[ 50.118850] audit: type=1800 audit(1544882455.156:27): pid=6380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 50.138352] audit: type=1800 audit(1544882455.166:28): pid=6380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.690069] audit: type=1800 audit(1544882456.736:29): pid=6380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 51.709477] audit: type=1800 audit(1544882456.736:30): pid=6380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. 2018/12/15 14:01:11 fuzzer started 2018/12/15 14:01:16 dialing manager at 10.128.0.26:37229 2018/12/15 14:01:16 syscalls: 1 2018/12/15 14:01:16 code coverage: enabled 2018/12/15 14:01:16 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/15 14:01:16 setuid sandbox: enabled 2018/12/15 14:01:16 namespace sandbox: enabled 2018/12/15 14:01:16 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/15 14:01:16 fault injection: enabled 2018/12/15 14:01:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/15 14:01:16 net packet injection: enabled 2018/12/15 14:01:16 net device setup: enabled 14:03:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) dup3(r0, r1, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000480)) syzkaller login: [ 234.866185] IPVS: ftp: loaded support on port[0] = 21 [ 236.325367] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.331968] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.340315] device bridge_slave_0 entered promiscuous mode [ 236.424697] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.431203] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.439458] device bridge_slave_1 entered promiscuous mode [ 236.518750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.598114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.844319] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.928202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.014657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.021643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.105631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.112626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.364027] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.372622] team0: Port device team_slave_0 added [ 237.453378] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.461751] team0: Port device team_slave_1 added [ 237.541826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.628064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.710070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.717807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.727071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.812574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.820238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.829597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:04:03 executing program 1: socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$setlease(r0, 0x406, 0x0) [ 238.728569] IPVS: ftp: loaded support on port[0] = 21 [ 239.030200] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.036819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.044135] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.050687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.059800] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.066761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.198776] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.205343] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.213405] device bridge_slave_0 entered promiscuous mode [ 241.389498] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.396127] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.404389] device bridge_slave_1 entered promiscuous mode [ 241.521367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.602272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 241.963710] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.111242] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.885819] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.894654] team0: Port device team_slave_0 added 14:04:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000340)='net/sockstat6\x00') [ 243.093610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.102261] team0: Port device team_slave_1 added [ 243.299932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.308802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.317845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.502767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.629870] IPVS: ftp: loaded support on port[0] = 21 [ 243.701785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.709495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.718765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.919519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.927212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.936272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.591514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.141673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.683815] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.690479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.697648] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.704216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.713554] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.869805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.876153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.883923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.109770] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.116425] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.124560] device