[ 56.647554] audit: type=1800 audit(1538989572.684:27): pid=5979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.096294] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 59.179715] random: sshd: uninitialized urandom read (32 bytes read) [ 59.673632] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.852625] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.43' (ECDSA) to the list of known hosts. [ 67.722099] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 09:06:25 fuzzer started [ 72.348050] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 09:06:30 dialing manager at 10.128.0.26:36867 2018/10/08 09:06:30 syscalls: 1 2018/10/08 09:06:30 code coverage: enabled 2018/10/08 09:06:30 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 09:06:30 setuid sandbox: enabled 2018/10/08 09:06:30 namespace sandbox: enabled 2018/10/08 09:06:30 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 09:06:30 fault injection: enabled 2018/10/08 09:06:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 09:06:30 net packed injection: enabled 2018/10/08 09:06:30 net device setup: enabled [ 77.822563] random: crng init done 09:08:40 executing program 0: r0 = socket$inet6(0xa, 0x21000000000002, 0x0) ioctl(r0, 0x800008912, &(0x7f0000000040)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0x4143, &(0x7f0000001f64)) [ 205.369553] IPVS: ftp: loaded support on port[0] = 21 [ 207.482497] ip (6174) used greatest stack depth: 53056 bytes left [ 207.780073] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.786705] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.795391] device bridge_slave_0 entered promiscuous mode [ 207.936304] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.942946] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.951325] device bridge_slave_1 entered promiscuous mode [ 208.090725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.237954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:08:44 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x2d6, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x70}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000140)}, 0x20) read(0xffffffffffffffff, &(0x7f00000000c0)=""/83, 0x53) syz_open_dev$dspn(&(0x7f0000001640)='/dev/dsp#\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000001680)=""/30) r2 = socket$inet6(0xa, 0x0, 0x0) listen(r2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80000) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=""/54, &(0x7f00000000c0)=0x36) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}, [0xf401000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) keyctl$get_persistent(0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180)=[{0x0, 0x7}, {}], 0x2) write$USERIO_CMD_REGISTER(r3, &(0x7f00000001c0)={0x0, 0x3}, 0x2) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) [ 208.672176] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.848370] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.305914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.313246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.435805] IPVS: ftp: loaded support on port[0] = 21 [ 210.140018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.148263] team0: Port device team_slave_0 added [ 210.374659] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.382778] team0: Port device team_slave_1 added [ 210.580729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.587938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.596968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.739633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.747227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.756274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.958373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.966132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.975456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.138928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.146747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.156075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.213826] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.220302] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.229055] device bridge_slave_0 entered promiscuous mode [ 213.414636] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.421116] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.429749] device bridge_slave_1 entered promiscuous mode [ 213.571229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.823732] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.830218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.837311] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.843829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.852774] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.868968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.182436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:08:50 executing program 2: r0 = socket$inet6(0xa, 0x21000000000002, 0x0) ioctl(r0, 0x800008912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0xc0884123, &(0x7f0000001f64)) [ 214.592500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.903296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.097482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.106976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.393753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.400789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.580976] IPVS: ftp: loaded support on port[0] = 21 [ 216.205268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.213425] team0: Port device team_slave_0 added [ 216.413090] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.421080] team0: Port device team_slave_1 added [ 