[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 58.030723] sshd (6051) used greatest stack depth: 53184 bytes left [....] Starting OpenBSD Secure Shell server: sshd[ 58.288771] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.714086] random: sshd: uninitialized urandom read (32 bytes read) [ 63.188970] random: sshd: uninitialized urandom read (32 bytes read) [ 65.452379] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.75' (ECDSA) to the list of known hosts. [ 71.234458] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 01:39:30 fuzzer started [ 75.887967] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 01:39:35 dialing manager at 10.128.0.26:36867 2018/10/08 01:39:35 syscalls: 1 2018/10/08 01:39:35 code coverage: enabled 2018/10/08 01:39:35 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 01:39:35 setuid sandbox: enabled 2018/10/08 01:39:35 namespace sandbox: enabled 2018/10/08 01:39:35 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 01:39:35 fault injection: enabled 2018/10/08 01:39:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 01:39:35 net packed injection: enabled 2018/10/08 01:39:35 net device setup: enabled [ 80.736378] random: crng init done 01:41:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000840), 0xc, &(0x7f0000000340)={&(0x7f0000000080)={0x14, 0x0, 0x7, 0xffffffffffffffff}, 0x14}}, 0x0) [ 199.147922] IPVS: ftp: loaded support on port[0] = 21 [ 201.536850] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.543369] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.552235] device bridge_slave_0 entered promiscuous mode [ 201.718402] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.724919] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.733577] device bridge_slave_1 entered promiscuous mode [ 201.876375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.021289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.456402] bond0: Enslaving bond_slave_0 as an active interface with an up link 01:41:39 executing program 1: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) [ 202.611260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.914105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.921401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.162474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.169681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.274468] IPVS: ftp: loaded support on port[0] = 21 [ 203.824652] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.832934] team0: Port device team_slave_0 added [ 204.040242] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.048550] team0: Port device team_slave_1 added [ 204.227899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.234945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.244041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.431929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 204.439146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.448221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.658495] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.666074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.675313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.868826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.876429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.885647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.628231] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.634747] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.643331] device bridge_slave_0 entered promiscuous mode [ 206.900825] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.907542] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.915968] device bridge_slave_1 entered promiscuous mode [ 207.127465] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.361021] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.367588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.374521] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.381124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.390099] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.403924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.976951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.050319] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.254071] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.481791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.489093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.782957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.790230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:41:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[0x0, 0x30030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 209.521529] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.529679] team0: Port device team_slave_0 added [ 209.821343] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.829429] team0: Port device team_slave_1 added [ 210.024585] IPVS: ftp: loaded support on port[0] = 21 [ 210.145452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.152634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.161728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.474346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.481627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.490635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.773894] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.781618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.790909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.025132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.032921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.042283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.284894] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.291448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.298449] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.304901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.313912] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.487052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.052692] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.059780] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.068499] device