bridge_slave_0 entered promiscuous mode [ 246.222586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.291142] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.297841] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.306135] device bridge_slave_1 entered promiscuous mode [ 246.494910] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.527893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.700555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.143355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.342459] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.464926] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.490830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.620370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.627513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.932033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.940660] team0: Port device team_slave_0 added [ 248.061267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.069800] team0: Port device team_slave_1 added [ 248.251100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 248.258364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.267191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.385997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.393027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.402115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.543999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.551572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.560538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.650550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.658224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.667666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 14:04:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syz_genetlink_get_family_id$tipc(0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 250.432949] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.439576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.446759] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.453383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.462840] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.469384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:15 executing program 0: eventfd(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x3, 0x0, [], [{0x2, 0x8001, 0x1, 0x4, 0xce, 0x6}, {0x1, 0x200, 0x7, 0x3491, 0x4d, 0x100000001}], [[], [], []]}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:04:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001}}}, 0x90) 14:04:16 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) ioctl$KVM_NMI(r1, 0xae9a) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/196) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000180)={0x26, 0x39, 0x4, 0x8, 0x7, 0x1, 0x3, 0x93, 0x1}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x20000, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0x2000000020000000, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000240)={0x2000}) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000280)={0x3, 0x1, 0x1ff}) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f00000002c0)={0xa, @pix={0x4aec, 0x0, 0x32314752, 0x6, 0x6, 0x2, 0xa, 0xaf, 0x1, 0x3, 0x3, 0x3}}) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000003c0)={0x4}) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000400), 0x4) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000440)={0xfffffffffffffff7, 0x4}) r5 = gettid() ptrace$peekuser(0x3, r5, 0x40) epoll_pwait(r1, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x6, 0xfffffffffffeffff, &(0x7f0000000500)={0x400}, 0x8) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000540)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000580)={@remote, 0x0, 0x0, 0x0, 0xa, 0x7ff, 0x92}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r4, &(0x7f00000005c0)={0x20000004}) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r6) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000600)={0x28, "f0a23e8b8eed9dabb51bd4f9b9a1e8bb07eccbc40cc58ec8a6d0e67cc15c77cd55d8ccef9e740502"}) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000640)=""/78) close(r1) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000006c0)) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000740)={{0x9, 0x5, 0x3, 0x100000000, '\x00', 0x7}, 0x1, [0x1, 0x2, 0x7fff, 0x7, 0x0, 0xfffffffffffff9f4, 0x1ff, 0x0, 0x3b9, 0x80000000, 0x0, 0x17, 0x2a9, 0x9bde, 0x2, 0x3, 0x80000001, 0xffffffff80000001, 0x9, 0x211b, 0x0, 0x100000000, 0x0, 0x9, 0x1, 0xfffffffffffffff7, 0x7f, 0x101, 0x5, 0xffffffffffffffff, 0x7, 0x2, 0x6, 0x5, 0x263, 0x9, 0xedd4, 0x4, 0x8a1, 0x4, 0x5, 0x0, 0x2, 0x67d, 0x8923, 0x9, 0x81, 0xc5, 0x8000, 0x7fff, 0x4, 0xae6d, 0x9, 0x1, 0xfffffffffffffff9, 0xffff, 0x7ff, 0x8, 0x1ff, 0x9, 0x40, 0x20, 0x1, 0x9, 0xfffffffffffffff7, 0x400, 0x3, 0xd5, 0x4, 0x4, 0x5, 0x0, 0x1, 0x0, 0x9, 0x80, 0x800, 0xc36, 0x5d0f920a, 0x9, 0x4, 0x80000001, 0x7fffffff, 0xffffffff, 0x5, 0x0, 0x9, 0x9211, 0x6, 0x2, 0x8, 0x34e, 0x5, 0x3f, 0x5, 0xa6, 0x80, 0x0, 0x6, 0x8000, 0x9, 0x20, 0xfffffffffffffff8, 0x6a, 0x3, 0x1, 0x6, 0x81, 0x120000, 0x7fff, 0xaf, 0x2, 0x8e, 0x2, 0x81, 0x8000, 0x3f, 0x80000001, 0x1759, 0x8, 0x84, 0x6, 0x1ff, 