Warning: Permanently added '10.128.10.23' (ECDSA) to the list of known hosts. 2018/11/12 09:06:54 fuzzer started 2018/11/12 09:06:59 dialing manager at 10.128.0.26:42475 2018/11/12 09:06:59 syscalls: 1 2018/11/12 09:06:59 code coverage: enabled 2018/11/12 09:06:59 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/12 09:06:59 setuid sandbox: enabled 2018/11/12 09:06:59 namespace sandbox: enabled 2018/11/12 09:06:59 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/12 09:06:59 fault injection: enabled 2018/11/12 09:06:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/12 09:06:59 net packed injection: enabled 2018/11/12 09:06:59 net device setup: enabled 09:09:46 executing program 0: socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000180)={0x0, 0x1, '4'}) [ 254.154447] IPVS: ftp: loaded support on port[0] = 21 [ 256.624781] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.631284] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.640355] device bridge_slave_0 entered promiscuous mode [ 256.782593] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.789088] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.797991] device bridge_slave_1 entered promiscuous mode [ 256.935511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 257.078033] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 257.522211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.672423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 257.957855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 257.965070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:09:51 executing program 1: perf_event_open(&(0x7f00004e7000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 258.538151] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.546469] team0: Port device team_slave_0 added [ 258.738407] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.743430] IPVS: ftp: loaded support on port[0] = 21 [ 258.746509] team0: Port device team_slave_1 added [ 258.914521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.145244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 259.152427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.161360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.365058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 259.372870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.382866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.637991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 259.645807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.655144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.085092] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.091719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.098676] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.105520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.114555] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.814378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.884311] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.890789] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.899584] device bridge_slave_0 entered promiscuous mode [ 263.124146] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.130886] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.139709] device bridge_slave_1 entered promiscuous mode [ 263.324899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 263.585032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:09:56 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/11, 0x2}], 0x10000000000000f5) [ 264.256626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.524158] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.822316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 264.834011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.847449] IPVS: ftp: loaded support on port[0] = 21 [ 265.198648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 265.207522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.299872] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.308242] team0: Port device team_slave_0 added [ 266.562847] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.571204] team0: Port device team_slave_1 added [ 266.835646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 266.843756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.852687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.156001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 267.163215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.172296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.507360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.515207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.524476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.856181] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.864022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.873328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.284046] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.290535] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.299222] device bridge_slave_0 entered promiscuous mode [ 269.527050] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.533629] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.542441] device bridge_slave_1 entered promiscuous mode [ 269.847454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.117255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.045916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.355016] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.361505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.368577] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.375146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.384037] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 271.412203] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.683082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 271.690133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.952426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.017384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 272.024579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:10:06 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xc6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000140)="a6", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x5, 0x4) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) r2 = accept4(r0, 0x0, &(0x7f0000000100), 0x0) shutdown(r2, 0x1000000000002) [ 273.071454] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 273.079815] team0: Port device team_slave_0 added [ 273.488373] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 273.496814] team0: Port device team_slave_1 added [ 