[ 55.417110] audit: type=1800 audit(1538804991.455:27): pid=5991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 56.882319] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 59.054976] random: sshd: uninitialized urandom read (32 bytes read) [ 59.514340] random: sshd: uninitialized urandom read (32 bytes read) [ 61.689400] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts. [ 67.539130] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/06 05:50:05 fuzzer started [ 72.337407] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/06 05:50:10 dialing manager at 10.128.0.26:36867 2018/10/06 05:50:10 syscalls: 1 2018/10/06 05:50:10 code coverage: enabled 2018/10/06 05:50:10 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/06 05:50:10 setuid sandbox: enabled 2018/10/06 05:50:10 namespace sandbox: enabled 2018/10/06 05:50:10 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/06 05:50:10 fault injection: enabled 2018/10/06 05:50:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/06 05:50:10 net packed injection: enabled 2018/10/06 05:50:10 net device setup: enabled [ 78.229506] random: crng init done 05:52:15 executing program 0: ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000003c0)={0x3, 0x103}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) init_module(&(0x7f0000000d80)='/dev/uinput\x00', 0xc, &(0x7f0000000f80)='/dev/uinput\x00') ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000280)={0x0, 0x5, 0x2, 0x7, 0x80, 0x1, 0x9, 0x55, 0x1, 0x4, 0xb566}) sched_setscheduler(0x0, 0x2, &(0x7f0000000100)=0x8) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/ppp\x00', 0x800, 0x0) renameat(r1, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000d40)='./file0\x00') sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[]}}, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x200) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/202, 0xca}, {&(0x7f0000000e80)=""/216, 0xd8}, {&(0x7f0000000080)=""/73, 0x49}], 0x3) readv(0xffffffffffffffff, &(0x7f0000000380), 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 200.173405] IPVS: ftp: loaded support on port[0] = 21 [ 202.498010] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.504589] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.513349] device bridge_slave_0 entered promiscuous mode [ 202.674590] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.681060] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.689933] device bridge_slave_1 entered promiscuous mode [ 202.828515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.963991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.393550] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="9d7186a84f96ddcf8178d82d67b1b302", 0x10}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvfrom(r1, &(0x7f0000000fc0)=""/4096, 0xfffffffffffffeaa, 0x0, 0x0, 0x309) [ 203.563682] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.027380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 204.034661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.241466] IPVS: ftp: loaded support on port[0] = 21 [ 204.965078] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.973260] team0: Port device team_slave_0 added [ 205.157902] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.166159] team0: Port device team_slave_1 added [ 205.338510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.345718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.354846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.545748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.552966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.562017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.824408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.832363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.841176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.107235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.115106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.124482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.438815] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.445383] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.454151] device bridge_slave_0 entered promiscuous mode [ 207.676175] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.682844] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.691261] device bridge_slave_1 entered promiscuous mode [ 207.923316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.158882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.697862] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.915151] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.921754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.928702] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.935333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.944468] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.954655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.971704] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.188406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.195507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:52:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha384-generic)\x00'}, 0x58) dup3(r0, r2, 0x0) [ 209.463189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.470260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.265781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.274107] team0: Port device team_slave_0 added [ 210.308722] IPVS: ftp: loaded support on port[0] = 21 [ 210.473839] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.482012] team0: Port device team_slave_1 added [ 