0x7, 0x2bb1, 0x2, 0xa2, 0x6], {r7, r8+30000000}}) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000c40), 0x0) [ 251.717378] IPVS: ftp: loaded support on port[0] = 21 14:04:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001}}}, 0x90) [ 252.590717] 8021q: adding VLAN 0 to HW filter on device bond0 14:04:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001}}}, 0x90) [ 253.153111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.800705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.807062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.814885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:04:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001}}}, 0x90) [ 254.442371] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.826589] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.833153] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.841103] device bridge_slave_0 entered promiscuous mode 14:04:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) [ 255.029941] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.036588] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.044812] device bridge_slave_1 entered promiscuous mode [ 255.313850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.420690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:04:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) [ 255.948049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.156864] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 256.326278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.333416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.475854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.483368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:04:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) [ 257.116263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.125487] team0: Port device team_slave_0 added [ 257.298183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.306664] team0: Port device team_slave_1 added [ 257.476147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 257.483197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.492075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.637643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 257.644749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.653645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.787389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.795067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.803916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.989733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 257.997434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.006453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.232307] 8021q: adding VLAN 0 to HW filter on device bond0 14:04:23 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xffffffffffffefff, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x100000000, 0x400400) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000280)={0x40, 0x2, 0x1, 0x0, 0x2, 0x3f, 0xfffffffffffff000}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000300)={0x0, 0xff, 0xffff, [], &(0x7f00000002c0)=0x401}) restart_syscall() select(0x40, &(0x7f0000000100)={0x1, 0x7, 0x1, 0x6, 0x6, 0x9, 0x100, 0x9}, &(0x7f0000000140)={0xfffffffffffeffff, 0x7f, 0x4, 0x3, 0x3, 0x8, 0x101, 0x8b}, &(0x7f0000000180)={0x100000001, 0x5, 0x100, 0x0, 0x0, 0x2, 0x7ff, 0x4}, &(0x7f00000001c0)) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x1, 0x1) [ 258.906829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 259.470659] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.477048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.484743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.758970] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.765596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.772765] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.779298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.788390] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 259.953247] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.502196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:28 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x20}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}}, 0x84) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000180)={'ip6gre0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)) 14:04:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) read$FUSE(r1, 0x0, 0x0) 14:04:28 executing program 4: prctl$PR_SVE_GET_VL(0x33, 0xa65) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x4eac0, 0x0, 0x6, 0x40}, 0x8) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000080)={0x3, r0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x109000, 0x0) getpeername(r1, &(0x7f0000000100)=@un=@abs, &(0x7f0000000180)=0x80) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x70) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000200)={0x48f1, 0x1, 0x8, 0xd70b, 0x84b}, 0xc) fcntl$setlease(r0, 0x400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@remote, 0x4b, r3}) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000400)=0x1, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000440)={0x400, 0x91, 0x1, @dev={[], 0xe}, 'ipddp0\x00'}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000480)=[@in6={0xa, 0xb7a3, 0x2, @loopback, 0x4}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e23, 