[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.437550] audit: type=1800 audit(1541985811.489:25): pid=6392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.456775] audit: type=1800 audit(1541985811.499:26): pid=6392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.476362] audit: type=1800 audit(1541985811.519:27): pid=6392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2018/11/12 01:23:43 fuzzer started 2018/11/12 01:23:48 dialing manager at 10.128.0.26:42475 2018/11/12 01:23:48 syscalls: 1 2018/11/12 01:23:48 code coverage: enabled 2018/11/12 01:23:48 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/12 01:23:48 setuid sandbox: enabled 2018/11/12 01:23:48 namespace sandbox: enabled 2018/11/12 01:23:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/12 01:23:48 fault injection: enabled 2018/11/12 01:23:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/12 01:23:48 net packed injection: enabled 2018/11/12 01:23:48 net device setup: enabled 01:26:09 executing program 0: syzkaller login: [ 215.847910] IPVS: ftp: loaded support on port[0] = 21 [ 217.730316] ip (6586) used greatest stack depth: 53696 bytes left [ 217.977224] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.983872] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.992468] device bridge_slave_0 entered promiscuous mode [ 218.118597] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.125166] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.133672] device bridge_slave_1 entered promiscuous mode [ 218.258543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.383333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.525366] ip (6598) used greatest stack depth: 53664 bytes left [ 218.660960] ip (6600) used greatest stack depth: 53656 bytes left [ 218.783307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.910648] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:26:13 executing program 1: [ 219.826539] IPVS: ftp: loaded support on port[0] = 21 [ 219.935355] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.943433] team0: Port device team_slave_0 added [ 220.156206] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.164351] team0: Port device team_slave_1 added [ 220.342990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.353123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.362076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.490735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.498015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.506899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.690315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.698104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.707247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.838536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.846236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.855287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.092974] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.099464] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.107960] device bridge_slave_0 entered promiscuous mode [ 223.302928] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.309408] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.318013] device bridge_slave_1 entered promiscuous mode [ 223.365085] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.371569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.378620] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.385153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.394092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.589065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.871224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.172031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:26:18 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) [ 224.628140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.876678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.151582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.159781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.207348] IPVS: ftp: loaded support on port[0] = 21 [ 225.350049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.357370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.072202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.080142] team0: Port device team_slave_0 added [ 226.358554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.366614] team0: Port device team_slave_1 added [ 226.617215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.624367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.633095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.925303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.932613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.941228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.133687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.141273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.150459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.214009] ip (6767) used greatest stack depth: 53600 bytes left [ 227.379969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.389157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.398084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.167134] ip (6814) used greatest stack depth: 53552 bytes left [ 229.593539] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.600009] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.608489] device bridge_slave_0 entered promiscuous mode [ 229.812948] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.819512] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.828164] device bridge_slave_1 entered promiscuous mode [ 230.134613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.396708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.509174] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.515720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.522736] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.529196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.537894] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.169707] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.372035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.430516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.601117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.608328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.785479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.792654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:26:26 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="d8657620d916d9d8d160ed90d6c6d50e6c1499636df5fd47670bc97ad57f139e433fd6739c2dddf7a598a7076e56cbbfa9b7fcccf4d3f65f287a44bea9284a4789c1aca93dfad6618499ec94c44114f9d3ad7ceb085e76b4a954cae9de23c61cce9b500f91a7b91f2692771ba0646ebdc926a888ed215cf0c0366b9ff7a384c9a4a38d72c8537d002a4454e26207dc90bdbd4826f430b561776688f31692fd79b1ceb83a89f62d7107eb1c5b0ad707d48c474d96ee9218bb07a09a88f86dbcbc2c54685b20dbb8e2d499500890a6d3c0d6d24368478669844e28d5f88127b6ee6a4e84dc2b010201e68b729e6277c4810fa33ca6a6e4cadca22b45a03ea9dc408bed30fe7fded584517310a76fa60a25cba4bbd5090512fb50465a74f18d60ebc18feab9bafe90ec40cef998e20fa3485c31da434169aa2e7eebfa34b7c9780c1e4e93adc54be9bee8d1e90532a9633495182c7ce779df360d12756c10efe9a0f83b01612d8d09f5aa4e7bb6b8e342bd9200683d726d59d47b36a8bfe67809d26d38875b969a1e4023516c5b5798af2f767da070a48dd655d52df66439337f2a169d5a0bde163630593232d1f6ad1cb9fd9c686d9fc0d1e9d1a03264c598386fc44df814cba7d33c0aad9de6", 0x0) ftruncate(r2, 0x40001) sendfile(r1, r2, &(0x7f0000001000), 0x4) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/48, 0x30, 0x0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/123, 0x5e}], 0x344, &(0x7f0000000680)=""/108, 0x6c}}, {{0x0, 0x0, &(0x7f00000007c0), 0x1}}], 0x6277f28, 0xd2740a8a12457442, 0x0) recvfrom(r0, &(0x7f0000000040)=""/93, 0xffffffffffffff84, 0x0, 0x0, 0xfffffffffffffdb8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) [ 232.803815] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.811719] team0: Port device team_slave_0 added [ 233.036898] IPVS: ftp: loaded support on port[0] = 21 [ 233.136844] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.144950] team0: Port device team_slave_1 added [ 233.485883] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 233.493210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.502063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.831910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 233.839046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.847786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.226267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.234538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.243550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.611718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.619448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.628600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.691492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.901902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.204906] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.211303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.219332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.856639] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.863303] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.871638] device bridge_slave_0 entered promiscuous mode [ 238.237026] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.243659] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.252515] device bridge_slave_1 entered promiscuous mode [ 238.347845] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.354387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.361270] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.367883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.376447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.488554] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.502273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.572339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.823051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.750346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.066499] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.407383] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.415431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.739751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.747013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.720373] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 