210.771192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.782552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.791518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.069174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.076389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.085313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.390930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.398648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.407862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.743241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.752350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.762915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.946261] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.952914] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.961321] device bridge_slave_0 entered promiscuous mode [ 215.128248] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.134786] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.143279] device bridge_slave_1 entered promiscuous mode [ 215.184030] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.190508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.197514] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.204015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.212964] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.414852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.542196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.697478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.443843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.678666] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.974234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.984066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.192120] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.200859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:52:33 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 218.018198] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.026323] team0: Port device team_slave_0 added [ 218.347071] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.355335] team0: Port device team_slave_1 added [ 218.720242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 218.727411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.736384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.017463] IPVS: ftp: loaded support on port[0] = 21 [ 219.058563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.065686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.074680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.383354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.390945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.400177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.766332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.774085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.783429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.324116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.708059] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.546351] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.552871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.559760] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.566330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.575240] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.882375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.064920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 224.071318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.079436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.599910] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.606459] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.614922] device bridge_slave_0 entered promiscuous mode [ 224.972535] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.979033] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.987894] device bridge_slave_1 entered promiscuous mode [ 225.322746] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.407844] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.788522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.997021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.399444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.767937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.775086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.119017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.126254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:52:44 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) [ 229.313525] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.321489] team0: Port device team_slave_0 added [ 229.497091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.721821] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.729954] team0: Port device team_slave_1 added [ 229.788455] IPVS: ftp: loaded support on port[0] = 21 [ 230.173395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.180453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.189940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.637531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.644850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.653821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.083121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.090747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.099790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.147969] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.566864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.574556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.583743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.687893] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.694482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.702655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.408343] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.101105] input: syz1 as /devices/virtual/input/input5 [ 235.255769] input: syz1 as /devices/virtual/input/input6 05:52:51 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7e3, 0x200402) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, r1, 0x3c, 0xfffffffffffffffd, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xffffffffffffffb2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYRESOCT=r1], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7ff}, &(0x7f00000006c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffe01, @dev, 0x80}}, 0xfff, 0x6}, 0x90) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x1, r3, 0x1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/158) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) signalfd(r4, &(0x7f00000007c0)={0xfffffffffffeffff}, 0x8) 05:52:52 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7e3, 0x200402) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, r1, 0x3c, 0xfffffffffffffffd, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xffffffffffffffb2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYRESOCT=r1], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7ff}, &(0x7f00000006c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffe01, @dev, 0x80}}, 0xfff, 0x6}, 0x90) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x1, r3, 0x1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/158) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) signalfd(r4, &(0x7f00000007c0)={0xfffffffffffeffff}, 0x8) [ 236.367413] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.373956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.380901] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.387502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.395768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 236.841970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:53 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7e3, 0x200402) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, r1, 0x3c, 0xfffffffffffffffd, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xffffffffffffffb2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYRESOCT=r1], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7ff}, &(0x7f00000006c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffe01, @dev, 0x80}}, 0xfff, 0x6}, 0x90) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x1, r3, 0x1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/158) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) signalfd(r4, &(0x7f00000007c0)={0xfffffffffffeffff}, 0x8) [ 237.059538] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.066287] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.074775] device bridge_slave_0 entered promiscuous mode 05:52:53 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80000, 0x0) write$P9_RSETATTR(r0, &(0x7f00000001c0)={0x7}, 0x7) set_mempolicy(0x3, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x0, 0x9}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000380)={r3, 0x4}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000280)={r4, 0x4}, &(0x7f00000002c0)=0x8) write$P9_RWRITE(r1, &(0x7f0000000240)={0xb}, 0xb) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') write$P9_RREMOVE(r2, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) unshare(0x44060000) [ 237.536104] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.542759] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.551049] device bridge_slave_1 entered promiscuous mode [ 237.823819] IPVS: ftp: loaded support on port[0] = 21 [ 237.971041] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.373023] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.374814] IPVS: ftp: loaded support on port[0] = 21 05:52:55 executing program 0: capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000000)='md5sum)%\x00'}, 0x30) r1 = getpgid(r0) ioprio_set$pid(0x1, r1, 0x0) [ 239.303937] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure [ 239.530987] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:52:55 executing program 0: r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 240.045424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.479275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.486558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:52:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @loopback}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'dummy0\x00', 0x1}, 0x18) r1 = accept(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0xf4, "ad3bd92284aa94868d7f5e3d0985872b7f76ab65a9f1ea6e1c38e36442050b9e0f62bd278c6da35a630d6cffef9f9cd1dcbd4a066b65a8175ce5b366092d2ae1da473c4c4a524d1bed705b7da94610177b77035b1ca70b825fd3e5bb0af9d29339cdfe4ab8e648ff6cb0625c3f9d04c7fcd9a5b0ff89c651e8ae6d719aaa9cfdd29355e8243dff9f7bf56b89793559d5575a60e882abaf5ab8d42a86f5eaa9ffb087c2cbc3e90bd382488bd3ef84ee089e3a601f3a7482cc2a92eca30ed3d86d9b5e31d84c63ffc32bd00f286eeebc4c032abd7806cac6ae11c87c23e98d95416a607fc89d7bc0a34af62e1bb4f46d330cff7027"}, &(0x7f00000002c0)=0xfc) [ 240.521993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.683236] IPVS: Unknown mcast interface: dummy0 [ 240.717098] IPVS: Unknown mcast interface: dummy0 05:52:57 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000300)=0x1, 0x4) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000400)={0x40000000}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, &(0x7f0000000180), &(0x7f0000000200)=0xfffffffffffffd86) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000540)={'filter\x00', 0x0, 0x4, 0x4c, [], 