[....] Starting OpenBSD Secure Shell server: sshd[ 49.137886] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 49.454732] audit: type=1800 audit(1538997141.510:29): pid=5860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 49.474283] audit: type=1800 audit(1538997141.510:30): pid=5860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 49.978493] random: sshd: uninitialized urandom read (32 bytes read) [ 50.550531] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 52.369053] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. [ 58.221476] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 11:12:31 fuzzer started [ 62.219780] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 11:12:36 dialing manager at 10.128.0.26:43781 2018/10/08 11:12:36 syscalls: 1 2018/10/08 11:12:36 code coverage: enabled 2018/10/08 11:12:36 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 11:12:36 setuid sandbox: enabled 2018/10/08 11:12:36 namespace sandbox: enabled 2018/10/08 11:12:36 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 11:12:36 fault injection: enabled 2018/10/08 11:12:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 11:12:36 net packed injection: enabled 2018/10/08 11:12:36 net device setup: enabled [ 66.412117] random: crng init done 11:14:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x8) getsockopt$inet6_tcp_int(r0, 0x6, 0x33, &(0x7f0000000480), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x9}, 0x10) [ 149.810459] IPVS: ftp: loaded support on port[0] = 21 [ 151.626555] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.633241] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.641329] device bridge_slave_0 entered promiscuous mode [ 151.757822] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.764571] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.772676] device bridge_slave_1 entered promiscuous mode [ 151.884202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 152.004424] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:14:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffffffffffffffd, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[@ANYBLOB="0112040909180600000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000ff020000000000000000000000000001fe800000000000000008000000000017fe800001800000000008000000000011ff010000000000000000000000000001fe800000000000000000ee000000001700000000000000000000000000000000"], 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40800, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) [ 152.383177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.554633] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 152.769314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.777951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.089519] IPVS: ftp: loaded support on port[0] = 21 [ 153.375297] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 153.383472] team0: Port device team_slave_0 added [ 153.568487] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 153.576429] team0: Port device team_slave_1 added [ 153.685601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 153.703214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 153.711825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 153.901343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.084959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 154.092685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.101294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.329762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 154.337459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.346191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.802707] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.809264] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.817575] device bridge_slave_0 entered promiscuous mode [ 155.953584] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.960097] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.968178] device bridge_slave_1 entered promiscuous mode [ 156.118026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 156.271754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 156.472585] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.479149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.486125] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.492611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.501244] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:14:08 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000012fc7)}) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0xffffffffffffffdd, 0x0, &(0x7f000000dff8), 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x2, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='Bk'], 0x0, 0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 156.833003] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.035069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.280026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.484359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.485037] IPVS: ftp: loaded support on port[0] = 21 [ 157.491453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.224412] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.232798] team0: Port device team_slave_0 added [ 158.473620] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.481523] team0: Port device team_slave_1 added [ 158.743218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 158.750260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.759052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.946379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 158.953874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.962574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.170484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.178234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.186892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.453206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.460761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.469733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.977004] ip (6279) used greatest stack depth: 53056 bytes left [ 161.427665] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.434278] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.442405] device bridge_slave_0 entered promiscuous mode [ 161.679080] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.685757] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.693936] device bridge_slave_1 entered promiscuous mode [ 161.769026] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.775512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.782421] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.788910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.797330] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.978773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.213436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 162.332569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.911926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.130956] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:14:15 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000003c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000800)={0x1}) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)={'exec ', '\x00'}, 0x6) sendto$inet6(r4, &(0x7f0000000040), 0xfe30, 0x20000016, &(0x7f0000000080)={0xa, 0x4e22, 0x8dffffff00000000, @empty={[0xe00000000000000, 0xfe80000000000700, 0x0, 0xe603000000000000]}}, 0x1c) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000380)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r0}) execveat(r0, &(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000480)='\x00', &(0x7f00000004c0)='vboxnet0#ppp1,loself$\x00', &(0x7f0000000500)='--\'}bdevsystem(\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\x00'], &(0x7f0000000680)=[&(0x7f0000000600)='eth1keyringvboxnet1\x00', &(0x7f0000000640)='/proc/self/attr/current\x00'], 0x800) [ 