241.728689] team0: Port device team_slave_0 added [ 242.021632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 242.029765] team0: Port device team_slave_1 added [ 242.353010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 242.360112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.369008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 01:26:36 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="d8657620d916d9d8d160ed90d6c6d50e6c1499636df5fd47670bc97ad57f139e433fd6739c2dddf7a598a7076e56cbbfa9b7fcccf4d3f65f287a44bea9284a4789c1aca93dfad6618499ec94c44114f9d3ad7ceb085e76b4a954cae9de23c61cce9b500f91a7b91f2692771ba0646ebdc926a888ed215cf0c0366b9ff7a384c9a4a38d72c8537d002a4454e26207dc90bdbd4826f430b561776688f31692fd79b1ceb83a89f62d7107eb1c5b0ad707d48c474d96ee9218bb07a09a88f86dbcbc2c54685b20dbb8e2d499500890a6d3c0d6d24368478669844e28d5f88127b6ee6a4e84dc2b010201e68b729e6277c4810fa33ca6a6e4cadca22b45a03ea9dc408bed30fe7fded584517310a76fa60a25cba4bbd5090512fb50465a74f18d60ebc18feab9bafe90ec40cef998e20fa3485c31da434169aa2e7eebfa34b7c9780c1e4e93adc54be9bee8d1e90532a9633495182c7ce779df360d12756c10efe9a0f83b01612d8d09f5aa4e7bb6b8e342bd9200683d726d59d47b36a8bfe67809d26d38875b969a1e4023516c5b5798af2f767da070a48dd655d52df66439337f2a169d5a0bde163630593232d1f6ad1cb9fd9c686d9fc0d1e9d1a03264c598386fc44df814cba7d33c0aad9de6", 0x0) ftruncate(r2, 0x40001) sendfile(r1, r2, &(0x7f0000001000), 0x4) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/123, 0x5e}], 0x344, &(0x7f0000000680)=""/108, 0x6c}}, {{0x0, 0x0, &(0x7f00000007c0), 0x1}}], 0x6277f28, 0xd2740a8a12457442, 0x0) recvfrom(r0, &(0x7f0000000040)=""/93, 0xffffffffffffff84, 0x0, 0x0, 0xfffffffffffffdb8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) [ 242.685961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 242.693187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.702040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.042437] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.050015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.058911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.378082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.385792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.394834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.655152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.938039] IPVS: ftp: loaded support on port[0] = 21 [ 245.147199] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.219745] ip (7250) used greatest stack depth: 53496 bytes left [ 246.447415] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.454018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.461948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:26:40 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x2f) r1 = dup(r0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) write$FUSE_STATFS(r1, &(0x7f0000001c40)={0x60}, 0x60) 01:26:40 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@broute={'broute\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000000), &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x2a4) [ 247.032732] kernel msg: ebtables bug: please report to author: Wrong len argument 01:26:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000280)={'%route\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000140), 0x0, [{}]}, 0x88) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x10001, 0x5d43, 0x1, 0x80000000, 0xffffffffffffff01, 0x7fff, 0x7fff, 0x200, 0x35e887d, 0x7fff, 0x4, 0x7ff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000180)=0x1d, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000340)={0x490, 0x0, 0x5, [{{0x2, 0x0, 0x7f, 0x8, 0x0, 0x7f, {0x0, 0x0, 0x9, 0xe02a, 0x0, 0x2, 0x81, 0x70a, 0x100, 0x0, 0x6, r3, r4, 0x0, 0x1}}, {0x5, 0x3f, 0x9, 0xffffffffffffffff, 'cpu.stat\x00'}}, {{0x3, 0x1, 0x5, 0x55480496, 0xffffffff, 0x8, {0x1, 0x53cd, 0xca1, 0x7, 0x7fff, 0x3800000000, 0xffffffff80000001, 0x8, 0x5, 0x98b, 0x1, r3, r4, 0x0, 0xfffffffffffff800}}, {0x3, 0x7f, 0x9, 0x2, 'cpu.stat\x00'}}, {{0x6, 0x3, 0x0, 0x9, 0xfc8, 0x7ff, {0x5, 0xffff, 0xff, 0x3688, 0x4, 0xffffffffffffbc43, 0xffff, 0x40, 0x2, 0x8, 0x2, r3, r4, 0x2}}, {0x6, 0x6, 0xb, 0x7, 'em0\\selinux'}}, {{0x0, 0x1, 0x7b, 0x6e, 0x3, 0x5, {0x6, 0x0, 0x2, 0xfffffffffffff001, 0x2, 0x8, 0x2, 0x800, 0x6, 0x80000001, 0x9, r3, r4, 0x6, 0x7}}, {0x2, 0x100000001, 0x9, 0x38, 'cpu.stat\x00'}}, {{0x5, 0x2, 0x5, 0x100000000, 0x0, 0x3ff, {0x1, 0x0, 0x0, 0x800, 0x1, 0xe9, 0x0, 0x7fffffff, 0x80000001, 0x6, 0x3ff, r3, r4, 0x101, 0x7}}, {0x3, 0x20, 0x7, 0x80000000, '%route\x00'}}, {{0x6, 0x0, 0x4, 0xc2f4, 0x5, 0x20, {0x6, 0x3, 0x2, 0x5, 0x7fffffff, 0x3f, 0x2, 0xa122, 0x2, 0x3f, 0xffffffffffffffc1, r3, r4, 0x7}}, {0x2, 0xe3, 0x9, 0xfff, 'cpu.stat\x00'}}, {{0x2, 0x0, 0x2, 0x7, 0xc9, 0x4, {0x6, 0x0, 0xfffffffffffffffa, 0x401, 0x6, 0xc235, 0x2, 0x5, 0x8, 0x10001, 0x100, r3, r4, 0x455, 0x2}}, {0x1, 0x5, 0x0, 0x9}}]}, 0x490) getsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000800)=0x4) sched_getattr(r2, &(0x7f0000000100), 0x30, 0x0) 01:26:41 executing program 0: modify_ldt$write(0x1, &(0x7f0000000080)={0x6fd1, 0x20000800, 0xffffffffffffffff, 0x100, 