0x6, @local, 0xfffffffffffffffb}, @in6={0xa, 0x4e20, 0x9, @local, 0x22e5e8fc}], 0x64) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000540)=[{{0x77359400}, 0x14, 0x6726}, {{0x0, 0x7530}, 0x3, 0x8, 0x800}, {{r4, r5/1000+10000}, 0x17, 0x5, 0x2}, {{0x77359400}, 0x16, 0x4, 0x2}, {{}, 0x0, 0x6}], 0x78) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '/dev/hwrng\x00'}, {0x20, '/dev/hwrng\x00'}, {0x20, '/dev/dlm_plock\x00'}, {0x20, '&[cpuset'}, {0x20, '/dev/dlm_plock\x00'}, {}], 0xa, "8b0ad297113196d65c"}, 0x56) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000640)={0x0, 0x9}) r6 = accept(r0, &(0x7f0000000680)=@l2, &(0x7f0000000700)=0x80) getpeername(r6, &(0x7f0000000740)=@ax25, &(0x7f00000007c0)=0x80) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000800)={0x12000, 0x100000}) lsetxattr$security_ima(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='security.ima\x00', &(0x7f00000008c0)=@ng={0x4, 0x6, "85068ef11f19c21115daa8f84741"}, 0x10, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000900)={[0xe3b9, 0x878a, 0x5, 0xfc4, 0x3, 0x7, 0x5, 0x4, 0xe96, 0x2, 0x80000001, 0x80000000, 0x7fffffff, 0x400, 0x0, 0x9], 0x3002, 0x80000}) futimesat(r0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={{0x0, 0x2710}}) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000a40)) prctl$PR_GET_KEEPCAPS(0x7) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000a80)) setsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000ac0)={@empty, @dev={0xac, 0x14, 0x14, 0x10}, r3}, 0xc) 14:04:28 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14}]}, 0x104}}, 0x0) socket$xdp(0x2c, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) [ 263.759836] IPVS: ftp: loaded support on port[0] = 21 [ 264.685404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.012402] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.147477] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.154073] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.162321] device bridge_slave_0 entered promiscuous mode [ 265.240707] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.247341] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.255211] device bridge_slave_1 entered promiscuous mode [ 265.327711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 265.342441] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.349352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.357269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.428698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.705565] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.724577] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.786772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.860717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 265.868084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.945298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 265.952521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.191957] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.199989] team0: Port device team_slave_0 added [ 266.276806] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.284580] team0: Port device team_slave_1 added [ 266.360293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.436974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.511845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.519817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.528992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.606440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.613723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.622920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.493195] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.499741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.506789] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.513275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.521270] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:04:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)='/', 0x1, 0x1) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0x7f8) 14:04:32 executing program 1: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = gettid() r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000000180)=0x3f) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) open$dir(&(0x7f0000e12ff8)='./file0\x00', 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f00007ed000)=@file={0x0, './file0\x00'}, 0xa) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f00000003c0)=""/228) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4b0, 0xfffffffffffffff8, 0x8000, 0x3f, 0x7, 0x7fffffff, 0x6, 0x5, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r5, 0x7}, &(0x7f0000000240)=0x8) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x2) r6 = getpgid(0x0) fcntl$setsig(r2, 0xa, 0x29) fcntl$setsig(r4, 0xa, 0x2d) r7 = dup2(r2, r3) fcntl$setown(r7, 0x8, r6) tkill(r0, 0x16) creat(&(0x7f00001c0000)='./file0\x00', 0x0) 14:04:32 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000180)=""/26, 0x1a}], 0x2, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/118, 0x76}], 0x1, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x501142, 0x0) openat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) 14:04:32 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x4e24, @multicast1}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x4, {0x2, 0x4e23, @rand_addr=0x2}, 'rose0\x00'}) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x10f, 