bridge_slave_0 entered promiscuous mode [ 215.381751] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.388361] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.397038] device bridge_slave_1 entered promiscuous mode [ 215.684736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.942921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.710273] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.979610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.292561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.299772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.514121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.521317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:41:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3fe, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x600}}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 218.498732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.506951] team0: Port device team_slave_0 added [ 218.882911] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.891110] team0: Port device team_slave_1 added [ 218.953854] IPVS: ftp: loaded support on port[0] = 21 [ 219.229844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.294967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.302108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.311176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.574442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.581699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.590737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.928872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.936435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.945699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.281329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.289159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.298372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.650964] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.950084] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.956443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.964605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.347789] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.387912] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.394405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.401468] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.408022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.417151] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.236621] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.243229] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.251776] device bridge_slave_0 entered promiscuous mode [ 225.368031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.618988] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.625461] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.634074] device bridge_slave_1 entered promiscuous mode [ 225.975017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.305537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.474754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.839537] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:42:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) lseek(r0, 0x0, 0x0) [ 228.230660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.238154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.555490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.710201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.717464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.703890] IPVS: ftp: loaded support on port[0] = 21 [ 229.810535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.818774] team0: Port device team_slave_0 added [ 230.152253] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.235309] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.243534] team0: Port device team_slave_1 added [ 230.788648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.795716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.804950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.288778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.295852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.304857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.713648] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.721454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.730706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.870605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.877061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.885042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.137245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.144854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.153871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 01:42:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x1}}, 0xc000) dup3(r2, r1, 0x0) [ 232.801894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:42:10 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8982, &(0x7f0000000000)={r2}) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x80000) [ 233.548260] 8021q: adding VLAN 0 to HW filter on device team0 01:42:10 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000001a0025e0046bbc04fef7001c020b49ff0000000080df08000800030001000000", 