0x6, 0x5, 0x401, 0x200, 0xfffffffffffffffc, 0x1}, 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x600000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000009c0)=0x14, 0x80000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000003c0)={0x1}) sendmsg$nl_route_sched(r0, &(0x7f0000000a80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)=@gettfilter={0x34, 0x2e, 0xeda85cec7011b6c4, 0x70bd28, 0x25dfdbfb, {0x0, r1, {0xffef}, {0xb}, {0xffff, 0xfff3}}, [{0x8, 0xb, 0x3ff}, {0x8, 0xb, 0xfffffffffffffffc}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f00000000c0)=0x2) unshare(0x600) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) ioctl$BLKIOOPT(r5, 0xb702, &(0x7f0000000040)) [ 247.718760] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.725455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.732464] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.738938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.747386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.754180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.915829] 8021q: adding VLAN 0 to HW filter on device team0 01:26:42 executing program 0: modify_ldt$write(0x1, &(0x7f0000000080)={0x6fd1, 0x20000800, 0xffffffffffffffff, 0x100, 0x6, 0x5, 0x401, 0x200, 0xfffffffffffffffc, 0x1}, 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x600000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000009c0)=0x14, 0x80000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000003c0)={0x1}) sendmsg$nl_route_sched(r0, &(0x7f0000000a80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)=@gettfilter={0x34, 0x2e, 0xeda85cec7011b6c4, 0x70bd28, 0x25dfdbfb, {0x0, r1, {0xffef}, {0xb}, {0xffff, 0xfff3}}, [{0x8, 0xb, 0x3ff}, {0x8, 0xb, 0xfffffffffffffffc}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f00000000c0)=0x2) unshare(0x600) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) ioctl$BLKIOOPT(r5, 0xb702, &(0x7f0000000040)) 01:26:42 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) fsync(r0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x9, "2a8f5865af49c7250671f832f1ce9782bf915349fd6618fbaf11b15f24f44d12", 0x100000000, 0x0, 0x0, 0x0, 0x1000000}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x8000) 01:26:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x0, 0x268, 0x3]}) [ 249.376745] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 01:26:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x0, 0x268, 0x3]}) [ 250.485105] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.491592] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.500136] device bridge_slave_0 entered promiscuous mode [ 250.840585] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.847256] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.855905] device bridge_slave_1 entered promiscuous mode [ 251.207150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.500433] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.477299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.817363] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.163021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.170115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.284170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.473729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.480831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.345550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.447788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.455903] team0: Port device team_slave_0 added [ 254.817687] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.826054] team0: Port device team_slave_1 added [ 255.081273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.088500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.097281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.379964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.387266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.396011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.427272] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.433834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.441534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:26:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xa, 0x4000000000080, 0x2}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff), &(0x7f00000001c0)}, 0x20) [ 255.686827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.694916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.703777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.895387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.903207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.912073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.449433] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.157840] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.164432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.171340] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.177958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.186789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.193500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.925873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.628524] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.446009] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.452487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.460211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:26:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = memfd_create(&(0x7f0000000180)='@vmnet1em1procppp1keyring\x00', 