[ 56.453740] audit: type=1800 audit(1538750098.491:27): pid=6079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.184343] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[ 58.522214] random: sshd: uninitialized urandom read (32 bytes read) [?25h[?0c. [ 59.252559] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.624704] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. [ 67.452365] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/05 14:35:11 fuzzer started [ 72.220051] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/05 14:35:16 dialing manager at 10.128.0.26:36867 2018/10/05 14:35:16 syscalls: 1 2018/10/05 14:35:16 code coverage: enabled 2018/10/05 14:35:16 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/05 14:35:16 setuid sandbox: enabled 2018/10/05 14:35:16 namespace sandbox: enabled 2018/10/05 14:35:16 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/05 14:35:16 fault injection: enabled 2018/10/05 14:35:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/05 14:35:16 net packed injection: enabled 2018/10/05 14:35:16 net device setup: enabled [ 77.117824] random: crng init done 14:37:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x2, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88) close(r0) [ 194.715939] IPVS: ftp: loaded support on port[0] = 21 [ 197.224611] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.231761] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.240344] device bridge_slave_0 entered promiscuous mode [ 197.399530] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.406194] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.414730] device bridge_slave_1 entered promiscuous mode [ 197.556109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 197.695709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2d, &(0x7f0000000200)={@mcast2}, 0x20) [ 198.208135] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.400091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.595330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 198.602619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.743888] IPVS: ftp: loaded support on port[0] = 21 [ 198.825729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 198.832903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.362291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 199.370469] team0: Port device team_slave_0 added [ 199.586617] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 199.594849] team0: Port device team_slave_1 added [ 199.837937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 199.845187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.854229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.037103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.044297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.053325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.222898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 200.230534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.239870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.496676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 200.504596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.513960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.719684] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.726291] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.734890] device bridge_slave_0 entered promiscuous mode [ 202.898148] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.904750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.911827] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.918307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.927500] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.998393] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.005050] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.013854] device bridge_slave_1 entered promiscuous mode [ 203.259882] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.404079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:37:25 executing program 2: r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='-$\x00', 0xfffffffffffffffc) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="16f7d41e75d7519e4ffea02f3648558e152d28fb0b506f69a2117d2baa863e75c2880bc9457d9dc0baf9465314f37bb87d59aa416b921ad0200858446b3e61cdadc621b48af248bc5c1abcb76a1b7df00bc89e80bdac440fef52c88cf94326a13f3988e7c240d418f43a6a21e013fc5f5abd4315d89b34b4d161772b4334882a9aa08719a35da364b5f091b65fed62c45cb5ff36ab11026f776f53bab5145882eaac4a", 0xa3, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000380)=[{&(0x7f0000000300)="fd77d159f9188a37cf9f11d4cf6381ab7f1a34f66a5cc09d44764e0c081433c363def341a4ac19fda1b8049e3a96b18652aa0157b5244ebf807e17fa3da6347aeb7fe247669565b95cd95fd36b616339bdc95539a087bcea329a36f9cee3e52f631b6365c99e", 0x66}], 0x1, r1) creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = mq_open(&(0x7f00000002c0)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_notify(r2, 0x0) [ 203.701872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.015727] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.332301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.551221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 204.560161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.741245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.748426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.748530] IPVS: ftp: loaded support on port[0] = 21 [ 205.621457] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.630067] team0: Port device team_slave_0 added [ 206.015722] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.024024] team0: Port device team_slave_1 added [ 