273.839543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 273.846805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.856043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.973401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.159761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 274.167003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.175794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.346484] IPVS: ftp: loaded support on port[0] = 21 [ 274.498477] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.506332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.515647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.819672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.829450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.838464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.473982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 276.885958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.892426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.900388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.169463] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.795873] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.802445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.809376] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.815979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.824662] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.312152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.133778] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.140366] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.149323] device bridge_slave_0 entered promiscuous mode [ 280.504061] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.510529] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.519737] device bridge_slave_1 entered promiscuous mode [ 280.839927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 281.166607] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 282.217803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 282.658930] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 283.074346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 283.081406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.358714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 283.365951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.433467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 284.441840] team0: Port device team_slave_0 added [ 284.740203] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 284.748564] team0: Port device team_slave_1 added [ 285.111750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 285.119122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.128260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.513164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 285.520208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.529478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 09:10:18 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'team_slave_1\x00'}}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000480)={&(0x7f0000000100), 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x5, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) [ 285.786510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 285.794250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.803373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.076856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 286.084780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.093998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.454317] 8021q: adding VLAN 0 to HW filter on device bond0 09:10:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'veth1\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='\n']}) [ 287.273922] IPVS: ftp: loaded support on port[0] = 21 09:10:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() io_setup(0x0, &(0x7f0000000140)) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0)=r1, 0x2fdb70688b3ba24a) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) sendto$inet6(r0, &(0x7f00000003c0)="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", 0x130, 0x3fffffd, &(0x7f0000000000)={0xa, 0xfffffffffffffffb, 0x0, @remote, 0xfffffffffffffffc}, 0x1c) [ 288.063362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:10:21 executing program 0: socketpair(0x28, 0x0, 0x28, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x30, &(0x7f00000000c0)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000140)=0x10) 09:10:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000000c0)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800002e1cc40d0000000000000000000a0000000000000000000000040000000a000a00010100000be7e72fb99ab18cf9e07d96d12b3df579d03d6b4e01002e2e10d0d920af2b6dbeea99c602a3c7a3a0e0400a4d01fa7845f0e36c682e67712864dd1f49f741dba9f4451dc39373c5bc991a2e361a315e5a179b71f6dfa645dfe2fa826f3eda58e59705c249a8afea1a4a9f7bbe"], 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000240)=0xb) 09:10:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/netlink\x00') lseek(r0, 0x0, 0x3) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x7, @name="df057c7acabb5729e335c29711a7d3cb8b0883846a2fcafdf116728a35fd8448"}, 0x8, 0x2, 0x6}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1}) [ 289.814644] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 289.841253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.849172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:10:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x1, 0x20, 0xffffffffffffffe1}) fadvise64(r0, 0x0, 0x101, 0x1) 09:10:23 executing program 0: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='n', 0x1}], 0x1}], 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/128, 0x80, 0x0, 0x0, 0x0) r0 = gettid() ptrace$pokeuser(0x6, r0, 0xd84, 0x10001) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_dccp_int(r1, 0x21, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x4) 09:10:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="340000000600000000000000000000000000000000000000001a0300000000000b000000000000006e22e6cd04210c908974c895"], 0x34) socket$nl_netfilter(0x10, 0x3, 0xc) [ 291.204925] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.211415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.218495] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.225063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.233579] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 291.240175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.598411] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.840776] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.847397] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.856132] device