0x1) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='\x00') bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) preadv(r1, &(0x7f00000017c0), 0x1ce, 0x7ffffffff000) [ 261.183114] 8021q: adding VLAN 0 to HW filter on device team0 01:26:59 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="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", 0x0) ftruncate(r2, 0x40001) sendfile(r1, r2, &(0x7f0000001000), 0x4) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/48, 0x30, 0x0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000340)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/123, 0x5e}], 0x344, &(0x7f0000000680)=""/108, 0x6c}}, {{0x0, 0x0, &(0x7f00000007c0), 0x1}}], 0x6277f28, 0xd2740a8a12457442, 0x0) recvfrom(r0, &(0x7f0000000040)=""/93, 0xffffffffffffff84, 0x0, 0x0, 0xfffffffffffffdb8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) [ 265.209750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.525113] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.806601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.812998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.820645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.102357] 8021q: adding VLAN 0 to HW filter on device team0 01:27:02 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 01:27:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x1f}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x8c001) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x8) 01:27:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000540)={@local, r1}, 0x14) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000580)={'filter\x00', 0xfe, "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"}, &(0x7f00000006c0)=0x122) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000700)={0x7, 0x3f}) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000740)={@remote, @rand_addr}, &(0x7f0000000780)=0x8) rt_sigreturn() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in, @in6, 0x4e21, 0x7, 0x4e24, 0x0, 0xa, 0x20, 0x20, 0x3f, r1, r2}, {0x8, 0x0, 0x1, 0x7, 0x20000000000, 0x800, 0x9, 0x3ff}, {0xffffffff, 0x4, 0x14c0000000, 0x1000}, 0x10001, 0x6e6bb8, 0x2, 0x1, 0x3, 0x1}, {{@in=@multicast2, 0x4d2, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x12}, 0x3505, 0x7, 0x0, 0x9bb, 0x4, 0x787, 0x7}}, 0xe8) r3 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000a00)={[], 0x7, 0x100000001, 0x9, 0x7, 0x0, r3}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/dlm_plock\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000ac0), 0x4) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000b00)=0x73f1, 0x4) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000b40)=0x5) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000b80)={'ipvs\x00'}, &(0x7f0000000bc0)=0x1e) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000c00)=@int=0x3a074d4c, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000c40)={'rose0\x00', {0x2, 0x4e23, @multicast1}}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000c80), &(0x7f0000000cc0)=0x4) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000d00), &(0x7f0000000d40)=0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000d80)={0x0, @aes256, 0x0, "9357bab00cf3a69c"}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000dc0)={0x8, 0x81, 0x3008, 0x1}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) r6 = syz_open_dev$video(&(0x7f0000000e00)='/dev/video#\x00', 0xffffffff, 0x40) ppoll(&(0x7f0000000e40)=[{r5, 0x10}, {r4, 0x8018}, {r4, 0x180}, {r6, 0x2040}], 0x4, &(0x7f0000000e80), &(0x7f0000000ec0)={0x4}, 0x8) openat$vhci(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/vhci\x00', 0x0, 0x0) rseq(&(0x7f0000000f40)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6d0, 0xf0, 0x208, 0x0, 0x208, 0x4f0, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000f80), {[{{@ipv6={@ipv4={[], [], @remote}, @dev={0xfe, 0x80, [], 0xa}, [0xff, 0x0, 0xffffffff, 0xff000000], [0xff, 0xff000000, 0xffffffff], '\x00', 'syzkaller1\x00', {0xff}, {}, 0xc, 0xff, 0x2, 0x4}, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x91, 0x3c, 0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @empty, [0xff000000, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffffff, 0xff000000], 'vcan0\x00', 'dummy0\x00', {}, {0xff}, 0x29, 0xffff, 0x0, 0x12}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@inet=@ipcomp={0x30, 'ipcomp\x00', 0x0, {0x4d5, 0x4d5, 0x1}}, @common=@inet=@socket2={0x28, 'socket\x00', 0x2, 0x1}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6, @ipv4, 0x1c, 0x32, 0x7ff}}}, {{@ipv6={@empty, @mcast2, [0xff, 0xffffffff, 0xff0000ff, 0xffffff00], [0xff, 0xffffff00, 0xff000000, 0xffffffff], 'gre0\x00', 'erspan0\x00', {0xff}, {0xff}, 0xc, 0xf8, 0x1, 0x20}, 0x0, 0x138, 0x180, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x0, 0x1, 0x1, [0x0, 0x99, 0x3ff, 0xc5, 0x1, 0xe3, 0x3ff, 0x2, 0x771, 0x9, 0x1200000000000000, 0x1ff, 0x8000, 0xfffffffffffffffb, 