[....] Starting OpenBSD Secure Shell server: sshd[ 48.826532] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 49.137093] audit: type=1800 audit(1538903247.181:29): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 49.156489] audit: type=1800 audit(1538903247.181:30): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 52.104736] random: sshd: uninitialized urandom read (32 bytes read) [ 52.575902] random: sshd: uninitialized urandom read (32 bytes read) [ 53.802080] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.84' (ECDSA) to the list of known hosts. [ 59.525628] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/07 09:07:39 fuzzer started [ 63.419542] random: cc1: uninitialized urandom read (8 bytes read) [ 63.556569] cc1 (6034) used greatest stack depth: 53184 bytes left 2018/10/07 09:07:43 dialing manager at 10.128.0.26:36867 2018/10/07 09:07:43 syscalls: 1 2018/10/07 09:07:43 code coverage: enabled 2018/10/07 09:07:43 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/07 09:07:43 setuid sandbox: enabled 2018/10/07 09:07:43 namespace sandbox: enabled 2018/10/07 09:07:43 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/07 09:07:43 fault injection: enabled 2018/10/07 09:07:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/07 09:07:43 net packed injection: enabled 2018/10/07 09:07:43 net device setup: enabled [ 68.385222] random: crng init done 09:09:16 executing program 0: [ 158.749287] IPVS: ftp: loaded support on port[0] = 21 [ 160.485396] ip (6072) used greatest stack depth: 53056 bytes left [ 160.721907] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.728381] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.736653] device bridge_slave_0 entered promiscuous mode [ 160.855788] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.862493] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.870582] device bridge_slave_1 entered promiscuous mode [ 160.986943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.104573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.464851] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:09:19 executing program 1: [ 161.593815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.243199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.250981] team0: Port device team_slave_0 added [ 162.277364] IPVS: ftp: loaded support on port[0] = 21 [ 162.494727] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.502713] team0: Port device team_slave_1 added [ 162.730021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 162.737325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.746068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.980206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 162.987347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.995967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.175939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.183522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.192265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.380558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.388042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.397122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.497862] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.504511] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.512573] device bridge_slave_0 entered promiscuous mode [ 165.533349] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.539852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.546790] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.553304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.561545] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.671054] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.677785] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.685979] device bridge_slave_1 entered promiscuous mode [ 165.841070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.954421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:09:24 executing program 2: [ 166.502369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.531520] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.831995] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.832642] IPVS: ftp: loaded support on port[0] = 21 [ 167.089650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.097038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.351601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.358740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.008917] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 168.017217] team0: Port device team_slave_0 added [ 168.199471] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 168.207778] team0: Port device team_slave_1 added [ 168.464901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.692578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 168.699766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.708263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.963484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 168.971083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.980022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.232091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 169.239784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.248641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.858093] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.864823] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.873261] device bridge_slave_0 entered promiscuous mode [ 171.143790] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.150241] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.158451] device bridge_slave_1 entered promiscuous mode [ 171.287367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.454727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.980510] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.987062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.994130] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.000700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.009144] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 172.163318] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.348593] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.541116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 