163.447859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.455116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.708772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.715919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.184531] IPVS: ftp: loaded support on port[0] = 21 [ 164.609945] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.617952] team0: Port device team_slave_0 added [ 164.883630] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.891461] team0: Port device team_slave_1 added [ 165.164710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.171985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.180462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.438137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.445691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.454276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.712145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.719764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.728615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.935614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.943310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.951936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.042989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.216997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.155094] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.161443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.169641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.610532] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.617193] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.625207] device bridge_slave_0 entered promiscuous mode [ 168.924550] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.930985] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.939214] device bridge_slave_1 entered promiscuous mode [ 169.249071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 169.267129] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.330643] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.337154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.344079] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.350537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.358847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 169.556212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 170.321854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.438280] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.815048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.090926] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 171.098080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.430031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.437178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:14:23 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc]}, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) [ 172.370169] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.378149] team0: Port device team_slave_0 added [ 172.715216] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.723044] team0: Port device team_slave_1 added [ 172.809540] IPVS: ftp: loaded support on port[0] = 21 [ 173.050075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.057328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.066035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.361929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.368927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.377631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.703000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.719474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.727021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.735846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.063871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.071359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.080366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.080134] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 176.252440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 176.258828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.266741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.792922] hrtimer: interrupt took 34374 ns 11:14:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x8) getsockopt$inet6_tcp_int(r0, 0x6, 0x33, &(0x7f0000000480), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x9}, 0x10) [ 177.703895] 8021q: adding VLAN 0 to HW filter on device team0 11:14:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x8) getsockopt$inet6_tcp_int(r0, 0x6, 0x33, &(0x7f0000000480), &(0x7f0000000240)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x9}, 0x10) [ 178.405671] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.412322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.419175] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.425745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.433819] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:14:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffbfffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)=""/45, 0x2d}) writev(r2, &(0x7f0000000080), 0x1a6) [ 178.654268] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.660899] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.669101] device bridge_slave_0 entered promiscuous mode 11:14:31 executing program 0: socketpair(0x1, 0x1, 0x7c26, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000240)={@empty, @multicast2, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="6c0080f60000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="0e00feffe3ff0f00f2ffe0ff0800050066040000080005007b0300000c00010064736d61726b00000c0002000800050006000000080005004a81000008000500ff06000008000500010000000800050009ff0000"], 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x40) r3 = creat(&(0x7f0000000040)='.\x00', 0x6) fstatfs(r3, &(0x7f00000001c0)=""/63) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001500)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x8}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000015c0)={r4, @in6={{0xa, 0x4e20, 0x4, @remote, 0x1}}, 0x2e6, 0x8, 0x4, 0x40, 0x10}, 0x98) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=@gettfilter={0x23, 0x2e, 0x325}, 0x24}}, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000007db5cbf3e59a3000000ac14141dac1414aa7f000001ac141414ffffffff0000000700000000"], 0x2c) write$UHID_INPUT(r0, &(0x7f00000004c0)={0x8, "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", 0x1000}, 0x1006) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 179.030553] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.037079] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.045300] device bridge_slave_1 entered promiscuous mode 11:14:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r0, r0) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000201d08e53d5224d505d7a000500000000000000090000001f10316290e652b811280000", @ANYRES32=0x0], 0x20}}, 0x0) [ 179.362022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.446541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:14:31 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8003e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000200)=0x1000) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1) [ 179.786067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.719094] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:14:32 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8003e, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000200)=0x1000) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1) [ 181.076306] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.382278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 181.391032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.708857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 181.716134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:14:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000000000005, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x4000}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) [ 