0x6, 0x6], 0x9}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv6, 0xc, 0x2e, 0x9}}}, {{@ipv6={@remote, @remote, [0xffffff00, 0xff, 0x0, 0xffffff00], [0xff000000, 0xff, 0xff, 0xffffffff], 'team_slave_1\x00', 'ip6_vti0\x00', {0xff}, {}, 0x2f, 0x7, 0x1, 0x20}, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv6=@dev={0xfe, 0x80, [], 0x18}, 0x35, 0x34, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x730) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001740)={r5}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000001780)={{0x2, 0x4e21, @rand_addr=0x1}, {0x307, @local}, 0x10, {0x2, 0x4e23, @multicast1}, 'bridge_slave_0\x00'}) 01:27:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xd00, 0x297ef) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:27:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001800)) accept(0xffffffffffffffff, &(0x7f0000000100)=@alg, &(0x7f0000000180)=0x80) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001640), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) 01:27:02 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") epoll_pwait(r0, &(0x7f0000000080), 0x1b3, 0x0, 0x0, 0xaf) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x2ac, 0x0) 01:27:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, &(0x7f0000000340), 0xffe2, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000940)=0x10, 0x4) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000200)=@xdp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000500)=""/178, 0xb2}, 0x22) 01:27:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0xfffffffffffffa1c, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0x15c) 01:27:02 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") epoll_pwait(r0, &(0x7f0000000080), 0x1b3, 0x0, 0x0, 0xaf) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x2ac, 0x0) [ 268.379820] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:27:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89fa, &(0x7f0000000040)={'sit0\x00', @ifru_addrs=@in={0x2, 0x0, @rand_addr}}) 01:27:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x80000000000009, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000240)}, 0x20) 01:27:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) accept4(0xffffffffffffffff, 0x0, &(0x7f0000001a00), 0x0) 01:27:02 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") epoll_pwait(r0, &(0x7f0000000080), 0x1b3, 0x0, 0x0, 0xaf) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x2ac, 0x0) 01:27:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000380), 0x10) [ 269.309651] IPVS: ftp: loaded support on port[0] = 21 [ 270.535374] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.541964] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.549656] device bridge_slave_0 entered promiscuous mode [ 270.625559] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.632077] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.639637] device bridge_slave_1 entered promiscuous mode [ 270.714705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.788585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.014128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.092561] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.311949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 271.318929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.544269] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.552140] team0: Port device team_slave_0 added [ 271.626542] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.634234] team0: Port device team_slave_1 added [ 271.710134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.785798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.862662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 271.869950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.878961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.954253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 271.961526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.970484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.819675] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.826251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.833210] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.839621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.847707] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 273.222988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.898181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.179160] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.465759] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.472178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.479834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.764395] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.534708] PANIC: double fault, error_code: 0x0 [ 278.539548] CPU: 0 PID: 8202 Comm: syz-executor5 Not tainted 4.19.0+ #82 [ 278.546395] ================================================================== [ 278.553758] BUG: KMSAN: uninit-value in irq_work_claim+0x153/0x390 [ 278.560071] CPU: 0 PID: 8202 Comm: syz-executor5 Not tainted 4.19.0+ #82 [ 278.566907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.576249] Call Trace: [ 278.578822] <#DF> [ 