172.552089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.712355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.737239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 172.744536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.328077] ip (6367) used greatest stack depth: 53040 bytes left [ 173.492988] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.500903] team0: Port device team_slave_0 added 09:09:31 executing program 3: [ 173.770295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.778543] team0: Port device team_slave_1 added [ 174.113192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 174.120261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.129112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.422863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.430146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.438746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.755468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.763213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.772110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.876727] IPVS: ftp: loaded support on port[0] = 21 [ 175.045762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 175.053512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.062975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.058604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.348092] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 178.483273] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 178.489846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.498074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.581430] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.588399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.595452] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.601954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.610634] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.542300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.842658] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.178790] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.185842] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.194011] device bridge_slave_0 entered promiscuous mode [ 180.581392] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.588830] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.597338] device bridge_slave_1 entered promiscuous mode [ 180.920794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.294423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.172262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.474580] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:09:40 executing program 4: [ 182.872767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.879842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.253219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.260324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.133204] IPVS: ftp: loaded support on port[0] = 21 [ 184.341266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.349384] team0: Port device team_slave_0 added [ 184.689256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.697422] team0: Port device team_slave_1 added [ 185.113250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.160482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.167712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.176452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.572871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.581355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.590355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.881973] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.889581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.898504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.287856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.295696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.304626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.629809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.867534] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.874226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.881903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:09:46 executing program 0: 09:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890e, &(0x7f00000000c0)="153f62026d34488d7d5036dc5420657b5e570a44da20e78072bfd2") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x8000, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) close(r1) 09:09:47 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x8800, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x600210) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000180)={[], 0x800, 0x7, 0x5, 0x0, 0x4, 0x3000, 0x5004, [], 0xc4}) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/145, 0x91}], 0x1) [ 189.308807] 8021q: adding VLAN 0 to HW filter on device team0 09:09:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip_vti0\x00', 0xff39) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffffd1, 0x0, &(0x7f00000000c0), 0x10) shutdown(r0, 0x1) 09:09:48 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000a4c000), 0xc, &(0x7f0000ff5000)={&(0x7f00002a0e50)={0x14, 0x0, 0x0, 0x0, 0x0, {0x18}}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, &(0x7f0000ef8fd0), 0x22c, &(0x7f00000000c0)=""/81, 0x51}, 0x40002104) [ 190.586035] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.592912] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.601131] device bridge_slave_0 entered promiscuous mode 09:09:48 executing program 0: unshare(0x20400) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000000c0)={0x21, ""/33}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 191.053350] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.059828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.066799] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.073289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.081754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 191.108545] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.115170] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.123403] device bridge_slave_1 entered promiscuous mode 09:09:49 