206.292527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.299595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.308816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.664192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.671265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.680277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.923452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.931111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.940250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.257263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.265117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.274398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.688329] ip (6490) used greatest stack depth: 53056 bytes left [ 209.173000] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.179488] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.188072] device bridge_slave_0 entered promiscuous mode [ 209.418351] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.424967] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.433563] device bridge_slave_1 entered promiscuous mode [ 209.662260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.958790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.466604] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.473189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.480153] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.486861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.495687] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.873071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.925346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.112183] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.303007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.310104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.596440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.603823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:37:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = getpid() kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r0, &(0x7f0000000000)) [ 212.599634] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.608000] team0: Port device team_slave_0 added [ 212.727931] IPVS: ftp: loaded support on port[0] = 21 [ 213.029445] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.038159] team0: Port device team_slave_1 added [ 213.427335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.434679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.443711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.836470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.843706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.852764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.276734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.284550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.293883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.593385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.601083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.610436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.164646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.614807] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.689455] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.696086] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.704788] device bridge_slave_0 entered promiscuous mode [ 218.729604] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.736226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.743278] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.749785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.758650] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 218.991798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.026562] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.033194] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.042287] device bridge_slave_1 entered promiscuous mode [ 219.097834] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.104443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.112779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.411689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.708474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.573998] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.831396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.214472] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.608889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.616214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.008898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.016115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:37:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) [ 223.195818] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.204106] team0: Port device team_slave_0 added [ 223.638067] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.646295] team0: Port device team_slave_1 added [ 224.026485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.034291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.043248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.057797] IPVS: ftp: loaded support on port[0] = 21 [ 