278.580978] dump_stack+0x32d/0x480 [ 278.584605] ? irq_work_claim+0x153/0x390 [ 278.588759] kmsan_report+0x19f/0x300 [ 278.592593] kmsan_internal_check_memory+0x35f/0x450 [ 278.597705] ? __msan_poison_alloca+0x1e0/0x2b0 [ 278.602383] kmsan_check_memory+0xd/0x10 [ 278.606441] irq_work_claim+0x153/0x390 [ 278.610419] irq_work_queue+0x44/0x280 [ 278.614308] vprintk_emit+0x693/0x790 [ 278.618121] vprintk_default+0x90/0xa0 [ 278.622008] vprintk_func+0x26b/0x2a0 [ 278.625809] printk+0x1a3/0x1f0 [ 278.629106] dump_stack_print_info+0x2c4/0x3c0 [ 278.633810] show_regs_print_info+0x37/0x40 [ 278.638133] show_regs+0x38/0x170 [ 278.641588] df_debug+0x86/0xb0 [ 278.644867] do_double_fault+0x362/0x480 [ 278.648954] double_fault+0x1e/0x30 [ 278.652585] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 278.658033] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 [ 278.676945] RSP: 0018:fffffe0000002000 EFLAGS: 00010086 [ 278.682307] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 278.689572] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe0000002150 [ 278.696839] RBP: fffffe0000002018 R08: 0000000000000000 R09: 0000000000000000 [ 278.704103] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 278.711368] R13: fffffe00000021c0 R14: fffffe00000021a8 R15: fffffe00000021a8 [ 278.718644] [ 278.720873] [ 278.724169] kmsan_memmove_origins+0xbd/0x1d0 [ 278.728666] ? kmsan_memmove_shadow+0xad/0xe0 [ 278.733168] __msan_memmove+0x6c/0x80 [ 278.736976] fixup_bad_iret+0x9b/0x130 [ 278.740866] error_entry+0xad/0xc0 [ 278.744407] RIP: 0000: (null) [ 278.748298] Code: Bad RIP value. [ 278.751659] RSP: a3fb7f:00007fcfad4db9c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 278.759540] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 278.766805] RDX: 73c99d5a6ca73100 RSI: 0000000000000000 RDI: 0000000000000000 [ 278.774069] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 278.781330] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 278.788598] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 278.795871] ? general_protection+0x8/0x30 [ 278.800113] ? general_protection+0x8/0x30 [ 278.804347] [ 278.807699] [ 278.809317] Local variable description: ----__ai_ptr@irq_work_claim [ 278.815709] Variable was created at: [ 278.819419] irq_work_claim+0x4b/0x390 [ 278.823304] irq_work_queue+0x44/0x280 [ 278.827180] [ 278.828798] Byte 7 of 8 is uninitialized [ 278.832848] Memory access of size 8 starts at fffffe000000aa38 [ 278.838810] ================================================================== [ 278.846163] Disabling lock debugging due to kernel taint [ 278.851603] Kernel panic - not syncing: panic_on_warn set ... [ 278.851603] [ 278.858969] CPU: 0 PID: 8202 Comm: syz-executor5 Tainted: G B 4.19.0+ #82 [ 278.867187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.876533] Call Trace: [ 278.879111] <#DF> [ 278.881263] dump_stack+0x32d/0x480 [ 278.884906] panic+0x57e/0xb28 [ 278.888118] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 278.893569] kmsan_report+0x300/0x300 [ 278.897372] kmsan_internal_check_memory+0x35f/0x450 [ 278.902491] ? __msan_poison_alloca+0x1e0/0x2b0 [ 278.907175] kmsan_check_memory+0xd/0x10 [ 278.911237] irq_work_claim+0x153/0x390 [ 278.915221] irq_work_queue+0x44/0x280 [ 278.919112] vprintk_emit+0x693/0x790 [ 278.922930] vprintk_default+0x90/0xa0 [ 278.926840] vprintk_func+0x26b/0x2a0 [ 278.930657] printk+0x1a3/0x1f0 [ 278.933955] dump_stack_print_info+0x2c4/0x3c0 [ 278.938545] show_regs_print_info+0x37/0x40 [ 278.942868] show_regs+0x38/0x170 [ 278.946328] df_debug+0x86/0xb0 [ 278.949608] do_double_fault+0x362/0x480 [ 278.953677] double_fault+0x1e/0x30 [ 278.957320] RIP: 0010:kmsan_get_origin_address+0xa/0x370 [ 278.962769] Code: eb fe 0f 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 10 48 89 75 c8 48 89 fb 49 bc 00 00 00 00 00 78 [ 278.981673] RSP: 0018:fffffe0000002000 EFLAGS: 00010086 [ 278.987034] RAX: 00000000000001a8 RBX: 0000000000000000 RCX: 0000000000000001 [ 278.994299] RDX: 0000000000000001 RSI: 0000000000000088 RDI: fffffe0000002150 [ 279.001566] RBP: fffffe0000002018 R08: 0000000000000000 R09: 0000000000000000 [ 279.008832] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000088 [ 279.016100] R13: fffffe00000021c0 R14: fffffe00000021a8 R15: fffffe00000021a8 [ 279.023399] [ 279.025625] [ 279.028921] kmsan_memmove_origins+0xbd/0x1d0 [ 279.033417] ? kmsan_memmove_shadow+0xad/0xe0 [ 279.037917] __msan_memmove+0x6c/0x80 [ 279.041716] fixup_bad_iret+0x9b/0x130 [ 279.045612] error_entry+0xad/0xc0 [ 279.049140] RIP: 0000: (null) [ 279.053051] Code: Bad RIP value. [ 279.056413] RSP: a3fb7f:00007fcfad4db9c0 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 279.064294] RAX: 0000000000000000 RBX: ffffffff8ae00e58 RCX: 000000000040393c [ 279.072046] RDX: 73c99d5a6ca73100 RSI: 0000000000000000 RDI: 0000000000000000 [ 279.079321] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000072bf08 [ 279.086587] R10: 000000000072bf00 R11: 000000000072bf0c R12: 0000000000000000 [ 279.093857] R13: 000000000072bf08 R14: 000000000072bf00 R15: 000000000072bf0c [ 279.101144] ? general_protection+0x8/0x30 [ 279.105388] ? general_protection+0x8/0x30 [ 279.109625] [ 279.114077] Kernel Offset: disabled [ 279.117710] Rebooting in 86400 seconds..