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) [ 191.441122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 191.754412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:09:49 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) [ 191.942589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.779972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.121220] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.399029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.452829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.459882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.761567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.768944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.373082] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.537847] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.545915] team0: Port device team_slave_0 added [ 194.850797] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.858660] team0: Port device team_slave_1 added [ 195.107457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.114867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.123289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.312337] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.318826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.326642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.364903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 195.393168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.401927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.598743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.606630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.615208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.779645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.787588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.796352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.338622] 8021q: adding VLAN 0 to HW filter on device team0 09:09:54 executing program 1: stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000080)=@nullb='/dew/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='dax\x00', 0x0, &(0x7f00000001c0)='threaded\x00') syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000240)={0x0, 0x0, 'client0\x00', 0x0, "ca9728e90bf5e235", "51a54c441b79a8e24e518cdfe9855ecba9929d9fa02dbc6b0aa0425243f5a259"}) [ 198.463868] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.470352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.477369] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.483859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.492035] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.498752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.404377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.959383] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:09:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in6=@ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 201.485523] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 201.491928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.499358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.937799] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.328218] 8021q: adding VLAN 0 to HW filter on device bond0 09:10:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000180), 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 204.768014] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.118433] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.124813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.132612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.403541] 8021q: adding VLAN 0 to HW filter on device team0 09:10:05 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$addseals(r0, 0x409, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r2, r1, &(0x7f0000000100), 0x2007ff) 09:10:05 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:05 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)={0x1, r1}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xb72) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x9}, 0x28, 0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @remote}}, [0x2, 0x0, 0x80000000, 0x81, 0x6, 0x1000, 0x100, 0x100000001, 0x80000000, 0x2, 0x1e, 0x4, 0x5, 0x1]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r2, @in={{0x2, 0x4e21, @local}}, 0xe37, 0x8, 0x3, 0x9, 0x28ee184d}, &(0x7f0000000300)=0x98) r4 = eventfd(0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)={r3, 0xb0, "a498c387fd36804676be6d32e2556be5d0906d1c35489fa4f537d3c46dfd1d818692e5c715d53e4021cf1a9934e687e4710ca58363942748edbbaca3c85b5005423fa97b7d3c50e7812d4fd025dc9574e85bdcc812daa12a3b54a19449399a1f9a800d4cc12725251be7f6f78e2ae85628125915d4a8f4962c351087935266af3dd8b45f155a4826705c33356efab8fcd405931ec53c349217d64e5802c356891c487e12cc24bf04e411d003b9d6f61b"}, &(0x7f0000000400)=0xb8) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff, 0x3ff}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2, 0x0) getuid() ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000004c0)={0x800, 0x1, 0x4, 0x6}) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000540)={r5, 0xff}, &(0x7f0000000580)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x9d1fea00099c28ee}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@gettclass={0x24, 0x2a, 0x200, 0x70bd25, 0x25dfdbfd, {0x0, r8, {0xb, 0xf}, {0xf, 0xe}, {0xe, 0xfff3}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000800)={r7, 0x7fff, 0x3, 0x6, 0x1f, 0x6}, &(0x7f0000000840)=0x14) preadv(r4, &(0x7f0000000a40)=[{&(0x7f0000000880)=""/133, 0x85}, {&(0x7f0000000940)=""/3, 0x3}, {&(0x7f0000000980)=""/150, 0x96}], 0x3, 0x0) setsockopt$inet6_udp_int(r6, 0x11, 0x67, &(0x7f0000000a80), 0x4) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000ac0)={0x1}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) get_thread_area(&(0x7f0000000b00)={0x5, 0x0, 0x1000, 0x0, 0x80000000, 0x9, 0x3, 0x6, 0x9, 0xfffffffeffffffff}) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000b40), &(0x7f0000000b80)=0x8) writev(r4, &(0x7f0000001e40)=[{&(0x7f0000000bc0)="84474147a79986949311a9c75d52d5c061a75dd5865bb00a653db2f775508cbfc4d37a2d65ce0332d925e162d42ceaccb106e231ed322a6100955068cb1b1a2e42294b6f89cf7c9d15c23c5a67a315a2d222d620271a9e8b1c567c9dbd6d63e52f62f50d32098e8171d856a41bf30b217c675b9a4a6f5ac89bb045ba4ce5f137c596b31fe0df2d90acb5cac2e55c6b1b", 