224.299723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.307070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.316163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.696402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.704249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.713590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.110865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.118739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.128034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.588950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.156138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.800728] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.807447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.815622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.848179] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.854762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.861964] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.868441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.877465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.884882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.445990] 8021q: adding VLAN 0 to HW filter on device team0 14:37:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$sock_buf(r2, 0x1, 0x800000000001c, &(0x7f0000000180), &(0x7f0000000140)) [ 231.134116] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.140626] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.149097] device bridge_slave_0 entered promiscuous mode 14:37:53 executing program 0: r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x2000000080) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xa000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x5}}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x40000000000014d, 0x0, 0x0) [ 231.660573] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.667430] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.676146] device bridge_slave_1 entered promiscuous mode 14:37:54 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000004500), &(0x7f0000004540), &(0x7f0000004580)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2364, 0x2040) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000001c0)={0x9, 0x7, 0x6, 'queue0\x00'}) [ 232.135393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.455223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:37:54 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r2 = dup(r1) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e21}, 0x10) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000180)=0x1, 0x1) socketpair(0x4, 0x6, 0x627, &(0x7f0000000040)={0xffffffffffffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x210000, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r0, &(0x7f0000adb000)="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", 0x7d0, 0x0, &(0x7f0000809000)={0xa, 0x4e24}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000080)=""/49, 0x31, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x707000) [ 233.645587] bond0: Enslaving bond_slave_0 as an active interface with an up link 14:37:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000030058", 0x1f}], 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="d0929c53035b9d459804266f233ddfea7cfd9bf01d9289b1117bc4b4a6f2fe5ae0bf1c4f9178b3ff32d2960ad1c6cbab4b5129c49ad5f0837129abcb78d2824bca03c280b8897fbf01c06eedf8c35905817849e94848de1cd7dcb78f1088a3e38d5d43ebf1fe81779b6a02fb5395019a2782a3957cb350eb19175920f05a92a174580b065b8fcf13b11fded747f7928e0b02ac3e28ccd062c141455653698275a8c55ccd240e817b3cfb0cfe14fff66834b83141c7d3ea1887fd2d785fbb7b487830a4ec15e3109a88338775fc733d162949e37d5959af47bec6332e28f5e0b1821ae6df0c9ba7bc9fdd847b3d0650c285b022017a", 0xf5}], 0x1) [ 234.146930] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:37:56 executing program 0: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xac, 0xfffffffffffffffb, 0x1, 0x8000, 0x1}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r1, 0x100, 0xfd, "cfb720d14cfc67b87469b4e08d169de13cd7c5b6ead8d0a673c03fa7cdb153fd377449cbc0b6611385ffc9e756a84a9d57958df768b03ec6e328c5867db08fee4bc77c38005e071fc772530b0ae99779865274684bf84a5ae18f6e488ab86b194c6f4279ad878001e69cc4694e37a420cb36ac87498df7c8e72136ea7b0e7307c1c37f07133170604baaa806c41bc77ed19ab38b171d34bf15fa2f93cbc44000c7d1dbfd790cf44a10e569879ee0f6df036929e4c4a7fe7c1a86e25699c8d3246e99be424c96ad4e9f136eca35527b9cf40bd395cefb2f9c1e059b42959d885a06e7c188ea2948a6c68856d42956887c0b47773ae3ec33fa035b068788"}, 0x105) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockname(r0, &(0x7f00000002c0)=@can, &(0x7f0000000100)=0x80) socket(0x10, 0xa, 0xfffffffffffffffa) [ 234.556150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 234.563599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 14:37:56 executing program 0: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001440)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000001340)=""/239}, 0x18) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x102, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8091}, 0xc090) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/41, 0x29}, {&(0x7f0000000080)=""/28, 0x1c}], 0x2ff, &(0x7f0000000300)=""/199, 0xc7}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) [ 234.862041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 234.869193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:37:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x48000) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x48, 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) [ 235.888803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.215861] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.224171] team0: Port device team_slave_0 added [ 236.551741] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.559819] team0: Port device team_slave_1 added [ 