0x5, 0x1e, 0x179, 0xf3, 0x1, 0x96, 0x80f}, "8b2e10552ce1ef5f74878342f4c6375781615a1bf86922ef85c4d0ebab5b306cc83ab089daa193d3c2d560ffc345892813e7ffdca6f90fe6211b4773ee699f1a324e732f8209ba2b06a7742d6aa6f806be8e53a1f57fecd9ad61857ddf5913ce755bf744f55d48133116587dab910664a5a90fb55db74fa6c2bbfb8a3dc67f3368459bd15eb3634997a06c8fd29fb33e19ddf3bb2f"}, 0xb5) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180)=0xff, &(0x7f00000001c0)=0x4) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000200)={0x800, 0x7, 0x5, 0x6, 0x800}) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0xfffffffffffffff9, {{0x2, 0x4e23, @multicast2}}, 0x0, 0x6, [{{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}]}, 0x390) readv(r0, &(0x7f0000000bc0)=[{&(0x7f00000006c0)=""/17, 0x11}, {&(0x7f0000000700)=""/171, 0xab}, {&(0x7f00000007c0)=""/226, 0xe2}, {&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/79, 0x4f}, {&(0x7f00000009c0)=""/47, 0x2f}, {&(0x7f0000000a00)=""/53, 0x35}, {&(0x7f0000000a40)=""/96, 0x60}, {&(0x7f0000000ac0)=""/255, 0xff}], 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d00)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000e00)=0xe8) getresuid(&(0x7f0000000e40), &(0x7f0000000e80)=0x0, &(0x7f0000000ec0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0}, &(0x7f0000000f40)=0xc) r5 = getuid() lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() fstat(r0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='system.posix_acl_access\x00', &(0x7f0000001180)={{}, {0x1, 0x2}, [{0x2, 0x6, r1}, {0x2, 0x2, r2}, {0x2, 0x2, r4}, {0x2, 0x6, r5}, {0x2, 0x3, r6}, {0x2, 0x2, r7}], {0x4, 0x2}, [{0x8, 0x1, r8}, {0x8, 0x0, r10}], {0x10, 0x6}, {0x20, 0x5}}, 0x64, 0x2) fsetxattr$system_posix_acl(r0, &(0x7f0000001200)='system.posix_acl_default\x00', &(0x7f0000001240)={{}, {0x1, 0x2}, [{0x2, 0x4, r9}, {0x2, 0x1, r7}, {0x2, 0x5, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1, r2}], {0x4, 0x1}, [{0x8, 0x0, r8}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x40, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001340)={&(0x7f0000001300)='./file0\x00', r11}, 0x10) geteuid() getsockopt$TIPC_GROUP_JOIN(r11, 0x10f, 0x87, &(0x7f0000001380), &(0x7f00000013c0)=0x4) ioctl$sock_inet_SIOCDARP(r11, 0x8953, &(0x7f0000001400)={{0x2, 0x4e20, @rand_addr=0x4}, {0x7, @random="be9d73986f13"}, 0x24, {0x2, 0x4e24, @multicast2}, 'veth0_to_bridge\x00'}) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000001480)="c418dd142e580b2c6002e9dc5051eea8ebf82abee042e55a56af3651e3e29dcdbd2ee3ae6dbd1d9153fd32f744a2c3aa92a84d7390856f0c6905e037da202e7245504a6598aca93cfbf0196bf72d7644422395138f71ce740c3c8c7ccbbeca3b08346878bf7a37f4129c0e24dc390285837699a1bf002d88ac83bc6a8493f869efd26d70c13bc088525d8b", 0x8b) r12 = request_key(&(0x7f0000001540)='id_resolver\x00', &(0x7f0000001580)={'syz', 0x3}, &(0x7f00000015c0)='\x00', 0xfffffffffffffff8) keyctl$set_timeout(0xf, r12, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001600), 0x106, 0x1000}}, 0x20) chdir(&(0x7f0000001680)='./file0\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000016c0)={0x4, [0x1, 0x6, 0x101, 0x200]}) ioctl$sock_inet_SIOCSIFPFLAGS(r11, 0x8934, &(0x7f0000001700)={'bond0\x00', 0x1ff}) 14:04:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000060c0), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) [ 267.802213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x4820000, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) 14:04:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast2}, @IFA_CACHEINFO={0x14, 0x6, {0xffff, 0x5}}]}, 0x40}}, 0x0) 14:04:33 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x24cf, &(0x7f00000000c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) 14:04:33 executing program 1: ioprio_get$uid(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x100000000000019b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) 14:04:33 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() io_setup(0xffff, &(0x7f0000000100)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)) waitid(0x0, 0x0, 0x0, 0x8, 0x0) [ 268.602575] IPVS: ftp: loaded support on port[0] = 21 [ 270.005764] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.012502] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.020695] device bridge_slave_0 entered promiscuous mode [ 270.099682] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.106350] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.114579] device bridge_slave_1 entered promiscuous mode [ 270.186729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.259103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 270.484731] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 270.564841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 270.713612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.720564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.967971] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.976045] team0: Port device team_slave_0 added [ 271.058760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.066682] team0: Port device team_slave_1 added [ 271.144965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.227340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.310646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 271.318430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.327632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.395605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 