182.555694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.563707] team0: Port device team_slave_0 added [ 182.731958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.812038] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.819878] team0: Port device team_slave_1 added [ 183.062236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.069391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.077956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.293181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.300275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.308757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.553806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.561773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.570295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.742365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.776975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.784582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.793101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.598301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.604720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.612552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:14:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffffffffffffffd, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[@ANYBLOB="0112040909180600000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000ff020000000000000000000000000001fe800000000000000008000000000017fe800001800000000008000000000011ff010000000000000000000000000001fe800000000000000000ee000000001700000000000000000000000000000000"], 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40800, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) [ 185.547042] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.303631] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.310199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.317156] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.323804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.332491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.339126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.406067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.080789] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.705516] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.732127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.739869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.817730] binder: 7173:7175 unknown command 27458 [ 189.823111] binder: 7173:7175 ioctl c0306201 2000dfd0 returned -22 [ 189.833565] binder: 7173:7175 BC_DEAD_BINDER_DONE 0000000000000000 not found 11:14:41 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c95) unshare(0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) [ 190.399316] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.589594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.036012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.250511] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:14:45 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000003c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000800)={0x1}) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000002c0)={'exec ', '\x00'}, 0x6) sendto$inet6(r4, &(0x7f0000000040), 0xfe30, 0x20000016, &(0x7f0000000080)={0xa, 0x4e22, 0x8dffffff00000000, @empty={[0xe00000000000000, 0xfe80000000000700, 0x0, 0xe603000000000000]}}, 0x1c) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000380)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r0}) execveat(r0, &(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000480)='\x00', &(0x7f00000004c0)='vboxnet0#ppp1,loself$\x00', &(0x7f0000000500)='--\'}bdevsystem(\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\x00'], &(0x7f0000000680)=[&(0x7f0000000600)='eth1keyringvboxnet1\x00', &(0x7f0000000640)='/proc/self/attr/current\x00'], 0x800) [ 193.468705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 193.551371] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.557875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.565627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.958922] 8021q: adding VLAN 0 to HW filter on device team0 11:14:47 executing program 4: r0 = socket$packet(0x11, 0x800000000000003, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:14:47 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000012fc7)}) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0xffffffffffffffdd, 0x0, &(0x7f000000dff8), 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x2, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='Bk'], 0x0, 0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 11:14:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000040)) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xb, 0x100010, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @broadcast}}, [0x100000001, 0x1, 0xa00d, 0x2, 0x0, 0xffff, 0x8, 0x1, 0x8, 0x800, 0x80, 0xb2, 0x6, 0x9, 0x1]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x800}, 0x8) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x100, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000240)=0x9) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r1, 0x1}, &(0x7f0000000300)=0x8) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x2002, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000380)={r3, 0x3}, 0x8) sysfs$2(0x2, 0x7, &(0x7f00000003c0)=""/188) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000480)=0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000004c0)) write$binfmt_misc(r4, &(0x7f0000000500)={'syz1', "236056c6b7a7fa2b34f462f0522f2241062e7a6548bc46a8e10ba75e1c0d461dbd86347998c13cb5eb4ae4d104d46d4ae7aa3ba83d6b05e55970d3776b9bf73c4e9d5d4bc02bb4f3606709b59dbb28b95e8e381cfd635308d2"}, 0x5d) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000005c0)={r6, 0x2}) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000600)=0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r4, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r7, r4, 0x0, 0xc, &(0x7f0000000640)='/dev/uinput\x00', r8}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ppp\x00', 0x2, 0x0) ioctl$FITRIM(r9, 0xc0185879, &(0x7f00000007c0)={0xffff, 0x2, 0x20}) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r2) msgget(0x2, 0x4) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000000940)=[r10, r11]) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r12, 0x10e, 0xf, &(0x7f0000000980)=""/139, &(0x7f0000000a40)=0x8b) 11:14:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="bf16000000000000b707000001000000407000000000e0ff40000000000000009500000200000000"], &(0x7f00000003c0)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0xdc, &(0x7f0000000200)="02b468e4279d4c6529e4546c1c22", &(0x7f0000001700)=""/220}, 0x28) 11:14:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_matches\x00') lseek(r0, 0x0, 0x0) 11:14:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000015c0)='mounts\x00') preadv(r0, &(0x7f00000017c0), 0x1c8, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 195.727891] binder: 7370:7372 unknown command 27458 [ 195.733119] binder: 7370:7372 ioctl c0306201 2000dfd0 returned -22 [ 195.789706] binder: 7370:7377 BC_DEAD_BINDER_DONE 0000000000000000 not found 11:14:47 executing program 4: r0 = socket$packet(0x11, 0x800000000000003, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:14:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x77) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="abc200000000000000000000005bcb9a31", 0x11) 11:14:48 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000180)) tkill(r0, 0x1004000000016) 11:14:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000140)}, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "8307"}], 0x18}, 0x0) 11:14:48 executing program 2: 11:14:48 executing program 3: 11:14:48 executing program 1: 11:14:48 executing program 4: r0 = socket$packet(0x11, 0x800000000000003, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 196.769850] IPVS: ftp: loaded support on port[0] = 21 [ 