0x90}, {&(0x7f0000000c80)="ba2372ed12fef3414890cb73e40575c44985bef142a23023fc9bd11180ce46a375533f49dce0d98f2bc463a6cdaf79", 0x2f}, {&(0x7f0000000cc0)="486ec3abc79df5d620213050b8a7bf5934ac7bf2855ed776b460b6674754ed0d759f9b73e6775f71d8a94dd67928c81d16a66d65a11103a5bb5ede77401e9086d53dab6f6d3669", 0x47}, {&(0x7f0000000d40)="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", 0x1000}, {&(0x7f0000001d40)="2ae4bf3e339848922adcf2dd5a8ae110d8abca25a6f922a415dd01512f00ea980af68de7c86a86867e462481189e27568367d9bd68cb8d03e4aac4e2d60d02bc43b4a0d5022577fe7207ca8cd423908964d4a288565fc5334ff503397172e1955c9f2f836eb7b010eacee33ef0230f2128e51ca50dc2b8bed15c8bb7bbfb404a491611d66ba2e905725c133ea396c07b0136b7fea9fa8b16d7ff9170ee3079621fd13aff6a2ffbe5e5e8d5a08a8697cce67d1b60742e552d092dd48923872641116dfd6a", 0xc4}], 0x5) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000001ec0)=0x7, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000001f00)=0x8001) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001f40)) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000001f80)={0x78b3}) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000001fc0)=0xc0f) 09:10:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000340)=""/222) 09:10:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="44dd88", 0x3) 09:10:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)=""/255) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="73029fdb7c3f", "62707130000800000000000000e400"}}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)) pipe(&(0x7f00000002c0)) r1 = request_key(&(0x7f0000001580)='ceph\x00', &(0x7f00000015c0), &(0x7f0000001600)='/dev/mixer\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r1) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000400)=@known='system.posix_acl_access\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000001440)={@remote}, 0x14) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f00000001c0)={0x4}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) socket$vsock_dgram(0x28, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) chmod(&(0x7f0000001480)='./file0/../file0\x00', 0x8) socket$inet_sctp(0x2, 0x0, 0x84) 09:10:05 executing program 4: 09:10:05 executing program 2: 09:10:05 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:05 executing program 3: 09:10:05 executing program 2: 09:10:06 executing program 4: 09:10:06 executing program 3: 09:10:06 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 208.575024] IPVS: ftp: loaded support on port[0] = 21 [ 209.849397] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.855856] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.863692] device bridge_slave_0 entered promiscuous mode [ 209.936225] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.943072] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.950550] device bridge_slave_1 entered promiscuous mode [ 210.024202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.098962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.326105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.401978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.539197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.546467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.762338] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.770003] team0: Port device team_slave_0 added [ 210.844852] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.852691] team0: Port device team_slave_1 added [ 210.925854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.002680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.078145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.085535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.094324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.168326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.175720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.184600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.990136] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.996751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.003651] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.010097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.018295] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.531924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.895407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.167779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.432113] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.438403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.446306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.725571] 8021q: adding VLAN 0 to HW filter on device team0 09:10:15 executing program 5: 09:10:15 executing program 4: 09:10:15 executing program 2: 09:10:15 executing program 1: 09:10:15 executing program 3: 09:10:15 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:15 executing program 4: 09:10:15 executing program 3: 09:10:15 executing program 2: 09:10:15 executing program 1: 09:10:16 executing program 5: 09:10:16 executing program 4: 09:10:16 executing program 3: 09:10:16 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:16 executing program 2: 09:10:16 executing program 5: 09:10:16 executing program 4: 09:10:16 executing program 1: 09:10:16 executing program 3: 09:10:16 executing program 2: 09:10:16 executing program 5: 09:10:16 executing program 1: 09:10:16 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040), &(0x7f00000002c0)=0xc) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:16 executing program 3: 09:10:16 executing program 4: 09:10:16 executing program 2: 09:10:17 executing program 3: 09:10:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000000600)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x33}, @in6=@remote}}}, 0xf8}}, 0x0) 09:10:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd63012c"], &(0x7f00000002c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000002c0)='GPL\x00', 0x80000001, 0x3bd, &(0x7f0000000400)=""/187, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 09:10:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp6\x00') lseek(r0, 0x0, 0x4) 09:10:17 executing program 