216.669627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.676888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.686048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.876157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.883316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.892380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.120727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.128600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.137623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.447240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.455038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.464206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.597145] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.603798] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.612534] device bridge_slave_0 entered promiscuous mode [ 220.768651] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.775202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.782265] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.788734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.797474] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.823310] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.829809] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.838540] device bridge_slave_1 entered promiscuous mode [ 221.110951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.223039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.404599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.059050] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.387824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.715192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.722369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.900818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.909748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:08:59 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x616, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 223.920021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.928252] team0: Port device team_slave_0 added [ 224.399673] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.407967] team0: Port device team_slave_1 added [ 224.483753] IPVS: ftp: loaded support on port[0] = 21 [ 224.748463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.755632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.764969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.141216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.148382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.157467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.481719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.489621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.498627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.871776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.879602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.888916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.573949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.936812] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.380403] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.386973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.395958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.028506] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.035067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.042091] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.048542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.057483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.274374] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.280848] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.289694] device bridge_slave_0 entered promiscuous mode [ 230.582978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.641694] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.648330] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.656981] device bridge_slave_1 entered promiscuous mode [ 230.875592] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.998021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.365134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.303622] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.754268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.123416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.130492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.471690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.478917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:09:09 executing program 4: r0 = socket$inet6(0xa, 0x21000000000002, 0x0) ioctl(r0, 0x800008912, &(0x7f0000000040)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0x5421, &(0x7f0000001f64)) [ 234.651015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.659148] team0: Port device team_slave_0 added [ 235.102159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.110221] team0: Port device team_slave_1 added [ 235.397287] IPVS: ftp: loaded support on port[0] = 21 [ 235.582220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 235.589444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.598581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.623994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.079828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 