0x24) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000040)="29f575b88380a1d6b41b7b16511854cb296b730d2b9069c883264c2a1d61824d1cb93deded4c337e89e6f98afba5f9d0b048da7b", 0x34) 01:42:11 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x3}) dup3(r1, r1, 0x80000) timer_create(0x3, &(0x7f0000000100)={0x0, 0x0, 0x8000000000, @thr={&(0x7f00000000c0), &(0x7f00000001c0)="edb8"}}, &(0x7f00000011c0)) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000000c0)=0x3) write(r0, &(0x7f00000000c0), 0x21c) 01:42:11 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create(0x100004) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xe1a, 0x4000) ioctl$TIOCSBRK(r0, 0x40044591) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) 01:42:12 executing program 0: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8410000000000084) bind$inet6(r0, &(0x7f0000000a80)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x5) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0x3, @mcast2, 0x100000000000000}}, 0x1, 0x7, 0x0, 0x0, 0x80}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x300}, &(0x7f0000000180)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) select(0x40, &(0x7f00000001c0)={0x5, 0x7, 0x4, 0x6, 0x4, 0x2, 0x200, 0x7}, &(0x7f0000000200)={0x44c, 0xfffffffffffffc01, 0x3, 0x9, 0x7, 0x2, 0x4, 0x5}, &(0x7f0000000240)={0x4, 0x8001, 0x9, 0x0, 0x18, 0x10001, 0x3, 0x400}, &(0x7f0000000280)={0x0, 0x7530}) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000001000000, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x6100]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 01:42:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup3(r0, r0, 0x200080000) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0xffffffffa0008000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000000000002c33fb0e54b28df20032a60701ffff000000000000000000000021"], 0x14}}, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000240)=""/154) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 01:42:13 executing program 0: r0 = socket(0x4000010, 0x1, 0x9) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) write(r0, &(0x7f0000001500)="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", 0x5f2) [ 237.042914] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.049469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.056441] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.063022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.071904] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.264291] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.270898] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.279448] device bridge_slave_0 entered promiscuous mode [ 237.686553] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.693145] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.701844] device bridge_slave_1 entered promiscuous mode [ 238.007113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.086565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.388537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.476585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.784535] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.149106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.156335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.520823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.529807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.128112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.496400] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 241.504706] team0: Port device team_slave_0 added [ 241.871521] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 241.879960] team0: Port device team_slave_1 added [ 242.181698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 242.188932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.197734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.257866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 01:42:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x4) [ 242.486151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 242.493342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.502166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.909819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 242.917586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.926445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.104037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.112105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.121115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.200690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.207183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.214900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.919906] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.510340] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.516906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.523836] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.530458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.539768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.546340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.687561] 8021q: adding VLAN 0 to HW filter on device bond0 01:42:26 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f00000000c0)) r1 = eventfd(0x10000) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x0, r1}) r2 = eventfd(0x3) times(&(0x7f0000000100)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r2}) [ 249.562903] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.102581] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.109184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.117065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.655690] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.715959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.263170] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.817183] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.823612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.831700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:42:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) [ 