4: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0xffffffffffffffff}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 09:10:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000180), 0x10) 09:10:17 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfff, 0x8000, 0x7fff, 0xa3, 0x3}, &(0x7f0000000300)=0x14) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000000180)="97", 0x1}], 0x1}, 0x0) 09:10:17 executing program 1: 09:10:17 executing program 5: 09:10:17 executing program 4: 09:10:17 executing program 3: 09:10:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x8) r1 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000e000)) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7ff, 0x541000) 09:10:18 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r3, 0x4, 0x5742, 0xfffffffffffffffe}, 0x10) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xffffffffffffffa8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 09:10:18 executing program 4: 09:10:18 executing program 3: 09:10:18 executing program 1: 09:10:18 executing program 5: 09:10:18 executing program 2: 09:10:18 executing program 3: 09:10:18 executing program 4: 09:10:18 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:18 executing program 5: 09:10:18 executing program 1: 09:10:18 executing program 5: 09:10:18 executing program 3: 09:10:18 executing program 4: 09:10:18 executing program 1: 09:10:19 executing program 2: 09:10:19 executing program 3: 09:10:19 executing program 1: 09:10:19 executing program 5: 09:10:19 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:19 executing program 4: 09:10:19 executing program 2: 09:10:19 executing program 5: 09:10:19 executing program 2: 09:10:19 executing program 3: 09:10:19 executing program 1: 09:10:19 executing program 4: 09:10:20 executing program 1: 09:10:20 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:20 executing program 5: 09:10:20 executing program 3: 09:10:20 executing program 2: 09:10:20 executing program 5: 09:10:20 executing program 4: 09:10:20 executing program 3: 09:10:20 executing program 1: 09:10:20 executing program 2: 09:10:20 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:20 executing program 1: 09:10:20 executing program 4: 09:10:20 executing program 5: 09:10:20 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x40000000015, 0x5, 0x0) open_by_handle_at(r0, &(0x7f0000000180)={0xa, 0x4, "9de3"}, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x5c, [0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xf0]}}, 0x1c) 09:10:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000000)={'sit0\x00', @ifru_data=&(0x7f00000000c0)="63942234ed49083f3243700479fe0fb24c1c4e1d2389caada5da0d9a128ea0ec"}) [ 222.942115] RDS: rds_bind could not find a transport for fe5c:ff00::300:0:f0:aa, load rds_tcp or rds_rdma? 09:10:21 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000008600)=[{{&(0x7f0000005500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000005a40), 0x0, &(0x7f0000005ac0)=[{0x10, 0x10d, 0x7}], 0x10}}], 0x1, 0x1) 09:10:21 executing program 3: r0 = socket$kcm(0x2, 0x40000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x9, 0x3, 0x300, 0xf0, 0x0, 0x0, 0x0, 0xf0, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, &(0x7f0000000040), {[{{@ipv6={@mcast2, @ipv4={[], [], @multicast1}, [0x0, 0xff0000ff, 0xffffffff, 0xffffff00], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], 'bond_slave_0\x00', 'dummy0\x00', {0xff}, {}, 0x7e, 0x800, 0x2, 0xa}, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x4, 0x80}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x19}, @loopback, [0xff, 0xffffffff, 0xff, 0xffffffff], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'syz_tun\x00', 'veth0_to_team\x00', {0xff}, {0xff}, 0xff, 0x4, 0x5, 0x6874ba89a495b4d0}, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x9, 0xffff, 0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x360) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x400) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = shmget$private(0x0, 0x2000, 0xfffffffffffffffe, &(0x7f0000ffb000/0x2000)=nil) ioctl$KDSETLED(r1, 0x4b32, 0x0) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000080)=""/19) r6 = socket$inet(0x2, 0x3, 0x2) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) getsockname(r7, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r7, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r6, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r3, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r8, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) connect$l2tp(r4, &(0x7f00000006c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x1, 0x1, {0xa, 0x4e24, 0x4, @local, 0xf66}}}, 0x32) accept4$unix(r8, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) ioctl$SCSI_IOCTL_DOORLOCK(r9, 0x5380) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000480)={0x4, 0x0, [{0x8000000b, 0x6, 0x7, 0x80000001, 0x8001, 0x4, 0x800}, {0x8000001b, 0x7, 0x3, 0x3, 0x7, 0x4}, {0x80000001, 0x3, 0x4, 0x100000001, 0x7fffffff, 0x100000000, 0x4}, {0x1, 0x2, 0x5, 0x101, 0x7, 0x6, 0x4}]}) setsockopt$sock_attach_bpf(r0, 0x84, 0x6b, &(0x7f00000000c0), 0x33882c17004bebc5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e23, 0x8, @ipv4={[], [], @multicast1}, 0x67c}}, [0xffffffffffffff5a, 0xde, 0x90a4, 0x7, 0x100000001, 0x7fff, 0xc85a, 0x3, 0x9, 0x6, 0x3f, 0x9, 0x4, 0x7, 0x2]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000640)={r10, 0x9}, &(0x7f0000000680)=0x8) r11 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r11, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r11, 0x7) 09:10:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)="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", 0x0, 0x0) fcntl$notify(r0, 0x402, 0x800000000000000d) 09:10:21 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) r2 = socket$inet6(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:21 executing program 1: [ 223.282089] hrtimer: interrupt took 34988 ns 09:10:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x1f}}, 0x14}}, 0x0) 09:10:21 executing program 2: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003000)=[{0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0xfffffffffffffffd, 0x10000}, 0x8) close(r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 