, [], 0x0, 0xb}, 0x47) [ 206.478846] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.485283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.493488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.767231] 8021q: adding VLAN 0 to HW filter on device team0 07:19:01 executing program 4: r0 = epoll_create(0x6) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) 07:19:01 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x0, 0x4}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x125}, &(0x7f0000000100)=0x8) r3 = accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x800) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000001c0)={0x9}, 0x1) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x10000, 0x0) write$P9_RSYMLINK(r4, &(0x7f0000000240)={0x14, 0x11, 0x1, {0xab, 0x1, 0x5}}, 0x14) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000280)={r2, 0x7, 0x9}, 0x8) ioctl$RTC_AIE_OFF(r4, 0x7002) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x2) write$P9_RSYMLINK(r4, &(0x7f00000002c0)={0x14, 0x11, 0x2, {0xd1, 0x0, 0x4}}, 0x14) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000300)) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) io_setup(0x91, &(0x7f0000000340)=0x0) io_cancel(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x0, r4, &(0x7f0000000380)="95c419899d8e84f2f25746fb1f62ffe43f6b95887a92782fb5d4142c211255a3f931d75dafb7b8c695baacd698260efde5e4e209341da3d657a2207b6f6b9e7189c6133ce47ae66d25a06d2843a17dd9623b670f7c56b30be75415dadb210b680b468ccde82848cee0f84b378e5c86709009a6c10bfad615f1eb759a93ff97695b3f9ff9f0207cc112efa08910322f313f3d3b5f56ec08caa4c75db034675a399c4ee2d1e796896775b64242afb513ae9c75b2ead0752bf57da98fbd58d886d8c3532da5e5022adcedd2bfa7d2ce5f0893fc9a306606f9c5fb3f42fb04c787bb004c6d0d59d22dac5921bf35963ae9b280", 0xf1, 0x4, 0x0, 0x2, r4}, &(0x7f00000004c0)) r6 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) r10 = getgid() fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)=0x0) fstat(r1, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getegid() r15 = getgid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0x7}, [{0x2, 0x3, r6}, {0x2, 0x5, r7}, {0x2, 0x1, r8}], {0x4, 0x1}, [{0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x0, r11}, {0x8, 0x3, r12}, {0x8, 0x2, r13}, {0x8, 0x0, r14}, {0x8, 0x0, r15}, {0x8, 0x1, r16}], {0x10, 0x7}, {0x20, 0x1}}, 0x7c, 0x2) pipe(&(0x7f0000000b80)) rmdir(&(0x7f0000000bc0)='./file0/../file0\x00') 07:19:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) r1 = memfd_create(&(0x7f0000000080)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) 07:19:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x35) 07:19:01 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x1, 'syz_tun\x00'}, 0x18) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[], 0xfffffcbd) recvmsg(r1, &(0x7f0000004000)={&(0x7f0000003d00)=@hci, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003d80)=""/184, 0xb8}], 0x1, &(0x7f0000003f80)=""/15, 0xf}, 0x0) 07:19:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNDETACHFILTER(r1, 0x800454e0, 0x0) 07:19:01 executing program 0: 07:19:01 executing program 4: 07:19:01 executing program 3: 07:19:02 executing program 1: 07:19:02 executing program 0: 07:19:02 executing program 4: 07:19:02 executing program 3: [ 209.687504] IPVS: ftp: loaded support on port[0] = 21 [ 210.862015] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.868395] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.876283] device bridge_slave_0 entered promiscuous mode [ 210.948837] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.955297] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.963256] device bridge_slave_1 entered promiscuous mode [ 211.035161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.107734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.325964] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.401923] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.540833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.547955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.764600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.772607] team0: Port device team_slave_0 added [ 211.846899] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.854639] team0: Port device team_slave_1 added [ 211.927774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.003238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.079213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.086652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.095537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.162482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.169870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.178730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.956101] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.962555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.969220] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.975700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.983489] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.541890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.592306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.845427] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.086064] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.093410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.101008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.359272] 8021q: adding VLAN 0 to HW filter on device team0 07:19:11 executing program 5: 07:19:11 executing program 0: 07:19:11 executing program 1: 07:19:11 executing program 4: 07:19:11 executing program 2: 07:19:11 executing program 3: 07:19:11 executing program 2: 07:19:11 executing program 