254.324632] 8021q: adding VLAN 0 to HW filter on device team0 01:42:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 01:42:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x80000001, 0x183002) connect$pptp(r1, &(0x7f00000001c0)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x1e) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0xfffffeca) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b03000000000000656d316e6f646576656d3100576f42d32e7fe3e500000000000008000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc6370751e0095bd65746367726f75702463fb0a6f75701500000000000000000000000000"], 0x90) 01:42:33 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl(r0, 0x9, &(0x7f0000000040)="7a5606fddb3cb38680b531064f1e0c856570b7c8cc225034765faf5467ae00e0bef544da5b91a8379a81f0ae6093825b6d23002815ca010af6bdc0838ddb4f01e91b8a00470deff7b36bf7f8d2c1ddcdfd9c0af762da4bc72eb98ad9570b26") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x1000, 0x7, [0x9, 0x0, 0x1f, 0x80000000, 0xe2, 0x1, 0x40]}, &(0x7f0000000140)=0x16) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x1ff}, 0x8) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000001c0)={0x83b, 0x1, 0x5, 0x10000, 0xf759}) getpeername$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000300)=0xd9b, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={r2, 0x80, 0xab7, 0x101, 0xfff, 0x8}, 0x14) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000440)) utime(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x3d, 0x1ac514bf0000}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000500)={r2, @in={{0x2, 0x4e23, @multicast1}}, 0x9, 0x8}, &(0x7f00000005c0)=0x90) personality(0x400000) getsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000600), &(0x7f0000000640)=0x4) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000680)=0x30000001d) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000006c0)=0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000700)=0x0) kcmp(r4, r5, 0x6, r0, r1) utime(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x3, 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000800)=@filter={'filter\x00', 0xe, 0x4, 0x448, 0x128, 0x128, 0x0, 0x0, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000007c0), {[{{@uncond, 0x0, 0xc8, 0x128}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@remote, [0xffffffff, 0x0, 0xff, 0xffffffff], 0x4e24, 0x4e24, 0x4e23, 0x4e22, 0x7, 0x7, 0x25, 0x1e2, 0x4}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x8, 0x2, 0x1, [0xffffffffffff8000, 0x7fff, 0x4, 0x2, 0x80, 0x9, 0x4, 0x6, 0x2, 0x1, 0x7, 0x1f, 0x2, 0x7fff, 0x7, 0x8001], 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e80)={&(0x7f0000000cc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcc, 0xe4, 0x80, {"81f3f000cf85984e131453ed4b46449bef2f35b7b661214940d8b6c97e3f85909a41e576c04dac094a558d915f2ee7f60a54ec10e66daf2014727f3aae59306a3157ed70f83c4c2126c9c33ffcf01851937253baf734ae8281b263addfcb4384fd0465278a67b129319d87af814b14d30b2084311144368621ab5c2ee734709a81f0ae6a78da5be6e86c7124478e55f85a48ba8e5b9f2dbc0a26c4fc606c4307720bd4dc16cdef1837973641dece7b163e9bf71eeb82cfcc613fcaa49441c9c46ae4b92d1b2c1c6b4204372b"}}, {0x0, "04f92018bb925a59629658f554c71562f29280a543c4701add822f0e6e5e09cd28a161fbbc2e5c721fd03565c7fa56d1c7e52305ede03f1e4712578ca6f812b5c6e027dc809c988e6c5336e8f8cb"}}, &(0x7f0000000e00)=""/128, 0x134, 0x80, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000ec0)={r3, 0x8, 0x8, [0x5, 0x6, 0x2, 0x80000001, 0x7, 0x7, 0x3, 0x5]}, &(0x7f0000000f00)=0x18) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0xf07f, &(0x7f0000000f40)=""/254) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000001040), &(0x7f0000001080)=0x4) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000010c0)={0x2, 0x8, 0x4}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x64) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000001100)='tls\x00', 0x4) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000001140)) 01:42:33 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f00000000c0)) r1 = eventfd(0x10000) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x0, r1}) r2 = eventfd(0x3) times(&(0x7f0000000100)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r2}) 01:42:33 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd401000100ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0x0, 0x10800a}) 01:42:33 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f00000000c0)) r1 = eventfd(0x10000) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x0, r1}) r2 = eventfd(0x3) times(&(0x7f0000000100)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r2}) 01:42:33 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:33 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:42:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x6) r1 = epoll_create(0x7b4e8d72) r2 = socket$rds(0x15, 0x5, 0x0) getsockopt(r2, 0xffffffff, 0x0, &(0x7f00000000c0)=""/74, &(0x7f0000000140)=0x4a) r3 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) epoll_create(0x400000200) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c7f000)) epoll_create(0x0) 01:42:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) getpid() fcntl$getownex(r0, 0x10, &(0x7f00000004c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='maps\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) 01:42:34 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r1, &(0x7f0000465f8e)=""/114, 0x47) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40042409, &(0x7f0000000000)) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000400)=""/203) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 