236.087298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.096106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.425993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.433726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.443394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.936412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.944185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.953560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.373181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.209861] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.216406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.224628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:09:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='%d') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='%d'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 240.889108] 8021q: adding VLAN 0 to HW filter on device team0 09:09:17 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x20, @tick, 0x1, {0x400, 0x1}, 0x7fff, 0x1}) r1 = socket$key(0xf, 0x3, 0x2) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) splice(0xffffffffffffffff, &(0x7f0000000240)=0x7ffd, r2, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x1, 0x4, 0x4, 0x7ff, 0xffff, 0x0, 0xffffffff, 0x0, 0x1, 0x100], 0xa, 0x8, 0x0, 0xc1b3, 0x6, 0x0, {0x6c9, 0x7, 0xc92, 0x9, 0x1, 0x1000, 0x1, 0x365bb4fa, 0x100000000, 0xebb, 0x0, 0x7, 0x5, 0x1, "c34b9bfcd1a3e88274bfa93f2059bb64efe71e1cb2b33ebfc0686c4a8c657da2"}}) fchmod(r2, 0x0) 09:09:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x200000005, 0x84) r1 = memfd_create(&(0x7f00000000c0)='-cgroup-\x00', 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x10, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}]}, 0x2c}, 0x1, 0x0, 0x0, 0x90}, 0x20008000) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10000, 0x410c00) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000080)={{r4, r5/1000+10000}, 0x17, 0x400, 0x9}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6}, 0x90) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000300)=0x20000, 0x4) [ 242.005564] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.012144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.019063] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.025664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.034161] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.366012] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.373013] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.381440] device bridge_slave_0 entered promiscuous mode [ 242.422537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) listen(r0, 0x800000002) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='y', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x1}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x400400) getsockopt$inet_tcp_int(r2, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000140)=0x4) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 242.784615] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.791139] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.799672] device bridge_slave_1 entered promiscuous mode [ 243.333920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 09:09:19 executing program 0: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2c643a355d252c6cce6c633a"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x4, &(0x7f0000000140)="50f073656c696e75786367726f757000") r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xd3, 0x500) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000180)=0x4) [ 243.527063] libceph: parse_ips bad ip ',d:5]%,lĪlc' [ 243.570098] libceph: parse_ips bad ip ',d:5]%,lĪlc' [ 243.690926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:09:19 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000080)) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x7) 09:09:20 executing program 0: syz_emit_ethernet(0x13a, &(0x7f0000000200)={@random="65cdce05566d", @random="063819ecf9a9", [], {@ipv6={0x86dd, {0x0, 0x6, "427fb4", 0x104, 0x0, 0x0, @ipv4={[], [], @loopback}, @dev, {[], @udp={0x0, 0x0, 0x104, 0x0, [], "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"}}}}}}, &(0x7f0000000000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x86100, 0x0) r1 = getgid() fchownat(r0, &(0x7f0000000080)='./file0\x00', 0x0, r1, 0x1000) 09:09:20 executing program 0: r0 = getpid() ptrace$peek(0x2, r0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e900001000000063cf"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f00, 0x2c}, [@ldst={0x3fd}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) [ 245.022407] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.466324] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.897633] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.904825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.263037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.270141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.131853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.253787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.262109] team0: Port device team_slave_0 added [ 247.514418] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.522551] team0: Port device team_slave_1 added [ 247.790824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.798059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.806828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.181121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.188932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.197842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.228703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.446976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.454912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.464554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.786047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.793830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.803190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.448162] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.454699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.463523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:09:26 