271.403133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.412162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.430467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.727646] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.023620] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.029887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.037837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.276065] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.282867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.290013] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.296601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.305713] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 272.341832] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.653782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:39 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socket$inet(0x2, 0x0, 0x0) write$P9_RWALK(r1, 0x0, 0x0) 14:04:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(arc4-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\x00', 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {0x0}}, 0xfdef) 14:04:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) 14:04:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000003840)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0}) 14:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) [ 275.435806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.594961] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.815692] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.821922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.829842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.991198] 8021q: adding VLAN 0 to HW filter on device team0 14:04:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) 14:04:42 executing program 5: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) setreuid(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@in={0x2, 0x4e20}, 0x80) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000200)=0x80000001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) semget(0xffffffffffffffff, 0x0, 0x0) 14:04:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:42 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) 14:04:42 executing program 2: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x20000006}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000004567784c70f5"]) 14:04:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) 14:04:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x9000000, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) 14:04:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 277.179637] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:04:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x24cf, &(0x7f00000000c0)) 14:04:42 executing program 4: socketpair$unix(0x1, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000340)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xc000, 0xffffffffffffffff) 14:04:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_triestat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 14:04:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/185) 14:04:42 executing program 3: syz_execute_func(&(0x7f00000000c0)="ba66440f50f564ff0941c335e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc4bd31919") r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 14:04:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRESOCT], 0x19) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/156, 0x9c}], 0x1}}], 0x1, 0x0, 0x0) 14:04:42 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 14:04:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) 14:04:43 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) 14:04:43 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)=r0) [ 278.072573] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:04:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 14:04:43 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[], 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') close(0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240), &(0x7f0000000300)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x800, &(0x7f0000000080)=0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_getevents(r1, 0x1, 0x1, &(0x7f00000000c0)=[{}], &(0x7f00000001c0)={0x0, r2+10000000}) socketpair$nbd(0x2, 0x1, 0x0, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) ptrace$cont(0x7, 0x0, 0x7, 0x86d1) 14:04:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 14:04:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_elf64(r1, 0x0, 0x0) 14:04:43 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) [ 278.513040] ================================================================== [ 278.520525] BUG: KMSAN: uninit-value in check_6rd+0x65a/0x710 [ 278.526443] CPU: 0 PID: 8378 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #2 [ 278.533642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.543004] Call Trace: [ 278.545617] dump_stack+0x1c9/0x220 [ 278.549302] kmsan_report+0x12d/0x290 [ 278.553155] __msan_warning+0x76/0xc0 [ 278.556979] check_6rd+0x65a/0x710 14:04:43 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000980)=@in6={0xa, 0x0, 0x0, @remote, 0x5}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)='U', 0x1}], 0x1}, 0x40) 14:04:43 executing program 5: r0 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000b00)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 