01:42:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000c80)="11", 0x1}], 0x1, &(0x7f00000002c0)}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) [ 257.796584] IPVS: ftp: loaded support on port[0] = 21 [ 259.184107] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.190633] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.198910] device bridge_slave_0 entered promiscuous mode [ 259.276036] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.282569] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.290861] device bridge_slave_1 entered promiscuous mode [ 259.366480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 259.440621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 259.669115] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 259.748070] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 259.895097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 259.902134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.136275] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.143935] team0: Port device team_slave_0 added [ 260.219593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.227509] team0: Port device team_slave_1 added [ 260.303373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.383059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.458874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 260.466134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.475301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.551160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 260.558569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.567452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.428405] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.434823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.441805] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.448348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.457222] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 261.837069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.550997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.839147] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.128051] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.134314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.142403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.423399] 8021q: adding VLAN 0 to HW filter on device team0 01:42:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x100000000000031, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x14, &(0x7f0000000100)=""/236) 01:42:44 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00', 0x22}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) dup3(r0, r1, 0x0) 01:42:44 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 01:42:44 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./control\x00', 0x4000000000042) inotify_add_watch(r0, &(0x7f0000000040)='./control\x00', 0x6000000) 01:42:44 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000001280)=0x1, 0x4) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 01:42:44 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000200)=""/78) [ 267.669193] input: syz0 as /devices/virtual/input/input5 01:42:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000c80)="11356832256b62bad05652fd4534b6bf", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x536}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) 01:42:45 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 01:42:45 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='lo.\x00', 0x0, 0x0, &(0x7f0000000100)={0x3, 0x0, 0x10000, 0x0, 0x0, 0x6}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0xc8) setns(0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 01:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000001c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000001240)=""/242, 0xf2}], 0x1, &(0x7f0000001580)=""/4096, 0x1000, 0x4}, 0xfffffffffffffffc}, {{&(0x7f0000002d40)=@l2, 0x80, &(0x7f0000002f00), 0x0, &(0x7f0000002f40)=""/212, 0xd4}}], 0x2, 0x0, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 01:42:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xfd79, 0x12, 0x207, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 01:42:45 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) 01:42:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, &(0x7f0000000100)=0xf000000, 0x480000001) 01:42:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$sndseq(r1, &(0x7f0000000080), 0x54c) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x22d}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x40000000000022d, 0x0, &(0x7f0000001380)={0x77359400}) 01:42:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0xc, 0x0, &(0x7f0000000380)=[@dead_binder_done={0x40086310, 0x100000000000000}], 0xffffffffffffffa5, 0x0, &(0x7f0000000500)}) 01:42:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) close(r1) 01:42:45 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f080319", 0x7}], 0x1) [ 268.809928] binder: 7880:7884 BC_DEAD_BINDER_DONE 0100000000000000 not found 01:42:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xfd79, 0x12, 0x207, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 01:42:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file1\x00', 0x8, 0x0) 01:42:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0x0) 01:42:46 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000002c0)=""/235) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0xffffffffffffffbe) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 01:42:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x14, &(0x7f0000000100)=""/236) 01:42:46 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000000002, 