bridge_slave_0 entered promiscuous mode [ 294.375879] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.382661] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.391219] device bridge_slave_1 entered promiscuous mode [ 294.816478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 295.156608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.172267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.278066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.421022] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 296.724154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 297.055649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 297.062862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.353024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 297.360096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.742077] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 297.748446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.756391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.518025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 298.526447] team0: Port device team_slave_0 added [ 298.905985] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 298.914481] team0: Port device team_slave_1 added [ 299.129571] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.319864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 299.327171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 299.336545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.638346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 299.645494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 299.654423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.945980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 299.953900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.962934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.229209] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.237852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.247095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 09:10:33 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000100)=""/168, &(0x7f0000000040)=0xa8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x200) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x3) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x8000000024e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r4, r0}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 301.218185] ip (7732) used greatest stack depth: 53216 bytes left [ 302.516540] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.523097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.530028] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.536650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.545139] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.551909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.906099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.650488] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:10:38 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000040)={0x3, 0x6}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000080)={0x20000002}) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$packet(0x11, 0x2, 0x300) sysfs$3(0x3) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000140)={0xb74, 0x7, 0x8}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x4e2400, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000001c0)='(md5sum^\x00') ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}, 0x0, 0x1ff, 0x188, 0xf5f, 0xfffffffffffffff9}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r3, 0x7}, &(0x7f0000000380)=0x8) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000003c0)=0x800) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000400)={0x4, r2}) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000440)) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f00000004c0)=0x3f) socketpair$inet(0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000540)={0x100, {{0xa, 0x4e20, 0x4, @mcast1, 0x303a6cd}}}, 0x88) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000600)={r3, @in6={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0xa}, 0x80000001}}, [0x81, 0x80000000, 0x5, 0x4, 0x7, 0xffff, 0x5, 0x3, 0x7, 0xffffffffffffff6f, 0x1, 0x9, 0x5, 0xffffffffffffffff]}, &(0x7f0000000700)=0x100) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000740)=[@in6={0xa, 0x4e22, 0xf21, @ipv4={[], [], @remote}, 0x1}, @in={0x2, 0x4e22, @rand_addr=0x6}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @broadcast}], 0x5c) sysfs$1(0x1, &(0x7f00000007c0)='/dev/dlm-control\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000800)=""/158) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000008c0)={r4, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000980)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000009c0)={r7, 0x6}, 0x8) ioctl$TIOCNXCL(r2, 0x540d) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000a80)={0x7f, 0x3ef, &(0x7f0000000a00)="16f24cbbbc7542625600052c8b8f01e1b47c58a0fc", &(0x7f0000000a40)="4bd2b5c8145cc3bd4ab3188661ebcb262b56e2f1503697ceae135488abbe094d33f9b1f2590763e91e0a", 0x15, 0x2a}) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000ac0)={{0x3, 0x1, 0x1, 0x2, 0x1}, 0x7f, 0x0, 0x4}) ioctl$EVIOCSCLOCKID(r6, 0x400445a0, &(0x7f0000000b40)=0x8) [ 305.639508] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 305.646061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.654175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.786900] IPVS: ftp: loaded support on port[0] = 21 [ 306.350063] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.456968] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.463659] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.472415] device bridge_slave_0 entered promiscuous mode [ 309.658622] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.665276] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.674069] device bridge_slave_1 entered promiscuous mode [ 309.838948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 309.985748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 310.578993] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.853828] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 311.138323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 311.145748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.330971] sctp: failed to load transform for md5: -2 [ 311.397629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 311.404824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:10:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xc6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000140)="a6", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffe25, 