14:04:43 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) [ 278.560560] sit_tunnel_xmit+0xb58/0x34d0 [ 278.564777] ? dev_hard_start_xmit+0xb3/0xc80 [ 278.569289] ? __dev_queue_xmit+0x3173/0x3cf0 [ 278.573799] ? ipip6_tunnel_uninit+0x800/0x800 [ 278.578398] dev_hard_start_xmit+0x627/0xc80 [ 278.582889] __dev_queue_xmit+0x3173/0x3cf0 [ 278.587290] dev_queue_xmit+0x4b/0x60 [ 278.591109] ? __netdev_pick_tx+0x1290/0x1290 [ 278.595628] packet_sendmsg+0x7cbd/0x9200 [ 278.599808] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf30 [ 278.605280] ? kmsan_memcpy_metadata+0xb/0x10 [ 278.609812] ? sock_write_iter+0x102/0x4f0 [ 278.614118] ? __se_sys_write+0x17a/0x370 [ 278.618299] ? do_syscall_64+0xcd/0x110 [ 278.622305] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 278.627718] ? update_load_avg+0x11f1/0x1ae0 [ 278.632212] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 278.637612] ? aa_sk_perm+0x7ab/0x9e0 [ 278.641460] ? sr_probe+0x882/0x2590 [ 278.645471] ? compat_packet_setsockopt+0x360/0x360 [ 278.650532] sock_write_iter+0x3f4/0x4f0 [ 278.654662] ? sock_read_iter+0x4e0/0x4e0 [ 278.658839] __vfs_write+0x888/0xb80 [ 278.662637] vfs_write+0x4b4/0x900 [ 278.666234] __se_sys_write+0x17a/0x370 [ 278.670275] __x64_sys_write+0x4a/0x70 [ 278.674189] do_syscall_64+0xcd/0x110 [ 278.678025] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 278.683225] RIP: 0033:0x457659 [ 278.686442] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.705350] RSP: 002b:00007f7bf005cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 278.713074] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 278.720352] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 278.727630] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 278.734911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf005d6d4 [ 278.742205] R13: 00000000004c6084 R14: 00000000004dac10 R15: 00000000ffffffff [ 278.749502] [ 278.751129] Uninit was created at: [ 278.754714] kmsan_internal_poison_shadow+0x92/0x150 [ 278.759838] kmsan_kmalloc+0xa1/0x100 [ 278.763666] kmsan_slab_alloc+0xe/0x10 [ 278.767612] __kmalloc_node_track_caller+0xf06/0x1120 [ 278.772840] __alloc_skb+0x318/0xa40 [ 278.776593] alloc_skb_with_frags+0x1c9/0xa80 [ 278.781210] sock_alloc_send_pskb+0xb5d/0x1140 [ 278.785807] packet_sendmsg+0x66a2/0x9200 [ 278.789988] sock_write_iter+0x3f4/0x4f0 [ 278.794077] __vfs_write+0x888/0xb80 [ 278.797806] vfs_write+0x4b4/0x900 [ 278.801502] __se_sys_write+0x17a/0x370 [ 278.805483] __x64_sys_write+0x4a/0x70 [ 278.809379] do_syscall_64+0xcd/0x110 14:04:43 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) [ 278.813208] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 278.818393] ================================================================== [ 278.825769] Disabling lock debugging due to kernel taint [ 278.831218] Kernel panic - not syncing: panic_on_warn set ... [ 278.837110] CPU: 0 PID: 8378 Comm: syz-executor3 Tainted: G B 4.20.0-rc5+ #2 [ 278.845611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.854999] Call Trace: [ 278.857604] dump_stack+0x1c9/0x220 [ 278.861288] panic+0x3f0/0x98f [ 278.864545] kmsan_report+0x290/0x290 [ 278.868380] __msan_warning+0x76/0xc0 [ 278.872234] check_6rd+0x65a/0x710 [ 278.875854] sit_tunnel_xmit+0xb58/0x34d0 [ 278.880071] ? dev_hard_start_xmit+0xb3/0xc80 [ 278.884590] ? __dev_queue_xmit+0x3173/0x3cf0 [ 278.889127] ? ipip6_tunnel_uninit+0x800/0x800 [ 278.893759] dev_hard_start_xmit+0x627/0xc80 [ 278.898235] __dev_queue_xmit+0x3173/0x3cf0 [ 278.902619] dev_queue_xmit+0x4b/0x60 [ 278.906450] ? __netdev_pick_tx+0x1290/0x1290 [ 278.910964] packet_sendmsg+0x7cbd/0x9200 [ 278.915133] ? kmsan_memcpy_memmove_metadata+0x1a9/0xf30 [ 278.920603] ? kmsan_memcpy_metadata+0xb/0x10 [ 278.925145] ? sock_write_iter+0x102/0x4f0 [ 278.929435] ? __se_sys_write+0x17a/0x370 [ 278.933600] ? do_syscall_64+0xcd/0x110 [ 278.937607] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 278.942988] ? update_load_avg+0x11f1/0x1ae0 [ 278.947510] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 278.952893] ? aa_sk_perm+0x7ab/0x9e0 [ 278.956745] ? sr_probe+0x882/0x2590 [ 278.960520] ? compat_packet_setsockopt+0x360/0x360 14:04:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000700)='./file0/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000050c0), 0x17d) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1006) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) 14:04:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 278.965553] sock_write_iter+0x3f4/0x4f0 [ 278.969698] ? sock_read_iter+0x4e0/0x4e0 [ 278.973895] __vfs_write+0x888/0xb80 [ 278.977662] vfs_write+0x4b4/0x900 [ 278.981268] __se_sys_write+0x17a/0x370 [ 278.985281] __x64_sys_write+0x4a/0x70 [ 278.989193] do_syscall_64+0xcd/0x110 [ 278.993024] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 278.998230] RIP: 0033:0x457659 [ 279.001437] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.020354] RSP: 002b:00007f7bf005cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 279.028096] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 279.035406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 279.042704] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 279.049990] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf005d6d4 [ 279.057265] R13: 00000000004c6084 R14: 00000000004dac10 R15: 00000000ffffffff [ 279.065606] Kernel Offset: disabled [ 279.069256] Rebooting in 86400 seconds..