0x6, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], &(0x7f00000004c0)=""/76}, &(0x7f00000005c0)=0x78) mq_timedsend(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000e0b000)) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240)="3440792164e3b31be80c2f5094ac7a2951b0244e746a053d411f9adb4f5c273e65367b9b89f4d34796661cd7635a857e1aaa3f1c174ff3528fe3a20ae6eb095aceb259f797959bc9aa878cb271b4edefc1419c87f1f0f35f93744d16846d8c213e3810da0c40f9187510433502e2ab5fa3d5bd9433c5f1662dfb871d25c64c7e30f38a3a96a5259ffd57830695a04dd2d5e7a9efb19633dcbb8a5fe6f699a5291a0f7ccdfa994246b67ae021523da1b545f61e5c67c7a8f2b0d48428", 0xbc, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)=0x0) mq_notify(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0xe, 0x4, @tid=r2}) futex(&(0x7f0000000180), 0x8c, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x8000}, {r1}, {0xffffffffffffffff, 0x200}, {r1, 0x24d0}], 0x4, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x3063}, 0x8) mq_timedsend(r0, &(0x7f0000000600)="b3eaddbd268653831f050c6c99ff5455741ae7e04e548641b4a0ebf55e4ba74455a2996adde572137b644c81ccf558ea483a0c6eda15c3cd626da99f9584aab452a23341537010ac342875b8088fb86ec187f7f2d6b31422428c44391f62aee87efdccb02a6df41c701e20117ea8db38174f9e130dc8190a1fe1fa2b6b479234f4fbe5bbee08622c7518f0ed8d499fcb0fd8", 0x92, 0x18000000000, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x40, 0x0) [ 240.946112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.953295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.245810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.253934] team0: Port device team_slave_0 added [ 242.260927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.629019] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 242.637209] team0: Port device team_slave_1 added [ 243.048707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.055961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.064872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.338471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.345744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.354696] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.482346] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.489002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.496911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.676530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.684340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.693299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.987283] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.995055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.004118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 05:53:00 executing program 1: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0x10158) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x10a) dup2(r0, r1) ioctl$TIOCNOTTY(r0, 0x5422) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000400), &(0x7f0000000b40)) write$binfmt_script(r2, &(0x7f0000000440)={'#! ', './file0/../file0', [{0x20, '+'}, {}, {0x20, '/dev/ptmx\x00'}, {0x20, '/dev/ptmx\x00'}, {0x20, '^cpuset@'}, {0x20, '/dev/ptmx\x00'}, {}], 0xa, "01d50a2ae9aee99c74249bf4a1624d6e5b3ded2a829cb6027af8719f6566f4865ba2bd3a8ecd04fb64df0b13f301729ee6bb008a4aec28afd148fe97f55e923a7801701682bd8d26ea8000537072ae554bc7520fd7dfef059619150f0b110046aac6785f1c1806ba8b3d2f5dc45cb2e5622e5a49b461aef15697ef12bf0fdae989af63d63acba811cdba5c7dde966aa6df4f37afc7bf2d71d7009508b562716cfdac284baa"}, 0xe7) [ 244.986360] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.129308] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.135837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.142927] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.149393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.157805] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 247.164506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.893144] 8021q: adding VLAN 0 to HW filter on device bond0 05:53:06 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) r0 = memfd_create(&(0x7f0000000000)='team\x00', 0x0) accept4$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000e980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000e9c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000114c0)=@hci, &(0x7f0000011540)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x9fb, &(0x7f0000000440)=""/32) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280), 0x0, 0x0, &(0x7f0000001380)={0x77359400}) [ 250.651014] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.749209] hrtimer: interrupt took 61300 ns [ 251.348122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.354644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.362676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.900230] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.566511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.119240] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.606608] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.613059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.620830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:53:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1) fcntl$setstatus(r0, 0x4, 0x4400) pwritev(r0, &(0x7f0000000280), 0x276, 0x0) [ 256.188911] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.079002] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 05:53:14 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0xff, 0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=r0]], 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfb3, 0x200200) openat$cgroup_type(r1, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) 05:53:14 