0x5}, 0x10) [ 311.733321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.969131] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 311.977426] team0: Port device team_slave_0 added [ 312.125841] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 312.134230] team0: Port device team_slave_1 added [ 312.291199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.379175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 312.464841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.701098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 312.709248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.718310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.875493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 312.884915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.894134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.042576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 313.048928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.056951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.598784] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.521423] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.528012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.535053] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.541702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.550337] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 314.557266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:10:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x375, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children/]\x00') sync() 09:10:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000200)=@req) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x389756b1353686c0, 0x120, 0x0, 0xffffffffffffffeb) sendto$inet(r0, &(0x7f0000000080)="89", 0x1, 0x41, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) 09:10:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[]}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x166}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) 09:10:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000340), 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={"6900001a007bebd7bf998e51e600"}) 09:10:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) [ 317.361944] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:10:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) 09:10:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0xffffffffffffffff}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/55, 0x2be}], 0x1) 09:10:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x375, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children/]\x00') sync() 09:10:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) 09:10:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r4, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1100) close(r2) read$FUSE(r1, &(0x7f00000005c0), 0x1000) close(r0) [ 320.938162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.229424] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 321.522173] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 321.528447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.536444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.833095] 8021q: adding VLAN 0 to HW filter on device team0 09:10:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:10:56 executing program 4: socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000180)={0x3f000000}) 09:10:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000240), 0xce78) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) 09:10:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) 09:10:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[]}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x166}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) 09:10:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000080), 0x4) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) [ 323.987024] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 323.993931] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:10:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) 09:10:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 09:10:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000240), 0xce78) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) 09:10:57 executing program 5: 09:10:57 executing program 1: 09:10:58 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) 09:10:58 executing program 4: 09:10:58 executing program 5: 09:10:58 executing program 1: 09:10:58 executing program 0: 09:10:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0xffffffffffffffd9, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r2, r1, &(0x7f0000000240), 0x40800fff) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 09:10:58 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) 09:10:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000004800)=[{{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=[{0xc, 0x1}], 0xc}}], 0x1, 0x800) 09:10:58 executing program 4: 09:10:58 executing program 5: 09:10:58 executing program 0: 09:10:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) 09:10:59 executing program 1: 09:10:59 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') 09:10:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0xf000]}}]}, 0xff12}}, 0x0) 09:10:59 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) io_setup(0x1, &(0x7f0000000200)=0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f00000003c0)}]) 09:10:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000340), 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000000)=0xffffffffffffff83, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@flushsa={0x14}, 0xfffffdef}}, 0x0) 09:10:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc08c5334, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x80045301, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x100000000012}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000013) 09:10:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) 09:10:59 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000180)={0x3f000000}) 09:10:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents64(r0, &(0x7f0000000200)=""/116, 0x184) 09:11:00 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='/'], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='gfs2meta\x00', 0x0, &(0x7f00000000c0)='ramfs\x00') 09:11:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) io_setup(0x1, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x2}]) 