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[]}, 0x0) [ 250.649541] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.643620] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.650097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.657163] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.663674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.672497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.679118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.450314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.369324] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:09:31 executing program 2: [ 256.130911] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.137368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.145145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.691806] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.175560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.742093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:09:36 executing program 3: [ 260.255992] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.262982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.270891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.674578] 8021q: adding VLAN 0 to HW filter on device team0 09:09:38 executing program 4: 09:09:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 09:09:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x301100, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@int=0x6, 0x4) ioctl$void(r0, 0xc0045878) socketpair$inet6(0xa, 0x0, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000140)={r1, r0}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x101000, 0x0) fcntl$setstatus(r4, 0x4, 0x40400) r5 = getpgrp(0x0) fcntl$setown(r2, 0x8, r5) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r3, 0xb8, &(0x7f00000001c0)=[@in={0x2, 0x4e21}, @in6={0xa, 0x4e23, 0x5e, @mcast2, 0x9}, @in6={0xa, 0x4e20, 0x40000000000, @empty, 0x2}, @in6={0xa, 0x4e24, 0x80000001, @loopback, 0x382000000000}, @in6={0xa, 0x4e23, 0x10001, @ipv4={[], [], @local}, 0x5}, @in6={0xa, 0x4e20, 0x8, @remote, 0x25}, @in6={0xa, 0x4e21, 0x8, @loopback, 0x8cc9}]}, &(0x7f00000002c0)=0x10) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000300)=0xffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340), 0x117, 0x1}}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000003c0)={0x90000000}) socketpair$inet6(0xa, 0x3, 0x6, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001680)={0x0, 0x0, 0xba, 0x100000001, @scatter={0x2, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/143, 0x8f}]}, &(0x7f0000000580)="17f59ead96274ff1287fdab9682119d69380d510852fbf9b9ce1186bb566e78c5344e5ff69d16fff92c8b062e0887f605678d04c8be961b41dd69ba12fcfcd73ef474f1aa38739aea5fd0ba0dc652e13f1f10af7eecaf3412cf1c58c2c2bec22fb66f3e97b9038253f50c5ec0d9f98dabe596df8681d54556dbd32bf0783fd497b2b959b1fd1cfcd7562bfa2e428a2a843235af7b58b9cbbee3483f7373945baaf72970314d36e0676eee5216d21f975023da5743b2be0f08c9a", &(0x7f0000000640)=""/4096, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000001640)}) sendmsg$inet_sctp(r0, &(0x7f0000001b00)={&(0x7f0000001700)=@in6={0xa, 0x4e21, 0x2, @local, 0x5}, 0x1c, &(0x7f0000001980)=[{&(0x7f0000001740)="d77ff42dfba4420feddacde36b3ccf60c5eea316f048df74d3d468ee32213d4b4a94f3abeb9d15821a8218a9f24d593331d77486e9b14da5ab1586a24d6259650c5495cd6659ee0bae3bbc3ba76cb9550e75a8e25fd912ebaf611450b6f071d9c8b4dae2232a7b72f02434c40b88ba0d7411c4a14d03b394a459d8dec2682f5becec9ae2ea83e9ef5934ba09d2ab3b9e9363d4b02c1f6bcfc440e412c87835bf28d8875baf537f63f7b5ae23486daa94375b6f3e10f77c93c4ed790124dbde0ac310540e3ec4fac76c7d57bca4821a1952f4090e53f03749d4b95df8a39bc8d9a1a2015fecf481c816dd4b6b77d0c6aa09fdca078c1e", 0xf6}, {&(0x7f0000001840)="344576b724f6acefe9ff7444b8be179bb399cfda52a8c8c834b2d4e2450743e3cf75695c52036da18858a7ae8318ae16e37ac8ad9b5feeb8bf4dc88d2b0343c114672a530332e43efb5803476b30803fec97bb549473a994d7a094c496bf7488", 0x60}, {&(0x7f00000018c0)="1d35f7f4227f05fd3119f1078a5df73ca0a719f1b3811dfbfbf9bdfc4700a96484a7249b26dfc62a89d957f77aa4c2aa4ec2faf70b4ecd23614bda62c0a5c0a46b86c9123a3492a37da00fb31edfe36b4b761d33cac9b4ec8ac244706defa378178a999c5ac3889a2a33f2e287ae6809394a1b2fcfaf1ef4a61982543565e67411f9efd84c12fb8d0b9c6c62de6fd92ec770102b9843862a029438a5230d93d60732befb2d0134044d47cdf966634819e5be9ae59210", 0xb6}], 0x3, &(0x7f00000019c0)=[@init={0x18, 0x84, 0x0, {0x7a35, 0x1, 0x4000000000000000, 0x5}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x4}}, @init={0x18, 0x84, 0x0, {0x80, 0x6, 0x1200000000000, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x7, 0x2, 0x34d, 0x20, 0xfffffffffffffffc, 0xffffffff, 0x2, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x7fff}, @prinfo={0x18, 0x84, 0x5, {0x0, 0xcd8a}}, @sndrcv={0x30, 0x84, 0x1, {0xed1f, 0x2, 0x1, 0x0, 0x100000001, 0x8, 0x2, 0x8, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x108, 0x80}, 0x800) r7 = msgget(0x2, 0x180) msgctl$MSG_STAT(r7, 0xb, &(0x7f0000001b40)=""/59) ioprio_get$pid(0x1, r5) accept$alg(r4, 0x0, 0x0) getpeername$unix(r2, &(0x7f0000001b80)=@abs, &(0x7f0000001c00)=0x6e) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000001c40)={r3, 0x20, 0xffff}, 0x8) getpriority(0x0, r5) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000001c80)={0xffffffff0, 0x10000, 0xffffffff, 0x10000}) setxattr$trusted_overlay_nlink(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)='trusted.overlay.nlink\x00', &(0x7f0000001d40)={'U+', 0x40}, 0x28, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r4, 0xc008551b, &(0x7f0000001d80)={0x8000, 0xc, [0xffffffffffffffc0, 0x8000, 0x401]}) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000001dc0)={0x6, 