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000400)=0x2b, 0x2) munlockall() r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000440)=""/155) mq_open(&(0x7f0000000500)='\x00', 0x841, 0x2, &(0x7f0000000540)={0x81, 0x20a5, 0xc3d, 0x7, 0x9, 0xfb, 0xef3, 0x6}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') r4 = accept$packet(r0, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) getpeername$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) r8 = accept4$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14, 0x80000) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000ac0)={@loopback, @empty, 0x0}, &(0x7f0000000b00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000003f80)={@mcast2, 0x0}, &(0x7f0000003fc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004340)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x14000800}, 0xc, &(0x7f0000004300)={&(0x7f0000004040)={0x29c, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x174, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x88}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xe1c7}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff89}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xd0b}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x104, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000004380)=0x4, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000043c0)={0x0, 0x8}, &(0x7f0000004400)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000004440)={r15, 0x5, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000004480)={r15, 0xfc, 0x7ff, 0x5, 0x3f}, 0x14) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000044c0)={'yam0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000004500)=0xfffffffffffffffa, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000004540)={'bond_slave_0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000004580)={0x1, 0x8f, 0x8, 0x3d2, 0x78, 0x2, 0x7f, 0x3, r15}, &(0x7f00000045c0)=0x20) getpeername$inet(r0, &(0x7f0000004600)={0x2, 0x0, @dev}, &(0x7f0000004640)=0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004680)={{{@in6=@loopback, @in6=@mcast1, 0x4e21, 0x3ff, 0x4e21, 0x9, 0xa, 0xa0, 0x0, 0x73, r5, r12}, {0x7ff, 0x5, 0x4, 0x5, 0x9, 0x7, 0xffffffffffffffff, 0x101}, {0x0, 0x200, 0xa14, 0x40}, 0x8, 0x6e6bb3, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in6=@loopback, 0x3503, 0x4, 0x3, 0x200, 0x8, 0x4a19, 0x7}}, 0xe8) openat$vnet(0xffffffffffffff9c, &(0x7f0000004780)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000047c0)={[0x6, 0x5, 0x10000, 0x4775, 0x1ff, 0x5, 0x3, 0x7, 0x80000000, 0x4, 0x4, 0x81, 0x8, 0x1, 0x0, 0x2], 0x100000, 0x100000}) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000004880)={r16, 0x0, 0x6, [0x200, 0x0, 0x81, 0x5, 0x8, 0xbe1b]}, 0x14) 05:53:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000004040)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="7caa2faaf53696bbb91da2acff1179f8", 0x10}], 0x1, &(0x7f0000000140)}], 0x1, 0x20008014) sendmmsg$alg(r2, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="9d7186a84f96ddcf8178d82d67b1b302", 0x10}], 0x1, &(0x7f00000002c0)}], 0x1, 0x0) recvfrom(r2, &(0x7f0000000fc0)=""/4096, 0xfffffffffffffeaa, 0x0, 0x0, 0x309) 05:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 05:53:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x40000000000019a, 0x0, &(0x7f0000001380)={0x77359400}) 05:53:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r1, &(0x7f0000000040)=""/147, 0x93, 0x0, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) 05:53:14 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:14 executing program 0: 05:53:14 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) getdents(r0, &(0x7f0000000200)=""/148, 0x94) 05:53:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x800000000001e, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000d9dff0)={0x2, 0x0, @loopback}, 0x10) 05:53:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1) fcntl$setstatus(r0, 0x4, 0x4400) pwritev(r0, &(0x7f0000000280), 0x300, 0x0) 05:53:15 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:15 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7e3, 0x200402) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xffffffffffffffb2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYRESOCT=r2], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x4) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7ff, 0x7}, &(0x7f00000006c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000700)={r5, @in6={{0xa, 0x4e20, 0xfffffffffffffe01, @dev={0xfe, 0x80, [], 0x1f}, 0x80}}, 0xfff, 0x6}, 0x90) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x1, r6, 0x1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8010, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) fstatfs(r1, &(0x7f0000000300)=""/158) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="0000ff000a000200aaaaaaaaaa00"], 0x1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000007c0)={0xfffffffffffeffff}, 0x8) [ 259.902319] IPVS: ftp: loaded support on port[0] = 21 [ 262.442695] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.449246] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.457843] device bridge_slave_0 entered promiscuous mode [ 262.663654] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.670187] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.678733] device bridge_slave_1 entered promiscuous mode [ 262.874670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.948601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.032637] ip (7651) used greatest stack depth: 53040 bytes left [ 263.173156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.251311] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.604065] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.612210] team0: Port device team_slave_0 added [ 263.682933] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 263.690330] team0: Port device team_slave_1 added [ 263.764034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 263.770936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.779698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.848323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 263.855329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.863978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.935967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 263.943334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.952021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.031161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.038535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.047431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.997568] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.004237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.011130] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.017742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.025581] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.861862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.164101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.456987] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 268.747086] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 268.753510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.761131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.054379] 8021q: adding VLAN 0 to HW filter on device team0 05:53:27 executing program 5: 05:53:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 05:53:27 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:27 executing program 2: 05:53:27 executing program 1: 05:53:27 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7e3, 0x200402) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xffffffffffffffb2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYRESOCT=r2], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)=0xc, 0x4) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000480)=@sack_info={0x0, 0x7ff, 0x7}, &(0x7f00000006c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000700)={r5, @in6={{0xa, 0x4e20, 0xfffffffffffffe01, @dev={0xfe, 0x80, [], 0x1f}, 0x80}}, 0xfff, 0x6}, 0x90) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x1, r6, 0x1) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8010, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) fstatfs(r1, &(0x7f0000000300)=""/158) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="0000ff000a000200aaaaaaaaaa00"], 0x1}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000007c0)={0xfffffffffffeffff}, 0x8) 05:53:27 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:27 executing program 2: 05:53:27 executing program 1: 05:53:27 executing program 5: 05:53:27 executing program 2: 05:53:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 05:53:28 executing program 2: 05:53:28 executing program 5: 05:53:28 executing program 1: 05:53:28 executing program 3: 05:53:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:28 executing program 1: 05:53:28 executing program 5: 05:53:28 executing program 0: 05:53:28 executing program 2: 05:53:29 executing program 4: capset(&(0x7f0000581ff8), &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:29 executing program 3: 05:53:29 executing program 0: 05:53:29 executing program 5: 05:53:29 executing program 1: 05:53:29 executing program 2: 05:53:29 executing program 0: 05:53:29 executing program 4: capset(&(0x7f0000581ff8), &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:29 executing program 1: 05:53:29 executing program 5: 05:53:29 executing program 0: 05:53:29 executing program 2: 05:53:30 executing program 4: capset(&(0x7f0000581ff8), &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:30 executing program 3: 05:53:30 executing program 5: 05:53:30 executing program 0: 05:53:30 executing program 1: 05:53:30 executing program 2: 05:53:30 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x0, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:30 executing program 0: 05:53:30 executing program 5: 05:53:30 executing program 2: 05:53:30 executing program 1: 05:53:30 executing program 3: 05:53:31 executing program 0: 05:53:31 executing program 2: 05:53:31 executing program 1: 05:53:31 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x0, 0xc) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:31 executing program 5: 05:53:31 executing program 3: 05:53:31 executing program 0: 05:53:31 executing program 2: 05:53:31 executing program 3: 05:53:31 executing program 5: 05:53:31 executing program 1: 05:53:31 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:32 executing program 0: 05:53:32 executing program 2: 05:53:32 executing program 5: 05:53:32 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x81785501, &(0x7f0000000340)) 05:53:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000010c0)='id_resolver\x00', &(0x7f0000001100), &(0x7f0000001140)='\\\x00', 0xfffffffffffffffc) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) close(r0) keyctl$read(0xb, 0x0, &(0x7f0000000380)=""/160, 0xa0) 05:53:32 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) 05:53:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000200)=""/180) sendmmsg(r0, &(0x7f00000002c0), 0x1f5, 0x20007ffc) setpgid(0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 05:53:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x3f8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x12}) 