09:10:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0xd) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) [ 223.529395] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:10:21 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$netlink(0x10, 0x3, 0x80000000004) r2 = socket$inet6(0xa, 0x80003, 0x800000000000002) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write(r1, &(0x7f0000002c40)="29000000140005b7ff00f000040860eb0101ff01ffa4f80c3df00fd57f25ffffff0100002a00f3ff09", 0x29) 09:10:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8188aea6, &(0x7f0000000080)) 09:10:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @multicast2}}}, 0x90) 09:10:21 executing program 0: r0 = socket(0xa, 0x802, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f0000005b40)=@sco, 0x80, &(0x7f0000006e80), 0x0, &(0x7f0000006f00)=""/27, 0x230}}], 0x400011e, 0x1a000, &(0x7f0000007040)={0x77359400}) socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 09:10:21 executing program 2: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003000)=[{0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0xfffffffffffffffd, 0x10000}, 0x8) close(r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 223.907176] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 223.985289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 223.998050] ================================================================== [ 224.005446] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 224.011948] CPU: 0 PID: 7953 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #63 [ 224.019135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.028495] Call Trace: [ 224.031106] dump_stack+0x306/0x460 [ 224.034743] ? loaded_vmcs_init+0x343/0x590 [ 224.039089] kmsan_report+0x1a3/0x2d0 [ 224.042910] __msan_warning+0x7c/0xe0 [ 224.046724] loaded_vmcs_init+0x343/0x590 [ 224.050889] __loaded_vmcs_clear+0x2fb/0x3c0 [ 224.055326] generic_exec_single+0x17b/0x500 [ 224.059767] ? vmx_get_msr_feature+0x180/0x180 [ 224.064374] smp_call_function_single+0x290/0x500 [ 224.069233] ? vmx_get_msr_feature+0x180/0x180 [ 224.073841] vmx_free_vcpu+0x582/0x8a0 [ 224.077740] ? vmx_create_vcpu+0x7920/0x7920 [ 224.082162] kvm_arch_destroy_vm+0x727/0xcd0 [ 224.086596] kvm_put_kvm+0x100b/0x1cf0 [ 224.090513] kvm_vcpu_release+0xad/0x100 [ 224.094592] ? kvm_vcpu_mmap+0x80/0x80 [ 224.098485] __fput+0x4e8/0xda0 [ 224.101783] ____fput+0x37/0x40 [ 224.105088] ? fput+0x3e0/0x3e0 [ 224.108366] task_work_run+0x467/0x500 [ 224.112269] prepare_exit_to_usermode+0x364/0x470 [ 224.117122] syscall_return_slowpath+0x112/0x880 [ 224.121885] ? __close_fd+0x465/0x4c0 [ 224.125696] ? __se_sys_close+0x72/0x140 [ 224.129766] do_syscall_64+0xe4/0x100 09:10:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000900)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000340)}, 0x0) 09:10:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10000, 0x8) getpgid(0xffffffffffffffff) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) r2 = accept(r1, &(0x7f0000000780)=@alg, &(0x7f0000000800)=0xfffffd1c) accept$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) 09:10:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x10}]}) [ 224.133584] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 224.138793] RIP: 0033:0x411051 [ 224.141992] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 224.160897] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 224.168606] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000411051 [ 224.175880] RDX: 0000000000000000 RSI: 0000000000730268 RDI: 0000000000000006 [ 224.183151] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 224.190427] R10: 0000000000a3fcb0 R11: 0000000000000293 R12: 0000000000000000 [ 224.197704] R13: 0000000000000001 R14: 0000000000000013 R15: 0000000000000001 [ 224.204985] [ 224.206626] Local variable description: ----error.i@loaded_vmcs_init [ 224.213106] Variable was created at: [ 224.216854] loaded_vmcs_init+0x8a/0x590 [ 224.220917] __loaded_vmcs_clear+0x2fb/0x3c0 [ 224.225314] ================================================================== [ 224.232667] Disabling lock debugging due to kernel taint [ 224.238120] Kernel panic - not syncing: panic_on_warn set ... [ 224.238120] [ 224.245494] CPU: 0 PID: 7953 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #63 [ 224.254064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.263415] Call Trace: [ 224.266019] dump_stack+0x306/0x460 [ 224.269670] panic+0x54c/0xafa [ 224.272905] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 224.278377] kmsan_report+0x2cd/0x2d0 [ 224.282199] __msan_warning+0x7c/0xe0 [ 224.286011] loaded_vmcs_init+0x343/0x590 [ 224.290172] __loaded_vmcs_clear+0x2fb/0x3c0 [ 224.294598] generic_exec_single+0x17b/0x500 [ 224.299015] ? vmx_get_msr_feature+0x180/0x180 [ 224.303610] smp_call_function_single+0x290/0x500 [ 224.308461] ? vmx_get_msr_feature+0x180/0x180 [ 224.313062] vmx_free_vcpu+0x582/0x8a0 [ 224.316957] ? vmx_create_vcpu+0x7920/0x7920 [ 224.321381] kvm_arch_destroy_vm+0x727/0xcd0 [ 224.325803] kvm_put_kvm+0x100b/0x1cf0 [ 224.329718] kvm_vcpu_release+0xad/0x100 [ 224.333782] ? kvm_vcpu_mmap+0x80/0x80 [ 224.337678] __fput+0x4e8/0xda0 [ 224.340976] ____fput+0x37/0x40 [ 224.344254] ? fput+0x3e0/0x3e0 [ 224.347541] task_work_run+0x467/0x500 [ 224.351456] prepare_exit_to_usermode+0x364/0x470 [ 224.356316] syscall_return_slowpath+0x112/0x880 [ 224.361085] ? __close_fd+0x465/0x4c0 [ 224.364902] ? __se_sys_close+0x72/0x140 [ 224.368973] do_syscall_64+0xe4/0x100 [ 224.372782] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 224.377972] RIP: 0033:0x411051 09:10:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x10}]}) [ 224.381186] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 224.400088] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 224.407792] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000411051 [ 224.415058] RDX: 0000000000000000 RSI: 0000000000730268 RDI: 0000000000000006 [ 224.422800] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 224.430083] R10: 0000000000a3fcb0 R11: 0000000000000293 R12: 0000000000000000 [ 224.437375] R13: 0000000000000001 R14: 0000000000000013 R15: 0000000000000001 [ 224.445922] Kernel Offset: disabled [ 224.449550] Rebooting in 86400 seconds..