0x8201, 0x7, 0x80000001, r3}, &(0x7f0000001e00)=0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001e80)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r8, &(0x7f0000001f80)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x5010000}, 0xc, &(0x7f0000001f40)={&(0x7f0000001ec0)={0x80, r9, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf763}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdd3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2c6}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x63a0}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x321f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x80) 09:09:38 executing program 2: 09:09:38 executing program 1: 09:09:38 executing program 3: 09:09:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x0, 0x0, 0x0, 0x21, "0144272bf6f6743117cedc175fd3d23f63975c4581553bd0324fb0bbce93328771"}, 0x2d) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 09:09:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) 09:09:38 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101200) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000001c0)={0xd000, &(0x7f0000000140), 0xe, r1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x6e0]}) 09:09:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x805, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000000c0)) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) socketpair(0xb, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) [ 263.117347] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 09:09:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044590) [ 263.206828] ================================================================== [ 263.214258] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 263.220887] CPU: 1 PID: 7517 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #63 [ 263.228098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.237467] Call Trace: [ 263.240095] dump_stack+0x306/0x460 [ 263.243760] ? _raw_spin_lock_irqsave+0x227/0x340 [ 263.248641] ? vmx_create_vcpu+0x10df/0x7920 [ 263.253099] kmsan_report+0x1a3/0x2d0 [ 263.256952] __msan_warning+0x7c/0xe0 [ 263.260789] vmx_create_vcpu+0x10df/0x7920 [ 263.265080] ? kmsan_set_origin_inline+0x6b/0x120 [ 263.269968] ? __msan_poison_alloca+0x17a/0x210 [ 263.274686] ? vmx_vm_init+0x340/0x340 [ 263.278615] kvm_arch_vcpu_create+0x25d/0x2f0 [ 263.283155] kvm_vm_ioctl+0x13fd/0x33d0 [ 263.287190] ? __msan_poison_alloca+0x17a/0x210 [ 263.291915] ? do_vfs_ioctl+0x18a/0x2810 [ 263.296008] ? __se_sys_ioctl+0x1da/0x270 [ 263.300190] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 263.305062] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 263.309945] do_vfs_ioctl+0xcf3/0x2810 [ 263.313901] ? security_file_ioctl+0x92/0x200 [ 263.318443] __se_sys_ioctl+0x1da/0x270 [ 263.322473] __x64_sys_ioctl+0x4a/0x70 [ 263.326404] do_syscall_64+0xbe/0x100 [ 263.330253] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 263.335469] RIP: 0033:0x457579 [ 263.338697] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.357633] RSP: 002b:00007f9682abbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.365416] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 263.372714] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 263.380011] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.387312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9682abc6d4 [ 263.394628] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 263.401941] [ 263.403599] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 263.410557] Variable was created at: [ 263.414310] vmx_create_vcpu+0xd5/0x7920 [ 263.418422] kvm_arch_vcpu_create+0x25d/0x2f0 [ 263.422940] ================================================================== [ 263.430323] Disabling lock debugging due to kernel taint [ 263.435845] Kernel panic - not syncing: panic_on_warn set ... [ 263.435845] [ 263.443263] CPU: 1 PID: 7517 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #63 09:09:39 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xbb, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) close(r2) [ 263.451851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.461229] Call Trace: [ 263.464398] dump_stack+0x306/0x460 [ 263.468083] panic+0x54c/0xafa [ 263.471378] kmsan_report+0x2cd/0x2d0 [ 263.475232] __msan_warning+0x7c/0xe0 [ 263.479078] vmx_create_vcpu+0x10df/0x7920 [ 263.483378] ? kmsan_set_origin_inline+0x6b/0x120 [ 263.488272] ? __msan_poison_alloca+0x17a/0x210 [ 263.492985] ? vmx_vm_init+0x340/0x340 [ 263.496935] kvm_arch_vcpu_create+0x25d/0x2f0 [ 263.501496] kvm_vm_ioctl+0x13fd/0x33d0 [ 263.505527] ? __msan_poison_alloca+0x17a/0x210 [ 263.510257] ? do_vfs_ioctl+0x18a/0x2810 [ 263.514394] ? __se_sys_ioctl+0x1da/0x270 [ 263.518580] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 263.523458] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 263.528350] do_vfs_ioctl+0xcf3/0x2810 [ 263.532302] ? security_file_ioctl+0x92/0x200 [ 263.536860] __se_sys_ioctl+0x1da/0x270 [ 263.540904] __x64_sys_ioctl+0x4a/0x70 [ 263.544830] do_syscall_64+0xbe/0x100 [ 263.548683] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 263.553903] RIP: 0033:0x457579 [ 263.557142] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.576118] RSP: 002b:00007f9682abbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.583867] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 263.591162] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 263.598451] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.605749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9682abc6d4 [ 263.613066] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 263.621313] Kernel Offset: disabled [ 263.624961] Rebooting in 86400 seconds..