05:53:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r1, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000300)='U', 0x1, 0x8801, 0x0, 0x0) 05:53:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x1]}) 05:53:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000780)={0x4c, 0x0, &(0x7f0000000600)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18, &(0x7f0000000580)=[@flat={0x77622a85}, @ptr={0x70742a85, 0x0, &(0x7f0000000540), 0x1}], &(0x7f00000005c0)=[0x0, 0x18, 0x0]}, 0x2d8}}], 0x0, 0x0, &(0x7f0000000680)}) [ 276.976072] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 276.995517] binder: 8038:8040 got transaction with invalid offset (0, min 64 max 64) or object. [ 277.005126] binder: 8038:8040 transaction failed 29201/-22, size 64-24 line 3033 05:53:33 executing program 4: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b542407110000f30501000b0002000000d10200cf00", 0x1f) [ 277.094485] binder_alloc: binder_alloc_mmap_handler: 8038 20001000-20004000 already mapped failed -16 [ 277.136213] binder: BINDER_SET_CONTEXT_MGR already set [ 277.141754] binder: 8038:8040 ioctl 40046207 0 returned -16 [ 277.166968] ================================================================== [ 277.174392] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 05:53:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf, @time}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5334, &(0x7f0000000080)={{}, "0f6f727430000000002e0000000000000000000000000000000000000000009cc0a03100"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r2, 0x1000000000013) [ 277.180901] CPU: 0 PID: 8032 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #63 [ 277.188096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.197460] Call Trace: [ 277.200077] dump_stack+0x306/0x460 [ 277.203733] ? loaded_vmcs_init+0x343/0x590 [ 277.208099] kmsan_report+0x1a3/0x2d0 [ 277.211941] __msan_warning+0x7c/0xe0 [ 277.215778] loaded_vmcs_init+0x343/0x590 [ 277.219973] __loaded_vmcs_clear+0x2fb/0x3c0 [ 277.224423] generic_exec_single+0x17b/0x500 [ 277.228862] ? vmx_get_msr_feature+0x180/0x180 [ 277.233477] smp_call_function_single+0x290/0x500 [ 277.238356] ? vmx_get_msr_feature+0x180/0x180 [ 277.243009] vmx_free_vcpu+0x582/0x8a0 [ 277.246941] ? vmx_create_vcpu+0x7920/0x7920 [ 277.251385] kvm_arch_destroy_vm+0x727/0xcd0 [ 277.255827] kvm_put_kvm+0x100b/0x1cf0 [ 277.259774] kvm_vcpu_release+0xad/0x100 [ 277.263875] ? kvm_vcpu_mmap+0x80/0x80 [ 277.267784] __fput+0x4e8/0xda0 [ 277.271112] ____fput+0x37/0x40 [ 277.274425] ? fput+0x3e0/0x3e0 [ 277.277773] task_work_run+0x467/0x500 [ 277.281712] prepare_exit_to_usermode+0x364/0x470 [ 277.286603] syscall_return_slowpath+0x112/0x880 [ 277.291389] ? __close_fd+0x465/0x4c0 [ 277.295247] ? __se_sys_close+0x72/0x140 [ 277.299873] do_syscall_64+0xe4/0x100 [ 277.304584] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 277.310414] RIP: 0033:0x411051 [ 277.313627] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 277.333210] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 277.340979] RAX: 0000000000000000 RBX: 000000000000000a RCX: 0000000000411051 [ 277.348265] RDX: 0000000000000000 RSI: 0000000000731590 RDI: 0000000000000009 [ 277.349327] binder: undelivered TRANSACTION_ERROR: 29201 [ 277.355551] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 277.355565] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 277.355577] R13: 0000000000000001 R14: 0000000000000017 R15: 0000000000000000 [ 277.355606] [ 277.355617] Local variable description: ----error.i@loaded_vmcs_init [ 277.355624] Variable was created at: [ 277.355648] loaded_vmcs_init+0x8a/0x590 [ 277.355667] __loaded_vmcs_clear+0x2fb/0x3c0 [ 277.355697] Disabling lock debugging due to kernel taint [ 277.411083] Kernel panic - not syncing: panic_on_warn set ... [ 277.411083] [ 277.419872] CPU: 0 PID: 8032 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #63 [ 277.429672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.439036] Call Trace: [ 277.441656] dump_stack+0x306/0x460 [ 277.445319] panic+0x54c/0xafa [ 277.448572] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 277.454066] kmsan_report+0x2cd/0x2d0 [ 277.457896] __msan_warning+0x7c/0xe0 [ 277.461737] loaded_vmcs_init+0x343/0x590 [ 277.465917] __loaded_vmcs_clear+0x2fb/0x3c0 [ 277.470353] generic_exec_single+0x17b/0x500 [ 277.474807] ? vmx_get_msr_feature+0x180/0x180 [ 277.479415] smp_call_function_single+0x290/0x500 [ 277.484286] ? vmx_get_msr_feature+0x180/0x180 [ 277.489364] vmx_free_vcpu+0x582/0x8a0 [ 277.493272] ? vmx_create_vcpu+0x7920/0x7920 [ 277.497708] kvm_arch_destroy_vm+0x727/0xcd0 [ 277.502195] kvm_put_kvm+0x100b/0x1cf0 [ 277.506133] kvm_vcpu_release+0xad/0x100 [ 277.510219] ? kvm_vcpu_mmap+0x80/0x80 [ 277.514130] __fput+0x4e8/0xda0 [ 277.517446] ____fput+0x37/0x40 [ 277.520740] ? fput+0x3e0/0x3e0 [ 277.524040] task_work_run+0x467/0x500 [ 277.527965] prepare_exit_to_usermode+0x364/0x470 [ 277.533012] syscall_return_slowpath+0x112/0x880 [ 277.537787] ? __close_fd+0x465/0x4c0 [ 277.541629] ? __se_sys_close+0x72/0x140 [ 277.545719] do_syscall_64+0xe4/0x100 [ 277.549541] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 277.554741] RIP: 0033:0x411051 [ 277.557969] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 277.576879] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 277.584619] RAX: 0000000000000000 RBX: 000000000000000a RCX: 0000000000411051 [ 277.591910] RDX: 0000000000000000 RSI: 0000000000731590 RDI: 0000000000000009 [ 277.599393] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 277.606672] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 277.614744] R13: 0000000000000001 R14: 0000000000000017 R15: 0000000000000000 [ 277.623144] Kernel Offset: disabled [ 277.626792] Rebooting in 86400 seconds..