09:11:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 09:11:00 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ftruncate(0xffffffffffffffff, 0x0) [ 327.183140] gfs2: gfs2 mount does not exist [ 327.200963] gfs2: gfs2 mount does not exist 09:11:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x60000000008912, &(0x7f0000000140)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f9, 0x0) 09:11:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/214, 0xd6}], 0x1) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvfrom$inet(r0, &(0x7f0000004b80)=""/4096, 0xffffffffffffff76, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) 09:11:00 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000280), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) 09:11:00 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000380)='./file0/file1\x00', 0x0, 0x0) 09:11:00 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000480)=ANY=[], &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000240)=""/186, 0xba) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=ANY=[], 0x0, 0x0, &(0x7f00000003c0)}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/230, 0xe6}], 0x1, 0x34) r3 = eventfd(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) rt_tgsigqueueinfo(r4, 0x0, 0x31, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x4}) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000140)={0x5fffff, r3}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) dup3(r5, r2, 0x0) 09:11:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x9, &(0x7f0000000040)=0x60000000, 0x98) close(0xffffffffffffffff) [ 327.838244] misc userio: No port type given on /dev/userio [ 327.868942] misc userio: The device must be registered before sending interrupts [ 327.954121] misc userio: The device must be registered before sending interrupts [ 328.031908] psmouse serio2: Failed to reset mouse on : -5 09:11:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f00000004c0), 0x1000002c0) [ 328.223303] hrtimer: interrupt took 110011 ns 09:11:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000000)) 09:11:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001d000100000040f3ff0000007e000000"], 0x1}}, 0x0) [ 328.496690] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 09:11:01 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) getgroups(0x1, &(0x7f00000002c0)=[0x0]) 09:11:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100), 0x4) [ 329.093948] binder: BINDER_SET_CONTEXT_MGR already set [ 329.103650] binder: 8659:8660 ioctl 40046207 0 returned -16 09:11:02 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=""/114, 0x72}) [ 329.364211] ptrace attach of "/root/syz-executor1"[6778] was attempted by "/root/syz-executor1"[8691] [ 329.422894] ptrace attach of "/root/syz-executor1"[6778] was attempted by "/root/syz-executor1"[8692] 09:11:03 executing program 0: 09:11:03 executing program 4: [ 330.561787] misc userio: Buffer overflowed, userio client isn't keeping up [ 331.611799] ================================================================== [ 331.619198] BUG: KMSAN: uninit-value in synaptics_detect+0x207/0x2c0 [ 331.625684] CPU: 1 PID: 3201 Comm: kworker/1:2 Not tainted 4.19.0+ #82 [ 331.632333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.641686] Workqueue: events_long serio_handle_event [ 331.646869] Call Trace: [ 331.649451] dump_stack+0x32d/0x480 [ 331.653089] ? _raw_spin_lock_irqsave+0x237/0x340 [ 331.657923] ? synaptics_detect+0x207/0x2c0 [ 331.662254] kmsan_report+0x19f/0x300 [ 331.666066] __msan_warning+0x76/0xd0 [ 331.669869] synaptics_detect+0x207/0x2c0 [ 331.674024] psmouse_extensions+0x117e/0x3930 [ 331.678528] psmouse_switch_protocol+0x184/0xdc0 [ 331.683290] psmouse_connect+0x14d3/0x2380 [ 331.687540] serio_driver_probe+0xe3/0x150 [ 331.691769] ? psmouse_interrupt+0x1950/0x1950 [ 331.696346] ? serio_uevent+0x6e0/0x6e0 [ 331.700473] really_probe+0x98a/0x1410 [ 331.704375] driver_probe_device+0x1b4/0x4f0 [ 331.708785] __device_attach_driver+0x63b/0x750 [ 331.713459] bus_for_each_drv+0x28e/0x3b0 [ 331.717605] ? driver_deferred_probe_add_trigger+0x3c0/0x3c0 [ 331.723403] __device_attach+0x444/0x6d0 [ 331.727467] device_initial_probe+0x4a/0x60 [ 331.731784] bus_probe_device+0x137/0x390 [ 331.735931] device_add+0x2692/0x2c90 [ 331.739741] ? __list_add_valid+0xb8/0x480 [ 331.743978] serio_handle_event+0x1cee/0x2650 [ 331.748467] ? kmsan_set_origin+0x83/0x130 [ 331.752707] ? serio_resume+0x2b0/0x2b0 [ 331.756717] process_one_work+0x19fe/0x25f0 [ 331.761057] worker_thread+0x1601/0x2bd0 [ 331.765142] kthread+0x5e7/0x620 [ 331.768501] ? process_one_work+0x25f0/0x25f0 [ 331.772999] ? INIT_BOOL+0x30/0x30 [ 331.776535] ret_from_fork+0x35/0x40 [ 331.780263] [ 331.781883] Local variable description: ----param@synaptics_detect [ 331.788198] Variable was created at: [ 331.791904] synaptics_detect+0x5d/0x2c0 [ 331.795959] psmouse_extensions+0x117e/0x3930 [ 331.800438] ================================================================== [ 331.807780] Disabling lock debugging due to kernel taint [ 331.813218] Kernel panic - not syncing: panic_on_warn set ... [ 331.813218] [ 331.820584] CPU: 1 PID: 3201 Comm: kworker/1:2 Tainted: G B 4.19.0+ #82 [ 331.828624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.837972] Workqueue: events_long serio_handle_event [ 331.843150] Call Trace: [ 331.845728] dump_stack+0x32d/0x480 [ 331.849364] panic+0x57e/0xb28 [ 331.852590] kmsan_report+0x300/0x300 [ 331.856396] __msan_warning+0x76/0xd0 [ 331.860212] synaptics_detect+0x207/0x2c0 [ 331.864366] psmouse_extensions+0x117e/0x3930 [ 331.868870] psmouse_switch_protocol+0x184/0xdc0 [ 331.873645] psmouse_connect+0x14d3/0x2380 [ 331.877900] serio_driver_probe+0xe3/0x150 [ 331.882130] ? psmouse_interrupt+0x1950/0x1950 [ 331.886791] ? serio_uevent+0x6e0/0x6e0 [ 331.890760] really_probe+0x98a/0x1410 [ 331.894655] driver_probe_device+0x1b4/0x4f0 [ 331.899068] __device_attach_driver+0x63b/0x750 [ 331.903742] bus_for_each_drv+0x28e/0x3b0 [ 331.907885] ? driver_deferred_probe_add_trigger+0x3c0/0x3c0 [ 331.913685] __device_attach+0x444/0x6d0 [ 331.917749] device_initial_probe+0x4a/0x60 [ 331.922083] bus_probe_device+0x137/0x390 [ 331.926236] device_add+0x2692/0x2c90 [ 331.930061] ? __list_add_valid+0xb8/0x480 [ 331.934302] serio_handle_event+0x1cee/0x2650 [ 331.938796] ? kmsan_set_origin+0x83/0x130 [ 331.943036] ? serio_resume+0x2b0/0x2b0 [ 331.947008] process_one_work+0x19fe/0x25f0 [ 331.951349] worker_thread+0x1601/0x2bd0 [ 331.955463] kthread+0x5e7/0x620 [ 331.958825] ? process_one_work+0x25f0/0x25f0 [ 331.963324] ? INIT_BOOL+0x30/0x30 [ 331.966865] ret_from_fork+0x35/0x40 [ 331.971544] Kernel Offset: disabled [ 331.975191] Rebooting in 86400 seconds..