0: 07:19:11 executing program 4: 07:19:11 executing program 3: 07:19:11 executing program 1: 07:19:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488d6d5d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000157, 0x0) 07:19:11 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)}, 0x10) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000040)="a5ab0fc75dc566b9b10100000f32b899000f00d0b857000f00d00f005d990f01df1bd9670fc79d06000000", 0x2b}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000080)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x80050002}) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f00000001c0)) 07:19:11 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000a80)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000440)=""/246) close(r2) 07:19:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) dup3(r1, r0, 0x0) 07:19:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) close(r1) [ 218.761266] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 218.833780] ================================================================== [ 218.841197] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 218.847889] CPU: 0 PID: 7722 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #63 [ 218.855071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.864422] Call Trace: [ 218.867019] dump_stack+0x306/0x460 [ 218.870654] ? _raw_spin_lock_irqsave+0x227/0x340 [ 218.875499] ? vmx_create_vcpu+0x10df/0x7920 [ 218.879923] kmsan_report+0x1a3/0x2d0 07:19:11 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") 07:19:11 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000200)={0xa, 0x3, 0x0, 0x0, '\x00', 0x7fff}) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 218.883739] __msan_warning+0x7c/0xe0 [ 218.887550] vmx_create_vcpu+0x10df/0x7920 [ 218.891795] ? kmsan_set_origin_inline+0x6b/0x120 [ 218.896651] ? __msan_poison_alloca+0x17a/0x210 [ 218.901433] ? vmx_vm_init+0x340/0x340 [ 218.905334] kvm_arch_vcpu_create+0x25d/0x2f0 [ 218.909857] kvm_vm_ioctl+0x13fd/0x33d0 [ 218.913848] ? __msan_poison_alloca+0x17a/0x210 [ 218.918548] ? do_vfs_ioctl+0x18a/0x2810 [ 218.922645] ? __se_sys_ioctl+0x1da/0x270 [ 218.926803] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 218.931654] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 218.936506] do_vfs_ioctl+0xcf3/0x2810 [ 218.940418] ? security_file_ioctl+0x92/0x200 [ 218.944935] __se_sys_ioctl+0x1da/0x270 [ 218.948930] __x64_sys_ioctl+0x4a/0x70 [ 218.952852] do_syscall_64+0xbe/0x100 [ 218.956686] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 218.961877] RIP: 0033:0x457579 [ 218.965076] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.983977] RSP: 002b:00007f6499f1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.991694] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 218.998965] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000007 [ 219.006235] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 219.013504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6499f206d4 [ 219.020791] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 219.028073] [ 219.029697] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 219.036616] Variable was created at: [ 219.040342] vmx_create_vcpu+0xd5/0x7920 [ 219.044417] kvm_arch_vcpu_create+0x25d/0x2f0 [ 219.048907] ================================================================== [ 219.056258] Disabling lock debugging due to kernel taint [ 219.061704] Kernel panic - not syncing: panic_on_warn set ... [ 219.061704] [ 219.069076] CPU: 0 PID: 7722 Comm: syz-executor2 Tainted: G B 4.19.0-rc4+ #63 [ 219.077650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.087000] Call Trace: [ 219.089599] dump_stack+0x306/0x460 [ 219.093244] panic+0x54c/0xafa [ 219.096478] kmsan_report+0x2cd/0x2d0 [ 219.100309] __msan_warning+0x7c/0xe0 [ 219.104118] vmx_create_vcpu+0x10df/0x7920 [ 219.108361] ? kmsan_set_origin_inline+0x6b/0x120 [ 219.113230] ? __msan_poison_alloca+0x17a/0x210 [ 219.117927] ? vmx_vm_init+0x340/0x340 [ 219.121840] kvm_arch_vcpu_create+0x25d/0x2f0 [ 219.126349] kvm_vm_ioctl+0x13fd/0x33d0 [ 219.130336] ? __msan_poison_alloca+0x17a/0x210 07:19:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000001c0)={0x29, 0x6, 0x0, {0x1}}, 0x29) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00}, 0xfffffefd) r2 = dup2(r0, 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000007c0)={@loopback, @multicast1}, &(0x7f0000000800)=0xc) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/13, 0xd, 0x0, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x7f, @remote, 0x101}}}, 0x80) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 219.135026] ? do_vfs_ioctl+0x18a/0x2810 [ 219.139093] ? __se_sys_ioctl+0x1da/0x270 [ 219.143253] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 219.148099] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 219.152950] do_vfs_ioctl+0xcf3/0x2810 [ 219.156852] ? security_file_ioctl+0x92/0x200 [ 219.161362] __se_sys_ioctl+0x1da/0x270 [ 219.165350] __x64_sys_ioctl+0x4a/0x70 [ 219.169243] do_syscall_64+0xbe/0x100 [ 219.173057] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 219.178245] RIP: 0033:0x457579 [ 219.181436] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.200332] RSP: 002b:00007f6499f1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 219.208043] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 219.215315] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000007 [ 219.222586] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 219.229861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6499f206d4 [ 219.237145] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 219.245543] Kernel Offset: disabled [ 219.249167] Rebooting in 86400 seconds..