236.933703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.940844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.949811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.081234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.247277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.254605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.263766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.546340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.554133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.563165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.830515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.838389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.847726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.254738] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.261242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.269435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:38:01 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/14, &(0x7f0000000100)=0xe) getsockopt(r0, 0x80000001, 0xa15a, &(0x7f0000000140)=""/213, &(0x7f0000000240)=0xd5) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000280)={0xbddb, 0x1, 0x10000, 0x9, "c769c1ead7bf51c847c0b3092a412bd67acdc17069f46b94b70dccc3872b2f7d"}) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000003c0)={0xe0, &(0x7f00000002c0)="1c66bc54a93c77e5af0a0742968c891e512cf735fd61704a4e0abd0db9dbecc216f80a18649752a5cdb1b698869234edabbe8cae65dfd077b29b0b90648056f232237c950801fedcdeb0abf8ae60b0cb6b64dc318b2ad22cb71ef3a4ee3c98a74dfd5393b41efefb15162441a05d58d488f68a5977e731a141336f1c82c8f3b560a9a6dc43ce2cf51a7c0a2157f30b86075d8b19ec93108d11bf60e64209d195bb70bd6a1f576f17256de85112c1818dc57d236f4e282285fcefb8453ed2d6c20be45bf3367989263f489e889e95bf5c28c5b5173672065121169e600cff01d3"}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000400)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000440)={0x401, 0x7, 0x1, @remote, 'veth1_to_bond\x00'}) connect(r0, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x1, 0x1, {0xa, 0x4e24, 0x4, @remote, 0x10000}}}, 0x80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x5c, r3, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x35}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x404c004}, 0x20000000) mknod$loop(&(0x7f0000000680)='./file0\x00', 0x1140, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3a2f) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000006c0)=0xc688) unlinkat(r0, &(0x7f0000000700)='./file1\x00', 0x200) flistxattr(r0, &(0x7f0000000740)=""/209, 0xd1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000840)=0x0) sched_getparam(r4, &(0x7f0000000880)) r5 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000008c0)={0xaf3, 0xc593, 0x100000000, 0x2}) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000900)={'bcsh0\x00', @ifru_ivalue}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x927) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000000940)={{0xff, @broadcast, 0x4e23, 0x4, 'wrr\x00', 0x12, 0x3ff}, {@empty, 0x4e20, 0x10003, 0x6, 0x0, 0x4ab3}}, 0x44) mount$fuseblk(&(0x7f00000009c0)='/dev/loop0\x00', &(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)='fuseblk\x00', 0x800000, &(0x7f0000000a80)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}], [{@uid_eq={'uid', 0x3d, r1}}]}}) ioctl$sock_ifreq(r5, 0x8911, &(0x7f0000000b80)={'lo\x00', @ifru_settings={0x101, 0x4, @fr_pvc_info=&(0x7f0000000b40)={0x6, 'eql\x00'}}}) fcntl$addseals(r5, 0x409, 0x1) fcntl$dupfd(r5, 0x0, r0) ptrace$pokeuser(0x6, r4, 0x1f, 0x7) fgetxattr(r5, &(0x7f0000000bc0)=@random={'user.', 'IPVS\x00'}, &(0x7f0000000c00)=""/124, 0x7c) [ 239.502192] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.453643] IPVS: ftp: loaded support on port[0] = 21 [ 241.066396] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.073604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.080557] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.087223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.095807] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.102673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.169736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.217082] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.689078] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.696162] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.704907] device bridge_slave_0 entered promiscuous mode [ 245.978302] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.984932] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.993638] device bridge_slave_1 entered promiscuous mode [ 246.237312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.360390] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.367465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.375866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:38:08 executing program 2: [ 246.569792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.257161] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.368115] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.582157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.735837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.743094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.036740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.043953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.721468] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.730211] team0: Port device team_slave_0 added [ 248.926266] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.934521] team0: Port device team_slave_1 added [ 249.161732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.168809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.177777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.357672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.364953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.374646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.650631] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.658648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.667740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.877367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.885235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.894382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.113197] 