0x0) writev(r0, &(0x7f0000000080), 0x0) 01:42:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x14, 0x1d, 0x7ffff, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) [ 269.569344] Not allocated shadow for addr ffff88018869c1e0 (page ffffea0009327a80) [ 269.577117] Attempted to access 8 bytes [ 269.581142] ------------[ cut here ]------------ [ 269.585923] kernel BUG at mm/kmsan/kmsan.c:1075! [ 269.590721] invalid opcode: 0000 [#1] SMP [ 269.594896] CPU: 1 PID: 6330 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #63 [ 269.602100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.611493] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 269.617144] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 11 bc 57 8b 31 c0 4c [ 269.635514] Not allocated shadow for addr ffff88018869c1f0 (page ffffea0009327a80) [ 269.636085] RSP: 0018:ffff88015e2df780 EFLAGS: 00010046 [ 269.643816] Attempted to access 8 bytes [ 269.643841] RAX: 000000000000001b RBX: 0000000000000000 RCX: 82ad5d49d92c2b00 [ 269.649223] ------------[ cut here ]------------ [ 269.653168] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 269.660448] kernel BUG at mm/kmsan/kmsan.c:1075! [ 269.665202] RBP: ffff88015e2df7b0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 269.684471] R10: 0000000000000000 R11: ffffffff86258280 R12: 0000000000000001 [ 269.691749] R13: ffff88018869c1e0 R14: 0000000000000001 R15: 0000000000000008 [ 269.699031] FS: 0000000002645940(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 269.707265] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.713188] CR2: 0000000000706158 CR3: 000000015e2a0000 CR4: 00000000001406e0 [ 269.720465] Call Trace: [ 269.723084] kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 269.728302] kmsan_unpoison_shadow+0x72/0xd0 [ 269.732735] vunmap_page_range+0x828/0xc20 [ 269.737029] remove_vm_area+0x39b/0x450 [ 269.741032] __vunmap+0x34c/0x5d0 [ 269.744513] vfree+0x79/0x170 [ 269.747639] do_arpt_get_ctl+0xddb/0xe80 [ 269.751752] ? compat_do_arpt_set_ctl+0x2e90/0x2e90 [ 269.756787] nf_getsockopt+0x481/0x4e0 [ 269.760721] ip_getsockopt+0x2b1/0x470 [ 269.764643] ? compat_ip_setsockopt+0x380/0x380 [ 269.769350] tcp_getsockopt+0x1c6/0x1f0 [ 269.773351] ? tcp_get_timestamping_opt_stats+0x1810/0x1810 [ 269.779080] sock_common_getsockopt+0x13f/0x180 [ 269.783784] ? sock_recv_errqueue+0x990/0x990 [ 269.788298] __sys_getsockopt+0x48c/0x550 [ 269.792481] __se_sys_getsockopt+0xe1/0x100 [ 269.796834] __x64_sys_getsockopt+0x62/0x80 [ 269.801191] do_syscall_64+0xbe/0x100 [ 269.805022] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 269.810227] RIP: 0033:0x45a0aa [ 269.813440] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 88 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 88 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 269.832358] RSP: 002b:0000000000a3f648 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 269.840091] RAX: ffffffffffffffda RBX: 0000000000a3f750 RCX: 000000000045a0aa [ 269.847384] RDX: 0000000000000061 RSI: 0000000000000000 RDI: 0000000000000003 [ 269.854676] RBP: 0000000000000003 R08: 0000000000a3f65c R09: 000000000000000a [ 269.861957] R10: 0000000000a3f750 R11: 0000000000000212 R12: 0000000000000000 [ 269.869250] R13: 0000000000041b96 R14: 0000000000000009 R15: 0000000000000002 [ 269.876550] Modules linked in: [ 269.879781] ---[ end trace 238526d2c99477ef ]--- [ 269.879796] invalid opcode: 0000 [#2] SMP [ 269.879823] CPU: 0 PID: 7908 Comm: syz-executor4 Tainted: G D 4.19.0-rc4+ #63 [ 269.884582] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 269.888725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.897326] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 11 bc 57 8b 31 c0 4c [ 269.902959] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 269.912307] RSP: 0018:ffff88015e2df780 EFLAGS: 00010046 [ 269.931240] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 11 bc 57 8b 31 c0 4c [ 269.942228] RSP: 0018:ffff88018a99f7a0 EFLAGS: 00010046 [ 269.961345] RAX: 000000000000001b RBX: 0000000000000000 RCX: 82ad5d49d92c2b00 [ 269.966731] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 269.974013] RAX: 000000000000001b RBX: 0000000000000000 RCX: e35ed97a46307e00 [ 269.981280] RBP: ffff88015e2df7b0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 269.988545] RDX: 0000000000000000 RSI: 00000000000098db RDI: 00000000000098dc [ 269.995814] R10: 0000000000000000 R11: ffffffff86258280 R12: 0000000000000001 [ 270.003081] RBP: ffff88018a99f7d0 R08: 0000000000000000 R09: ffff88021fc38f50 [ 270.010363] R13: ffff88018869c1e0 R14: 0000000000000001 R15: 0000000000000008 [ 270.017653] R10: 0000000000000000 R11: ffffffff86258280 R12: 0000000000000001 [ 270.024950] FS: 0000000002645940(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 270.032219] R13: ffff88018869c1f0 R14: 0000000000000001 R15: 0000000000000008 [ 270.040445] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.047715] FS: 00007fecce5b0700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 270.053589] CR2: 0000000000706158 CR3: 000000015e2a0000 CR4: 00000000001406e0 [ 270.062109] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.069375] Kernel panic - not syncing: Fatal exception [ 270.075260] CR2: 0000000000728000 CR3: 00000001a6036000 CR4: 00000000001406f0 [ 270.087874] Call Trace: [ 270.090489] kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 270.095706] kmsan_unpoison_shadow+0x72/0xd0 [ 270.100143] vunmap_page_range+0x828/0xc20 [ 270.104487] remove_vm_area+0x39b/0x450 [ 270.108492] __vunmap+0x34c/0x5d0 [ 270.111976] vunmap+0x69/0xb0 [ 270.115102] relay_destroy_buf+0xac/0x430 [ 270.119298] relay_close+0x470/0xa20 [ 270.123045] __blk_trace_remove+0x256/0x320 [ 270.127393] blk_trace_remove+0x5d/0xb0 [ 270.131408] sg_ioctl+0x846/0x58b0 [ 270.134987] ? do_vfs_ioctl+0x18a/0x2810 [ 270.139066] ? __se_sys_ioctl+0x1da/0x270 [ 270.143254] ? sg_poll+0x870/0x870 [ 270.146813] do_vfs_ioctl+0xcf3/0x2810 [ 270.150740] ? security_file_ioctl+0x92/0x200 [ 270.155266] __se_sys_ioctl+0x1da/0x270 [ 270.159284] __x64_sys_ioctl+0x4a/0x70 [ 270.163224] do_syscall_64+0xbe/0x100 [ 270.167049] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 270.172261] RIP: 0033:0x457579 [ 270.175470] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.194383] RSP: 002b:00007fecce5afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.202108] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 270.209397] RDX: 0000000000000000 RSI: 0000000000001276 RDI: 0000000000000005 [ 270.216690] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 270.223970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecce5b06d4 [ 270.231248] R13: 00000000004bea1e R14: 00000000004ce728 R15: 00000000ffffffff [ 270.238543] Modules linked in: [ 270.241758] ---[ end trace 238526d2c99477f0 ]--- [ 270.246529] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 270.252166] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 11 bc 57 8b 31 c0 4c [ 270.271080] RSP: 0018:ffff88015e2df780 EFLAGS: 00010046 [ 270.276459] RAX: 000000000000001b RBX: 0000000000000000 RCX: 82ad5d49d92c2b00 [ 270.283740] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 270.291019] RBP: ffff88015e2df7b0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 270.298300] R10: 0000000000000000 R11: ffffffff86258280 R12: 0000000000000001 [ 270.305579] R13: ffff88018869c1e0 R14: 0000000000000001 R15: 0000000000000008 [ 270.312864] FS: 00007fecce5b0700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 270.321101] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.326994] CR2: 0000000000728000 CR3: 00000001a6036000 CR4: 00000000001406f0 [ 271.676438] Shutting down cpus with NMI [ 271.680519] ------------[ cut here ]------------ [ 271.685293] kernel BUG at mm/kmsan/kmsan_entry.c:81! [ 271.690423] invalid opcode: 0000 [#3] SMP [ 271.694589] CPU: 0 PID: 7908 Comm: syz-executor4 Tainted: G D 4.19.0-rc4+ #63 [ 271.697419] Kernel Offset: disabled [[ 22771.1.70706688191]9 ]R eRebobootoitning g inin 8686440000 sseecoconndds.s... Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.720176] RIP: 0010:kmsan_nmi_enter+0x42/0x70 [ 271.724871] Code: 00 74 27 65 8b 04 25 40 8f 03 00 ff c0 83 f8 08 7d 28 65 89 04 25 40 8f 03 00 65 c6 04 25 d5 6c 0b 00 ff c3 0f 0b 66 90 eb fe <0f> 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 2e [ 271.743797] RSP: 0018:fffffe000000eea8 EFLAGS: 00010046 [ 271.749182] RAX: 0000000080000000 RBX: 0000000000000001 RCX: 00000000c0000101 [ 271.756459] RDX: 00000000ffff8802 RSI: ffffffff8ac011a8 RDI: 0000000000040000 [ 271.763738] RBP: fffffe000000eef9 R08: 0000000000000000 R09: 0000000000000000 [ 271.771015] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 271.778288] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 271.785569] FS: 00007fecce5b0700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 271.793808] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.799701] CR2: 0000000000728000 CR3: 00000001a6036000 CR4: 00000000001406f0 [ 271.806979] Call Trace: [ 271.809570] [ 271.811738] ? end_repeat_nmi+0x19/0x58 [ 271.815745] ? end_repeat_nmi+0x7/0x58 [ 271.819678] ? panic_smp_self_stop+0xe/0xd0 [ 271.824030] ? panic_smp_self_stop+0x10/0xd0 [ 271.828458] ? panic_smp_self_stop+0x10/0xd0 [ 271.832890] ? panic_smp_self_stop+0x10/0xd0 [ 271.837300] [ 271.839556] ? panic+0x324/0xafa [ 271.842952] ? ip_tun_from_nlattr+0x6a48/0x6cc0 [ 271.847681] ? __show_regs+0xf8d/0x1310 [ 271.851701] ? oops_end+0x2cc/0x2d0 [ 271.855353] ? die+0x124/0x140 [ 271.858566] ? do_trap+0x686/0x710 [ 271.862149] ? do_error_trap+0x63c/0x6e0 [ 271.866246] ? kmsan_get_shadow_address+0x2d6/0x3d0 [ 271.871282] ? kmsan_get_shadow_address+0x2d6/0x3d0 [ 271.876329] ? do_invalid_op+0x98/0xb0 [ 271.880234] ? invalid_op+0x14/0x20 [ 271.883893] ? write_ext_msg+0x890/0x890 [ 271.887971] ? kmsan_get_shadow_address+0x2d6/0x3d0 [ 271.893010] ? kmsan_internal_unpoison_shadow+0x5c/0xe0 [ 271.898403] ? kmsan_unpoison_shadow+0x72/0xd0 [ 271.903011] ? vunmap_page_range+0x828/0xc20 [ 271.907478] ? remove_vm_area+0x39b/0x450 [ 271.911670] ? __vunmap+0x34c/0x5d0 [ 271.915355] ? vunmap+0x69/0xb0 [ 271.918650] ? relay_destroy_buf+0xac/0x430 [ 271.923025] ? relay_close+0x470/0xa20 [ 271.926940] ? __blk_trace_remove+0x256/0x320 [ 271.931463] ? blk_trace_remove+0x5d/0xb0 [ 271.935645] ? sg_ioctl+0x846/0x58b0 [ 271.939418] ? do_vfs_ioctl+0x18a/0x2810 [ 271.943498] ? __se_sys_ioctl+0x1da/0x270 [ 271.948180] ? sg_poll+0x870/0x870 [ 271.951743] ? do_vfs_ioctl+0xcf3/0x2810 [ 271.955836] ? security_file_ioctl+0x92/0x200 [ 271.960356] ? __se_sys_ioctl+0x1da/0x270 [ 271.964529] ? __x64_sys_ioctl+0x4a/0x70 [ 271.968602] ? do_syscall_64+0xbe/0x100 [ 271.972594] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.977976] Modules linked in: [ 271.981189] ---[ end trace 238526d2c99477f1 ]--- [ 271.985960] RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 [ 271.991601] Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 11 bc 57 8b 31 c0 4c [ 272.010568] RSP: 0018:ffff88015e2df780 EFLAGS: 00010046 [ 272.015940] RAX: 000000000000001b RBX: 0000000000000000 RCX: 82ad5d49d92c2b00 [ 272.023214] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 272.030489] RBP: ffff88015e2df7b0 R08: 0000000000000000 R09: ffff88021fd38f50 [ 272.037767] R10: 0000000000000000 R11: ffffffff86258280 R12: 0000000000000001 [ 272.045045] R13: ffff88018869c1e0 R14: 0000000000000001 R15: 0000000000000008 [ 272.052327] FS: 00007fecce5b0700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 272.060794] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 272.066697] CR2: 0000000000728000 CR3: 00000001a6036000 CR4: 00000000001406f0