197.967036] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.973589] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.980944] device bridge_slave_0 entered promiscuous mode [ 198.046987] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.053532] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.060801] device bridge_slave_1 entered promiscuous mode [ 198.128419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.194151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 198.386826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.453843] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.767688] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 198.775350] team0: Port device team_slave_0 added [ 198.843209] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.850674] team0: Port device team_slave_1 added [ 198.915331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 198.922603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.930887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.998501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.067517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.074867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.083430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.152048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.159203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.167863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.849249] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.855668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.862561] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.868929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.876752] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 200.732592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.461956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.709101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.959153] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.965661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.973540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.239878] 8021q: adding VLAN 0 to HW filter on device team0 11:14:56 executing program 5: 11:14:56 executing program 2: 11:14:56 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000180)) tkill(r0, 0x1004000000016) 11:14:56 executing program 3: 11:14:56 executing program 1: 11:14:56 executing program 4: r0 = socket$packet(0x11, 0x800000000000003, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:14:57 executing program 1: 11:14:57 executing program 2: 11:14:57 executing program 5: 11:14:57 executing program 3: 11:14:57 executing program 4: r0 = socket$packet(0x11, 0x800000000000003, 0x300) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:14:57 executing program 0: 11:14:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000740)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0xe3, 0x0) 11:14:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xfff) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x400}) 11:14:57 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:14:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x5a) 11:14:57 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) 11:14:57 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x4, 0x3}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000100)=0x5, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, &(0x7f0000000100), &(0x7f00000001c0)=""/113}, 0x18) 11:14:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d1"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:14:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d5}, 0xffffffe8) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 205.834070] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! 11:14:58 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 205.974688] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:14:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"000000000000000000e9dc00", 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 206.093875] ================================================================== [ 206.101300] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 206.108929] CPU: 1 PID: 7736 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #64 [ 206.116114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.125473] Call Trace: [ 206.128076] dump_stack+0x306/0x460 [ 206.131721] ? vmx_set_constant_host_state+0x1778/0x1830 [ 206.137199] kmsan_report+0x1a2/0x2e0 [ 206.141019] __msan_warning+0x7c/0xe0 [ 206.144819] vmx_set_constant_host_state+0x1778/0x1830 [ 206.150110] vmx_create_vcpu+0x3e6f/0x7870 [ 206.154357] ? kmsan_set_origin_inline+0x6b/0x120 [ 206.159195] ? __msan_poison_alloca+0x17a/0x210 [ 206.163861] ? vmx_vm_init+0x340/0x340 [ 206.167740] kvm_arch_vcpu_create+0x25d/0x2f0 [ 206.172234] kvm_vm_ioctl+0x13fd/0x33d0 [ 206.176214] ? __msan_poison_alloca+0x17a/0x210 [ 206.180891] ? do_vfs_ioctl+0x18a/0x2810 [ 206.185030] ? __se_sys_ioctl+0x1da/0x270 [ 206.189169] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 206.194001] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 206.198850] do_vfs_ioctl+0xcf3/0x2810 [ 206.202743] ? security_file_ioctl+0x92/0x200 [ 206.207252] __se_sys_ioctl+0x1da/0x270 [ 206.211247] __x64_sys_ioctl+0x4a/0x70 [ 206.215131] do_syscall_64+0xbe/0x100 [ 206.218928] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 206.224111] RIP: 0033:0x457579 [ 206.227549] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.246448] RSP: 002b:00007f1b6af3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.254149] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 206.261407] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 206.268676] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 206.275936] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b6af3f6d4 [ 206.283198] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 206.290463] [ 206.292078] Local variable description: ----dt@vmx_set_constant_host_state [ 206.299073] Variable was created at: [ 206.302779] vmx_set_constant_host_state+0x2b0/0x1830 [ 206.307959] vmx_create_vcpu+0x3e6f/0x7870 [ 206.312173] ================================================================== [ 206.319513] Disabling lock debugging due to kernel taint [ 206.324952] Kernel panic - not syncing: panic_on_warn set ... [ 206.324952] [ 206.332317] CPU: 1 PID: 7736 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #64 [ 206.340875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.350210] Call Trace: [ 206.352789] dump_stack+0x306/0x460 [ 206.356408] panic+0x54c/0xafa [ 206.359629] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 206.365073] kmsan_report+0x2d3/0x2e0 [ 206.368867] __msan_warning+0x7c/0xe0 [ 206.372662] vmx_set_constant_host_state+0x1778/0x1830 [ 206.377933] vmx_create_vcpu+0x3e6f/0x7870 [ 206.382165] ? kmsan_set_origin_inline+0x6b/0x120 [ 206.387000] ? __msan_poison_alloca+0x17a/0x210 [ 206.391662] ? vmx_vm_init+0x340/0x340 [ 206.396006] kvm_arch_vcpu_create+0x25d/0x2f0 [ 206.400491] kvm_vm_ioctl+0x13fd/0x33d0 [ 206.404471] ? __msan_poison_alloca+0x17a/0x210 [ 206.409234] ? do_vfs_ioctl+0x18a/0x2810 [ 206.413288] ? __se_sys_ioctl+0x1da/0x270 [ 206.417422] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 206.422339] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 206.427167] do_vfs_ioctl+0xcf3/0x2810 [ 206.431166] ? security_file_ioctl+0x92/0x200 [ 206.435655] __se_sys_ioctl+0x1da/0x270 [ 206.439619] __x64_sys_ioctl+0x4a/0x70 [ 206.443491] do_syscall_64+0xbe/0x100 [ 206.447283] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 206.452456] RIP: 0033:0x457579 [ 206.455637] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.474533] RSP: 002b:00007f1b6af3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.482230] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 206.489500] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 206.496757] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 206.504008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b6af3f6d4 [ 206.511262] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 206.519760] Kernel Offset: disabled [ 206.523386] Rebooting in 86400 seconds..