8021q: adding VLAN 0 to HW filter on device bond0 14:38:14 executing program 3: [ 252.429895] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.436586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.443691] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.450157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.458895] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.465702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.853151] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.401919] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.408390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.416548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.976137] 8021q: adding VLAN 0 to HW filter on device team0 14:38:19 executing program 4: 14:38:19 executing program 1: 14:38:19 executing program 0: 14:38:19 executing program 2: 14:38:19 executing program 3: 14:38:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) 14:38:19 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)) getgid() getpgrp(0xffffffffffffffff) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000340)={0x0, r1+10000000}, &(0x7f0000000380), 0x8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000060c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) 14:38:20 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r1, &(0x7f0000001000), 0x1000) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000340)={0x0, r2+10000000}, &(0x7f0000000380), 0x8) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000060c0), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) 14:38:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sync() socket(0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x3ff) [ 259.104440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.449608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 259.783544] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.789879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.797948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.124812] 8021q: adding VLAN 0 to HW filter on device team0 14:38:24 executing program 5: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0xffdd) creat(&(0x7f0000000600)='./file1\x00', 0x1d0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f0000000340)="e91f7189591e9233614b00", &(0x7f00000003c0), &(0x7f0000001580)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000001c0)=ANY=[]) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) ioctl$sock_ifreq(r2, 0x0, &(0x7f00000000c0)={'ip6gretap0\x00', @ifru_map={0x0, 0x0, 0x0, 0x5}}) 14:38:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0xd, &(0x7f0000000cc0), &(0x7f0000000d00)=0x10) 14:38:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sync() socket(0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x3ff) 14:38:24 executing program 3: socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), 0x4) getsockname(0xffffffffffffffff, &(0x7f00000036c0)=@xdp, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003780)={0x0, @rand_addr, @dev}, 0xc) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 14:38:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7d, &(0x7f0000000cc0), &(0x7f0000000d00)=0x10) 14:38:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = memfd_create(&(0x7f00000000c0)='vmnet0em0$)security\x00', 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000940)={0xfff, 0x4, 0x2, 0x8, 0xd66}, 0x14) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000180)={0x1, &(0x7f0000000700)=[{0x0, 0x0, 0x0, @remote}]}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f00000000c0), 0x0) setxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:38:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = memfd_create(&(0x7f00000000c0)='vmnet0em0$)security\x00', 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000940)={0xfff, 0x4, 0x2, 0x8, 0xd66}, 0x14) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000180)={0x1, &(0x7f0000000700)=[{0x0, 0x0, 0x0, @remote}]}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f00000000c0), 0x0) setxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000001540)) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000740)=""/86, 0x56}, {&(0x7f00000007c0)=""/57, 0x39}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000ec0)=""/100, 0x64}], 0x5, &(0x7f0000001480)=[{&(0x7f0000000fc0)=""/165, 0xa5}, {&(0x7f0000001100)=""/114, 0x72}, {&(0x7f0000000940)}, {&(0x7f0000001180)=""/243, 0xf3}, {&(0x7f00000009c0)=""/49, 0x31}, {&(0x7f0000001280)=""/199, 0xc7}, {&(0x7f0000001380)=""/138, 0x8a}, {&(0x7f0000001440)=""/33, 0x21}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 262.489105] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 262.548279] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x1 [ 262.640202] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x1 14:38:24 executing program 2: add_key(&(0x7f0000000000)='syzkaller\x00', 0xfffffffffffffffe, &(0x7f0000000040), 0x0, 0x0) [ 262.726871] ================================================================== [ 262.734300] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 262.740818] CPU: 1 PID: 6404 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #63 [ 262.748012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.757382] Call Trace: [ 262.759977] [ 262.762167] dump_stack+0x306/0x460 [ 262.765827] ? loaded_vmcs_init+0x343/0x590 [ 262.770197] kmsan_report+0x1a3/0x2d0 [ 262.774043] __msan_warning+0x7c/0xe0 [ 262.777882] loaded_vmcs_init+0x343/0x590 [ 262.782336] __loaded_vmcs_clear+0x2fb/0x3c0 [ 262.786779] flush_smp_call_function_queue+0x404/0x770 [ 262.792084] ? vmx_get_msr_feature+0x180/0x180 [ 262.796711] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 262.802971] smp_call_function_single_interrupt+0x2f7/0x530 [ 262.808727] call_function_single_interrupt+0xf/0x20 [ 262.813855] [ 262.816132] RIP: 0010:kmsan_kmalloc+0xd4/0x120 [ 262.820741] Code: 00 74 16 eb 53 48 89 df 4c 89 f6 e8 76 bc ff ff 41 ff 8d 7c 09 00 00 75 3f e8 68 c2 36 ff 48 8b 45 c0 48 89 45 b8 ff 75 b8 9d <65> 48 8b 04 25 28 00 00 00 48 3b 45 d0 75 2f 48 83 c4 20 5b 41 5c [ 262.839671] RSP: 0018:ffff88015d46f888 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 262.847408] RAX: 0000000000000246 RBX: ffff88013d65f040 RCX: 000000000000000f [ 262.854695] RDX: 000000000000000e RSI: ffff88021fff2000 RDI: ffffffff7fffffff [ 262.861977] RBP: ffff88015d46f8d0 R08: 00000000005000c0 R09: 0000000000000001 [ 262.869283] R10: 000000000013e9e8 R11: ffffffff843a23f0 R12: ffff88021f805800 [ 262.876567] R13: ffff8801655a5a00 R14: 0000000000000038 R15: 00000000007000c0 [ 262.883908] ? apparmor_task_free+0x330/0x330 [ 262.888470] __kmalloc+0x14b/0x440 [ 262.892040] ? alloc_fdtable+0xbf/0x5e0 [ 262.896045] alloc_fdtable+0xbf/0x5e0 [ 262.899884] dup_fd+0x1186/0x1620 [ 262.903384] ? security_task_alloc+0x1a0/0x1e0 [ 262.908004] copy_process+0x3322/0xbc70 [ 262.912036] ? ptep_set_access_flags+0x110/0x1c0 [ 262.916832] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 262.922345] ? kmsan_set_origin_inline+0x6b/0x120 [ 262.927245] _do_fork+0x3d4/0x1330 [ 262.930830] ? put_timespec64+0x162/0x220 [ 262.935025] __se_sys_clone+0xf6/0x110 [ 262.938955] __x64_sys_clone+0x62/0x80 [ 262.942899] do_syscall_64+0xbe/0x100 [ 262.946725] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 262.951935] RIP: 0033:0x455b4a [ 262.955144] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 262.974065] RSP: 002b:0000000000a3fd50 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 262.981801] RAX: ffffffffffffffda RBX: 0000000000a3fd50 RCX: 0000000000455b4a [ 262.989091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 262.996386] RBP: 0000000000a3fd90 R08: 0000000000000001 R09: 00000000025d2940 [ 263.003680] R10: 00000000025d2c10 R11: 0000000000000246 R12: 0000000000000001 [ 263.010969] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 263.018292] [ 263.019934] Local variable description: ----error.i@loaded_vmcs_init [ 263.026430] Variable was created at: [ 263.030175] loaded_vmcs_init+0x8a/0x590 [ 263.034542] __loaded_vmcs_clear+0x2fb/0x3c0 [ 263.038958] ================================================================== [ 263.046330] Disabling lock debugging due to kernel taint [ 263.051797] Kernel panic - not syncing: panic_on_warn set ... [ 263.051797] [ 263.059195] CPU: 1 PID: 6404 Comm: syz-executor2 Tainted: G B 4.19.0-rc4+ #63 [ 263.067780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.077154] Call Trace: [ 263.079747] [ 263.081927] dump_stack+0x306/0x460 [ 263.085595] panic+0x54c/0xafa [ 263.088858] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 263.094344] kmsan_report+0x2cd/0x2d0 [ 263.098180] __msan_warning+0x7c/0xe0 [ 263.102012] loaded_vmcs_init+0x343/0x590 [ 263.106209] __loaded_vmcs_clear+0x2fb/0x3c0 [ 263.110654] flush_smp_call_function_queue+0x404/0x770 [ 263.115958] ? vmx_get_msr_feature+0x180/0x180 [ 263.120581] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 263.126841] smp_call_function_single_interrupt+0x2f7/0x530 [ 263.132588] call_function_single_interrupt+0xf/0x20 [ 263.137706] [ 263.139967] RIP: 0010:kmsan_kmalloc+0xd4/0x120 [ 263.145074] Code: 00 74 16 eb 53 48 89 df 4c 89 f6 e8 76 bc ff ff 41 ff 8d 7c 09 00 00 75 3f e8 68 c2 36 ff 48 8b 45 c0 48 89 45 b8 ff 75 b8 9d <65> 48 8b 04 25 28 00 00 00 48 3b 45 d0 75 2f 48 83 c4 20 5b 41 5c [ 263.164008] RSP: 0018:ffff88015d46f888 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 263.171784] RAX: 0000000000000246 RBX: ffff88013d65f040 RCX: 000000000000000f [ 263.179084] RDX: 000000000000000e RSI: ffff88021fff2000 RDI: ffffffff7fffffff [ 263.186374] RBP: ffff88015d46f8d0 R08: 00000000005000c0 R09: 0000000000000001 [ 263.193664] R10: 000000000013e9e8 R11: ffffffff843a23f0 R12: ffff88021f805800 [ 263.200982] R13: ffff8801655a5a00 R14: 0000000000000038 R15: 00000000007000c0 [ 263.208295] ? apparmor_task_free+0x330/0x330 [ 263.212839] __kmalloc+0x14b/0x440 [ 263.216404] ? alloc_fdtable+0xbf/0x5e0 [ 263.220405] alloc_fdtable+0xbf/0x5e0 [ 263.224252] dup_fd+0x1186/0x1620 [ 263.227777] ? security_task_alloc+0x1a0/0x1e0 [ 263.232397] copy_process+0x3322/0xbc70 [ 263.236388] ? ptep_set_access_flags+0x110/0x1c0 [ 263.241177] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 263.246688] ? kmsan_set_origin_inline+0x6b/0x120 [ 263.251585] _do_fork+0x3d4/0x1330 [ 263.255179] ? put_timespec64+0x162/0x220 [ 263.259371] __se_sys_clone+0xf6/0x110 [ 263.263308] __x64_sys_clone+0x62/0x80 [ 263.267237] do_syscall_64+0xbe/0x100 [ 263.271074] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 263.276280] RIP: 0033:0x455b4a [ 263.279490] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 263.298431] RSP: 002b:0000000000a3fd50 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 263.306188] RAX: ffffffffffffffda RBX: 0000000000a3fd50 RCX: 0000000000455b4a [ 263.313473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 263.320764] RBP: 0000000000a3fd90 R08: 0000000000000001 R09: 00000000025d2940 [ 263.328051] R10: 00000000025d2c10 R11: 0000000000000246 R12: 0000000000000001 [ 263.335345] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 263.343634] Kernel Offset: disabled [ 263.347279] Rebooting in 86400 seconds..