[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 26.510791] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.828164] random: sshd: uninitialized urandom read (32 bytes read) [ 30.160095] random: sshd: uninitialized urandom read (32 bytes read) [ 30.958274] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. [ 36.551848] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/14 01:00:28 fuzzer started [ 38.065510] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/14 01:00:30 dialing manager at 10.128.0.26:38869 2018/09/14 01:00:31 syscalls: 1 2018/09/14 01:00:31 code coverage: enabled 2018/09/14 01:00:31 comparison tracing: enabled 2018/09/14 01:00:31 setuid sandbox: enabled 2018/09/14 01:00:31 namespace sandbox: enabled 2018/09/14 01:00:31 fault injection: enabled 2018/09/14 01:00:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/14 01:00:31 net packed injection: enabled 2018/09/14 01:00:31 net device setup: enabled [ 41.146635] random: crng init done 01:05:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) getrlimit(0x0, &(0x7f0000000000)) 01:05:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x0) 01:05:24 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000003c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000400)) 01:05:24 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000140)={0x10}, 0x10) 01:05:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000001c0)={0x0, &(0x7f0000000180), 0x0, 0xffffffffffffffff, 0xc}) 01:05:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000000)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0x0, 0x2, 0x0, 0x0, @sint}]}) [ 333.099617] IPVS: ftp: loaded support on port[0] = 21 [ 333.188031] IPVS: ftp: loaded support on port[0] = 21 [ 333.192486] IPVS: ftp: loaded support on port[0] = 21 [ 333.203787] IPVS: ftp: loaded support on port[0] = 21 [ 333.222183] IPVS: ftp: loaded support on port[0] = 21 [ 333.238231] IPVS: ftp: loaded support on port[0] = 21 [ 335.320367] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.326859] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.346122] device bridge_slave_0 entered promiscuous mode [ 335.474048] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.487537] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.498615] device bridge_slave_0 entered promiscuous mode [ 335.520330] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.526807] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.547821] device bridge_slave_1 entered promiscuous mode [ 335.581750] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.607330] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.614810] device bridge_slave_0 entered promiscuous mode [ 335.636510] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.652591] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.668383] device bridge_slave_1 entered promiscuous mode [ 335.682027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 335.699478] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.705839] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.729683] device bridge_slave_0 entered promiscuous mode [ 335.750684] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.767571] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.775079] device bridge_slave_0 entered promiscuous mode [ 335.789095] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.795457] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.809351] device bridge_slave_1 entered promiscuous mode [ 335.818682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 335.826750] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.847171] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.858327] device bridge_slave_0 entered promiscuous mode [ 335.865682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 335.886353] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.902676] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.920190] device bridge_slave_1 entered promiscuous mode [ 335.950197] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.957519] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.964979] device bridge_slave_1 entered promiscuous mode [ 335.976579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 335.986619] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.007157] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.014573] device bridge_slave_1 entered promiscuous mode [ 336.032925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.071935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 336.118678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 336.126437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.143996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 336.174668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.221222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.255838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.290163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 336.368318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.415789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.535362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.584943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.613331] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.669469] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.735833] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.749021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 336.776675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 336.800506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.822877] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.840802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.881138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 336.919374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.932048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 336.972175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 336.998609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 337.005523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.023258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.059990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 337.072023] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 337.081212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 337.090006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.099715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.108020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.118425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 337.126427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.138264] team0: Port device team_slave_0 added [ 337.144149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.238254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 337.257225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.269919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.279712] team0: Port device team_slave_0 added [ 337.301892] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.328117] team0: Port device team_slave_1 added [ 337.421509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.453258] team0: Port device team_slave_1 added [ 337.479474] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.494244] team0: Port device team_slave_0 added [ 337.522830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.543431] team0: Port device team_slave_0 added [ 337.561413] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.583476] team0: Port device team_slave_0 added [ 337.602213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.625483] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.648348] team0: Port device team_slave_1 added [ 337.665348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.677817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.686008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.694657] team0: Port device team_slave_1 added [ 337.711034] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 337.724586] team0: Port device team_slave_0 added [ 337.735899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 337.757184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.787722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.807669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.819805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.828110] team0: Port device team_slave_1 added [ 337.836416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 337.847978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 337.860583] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 337.868514] team0: Port device team_slave_1 added [ 337.873959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 337.885513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.907921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.927670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.948483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.964959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.973173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.984991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 337.994719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 338.005084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 338.024102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 338.047138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.055140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.077209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.085169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.098988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.106699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.114537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 338.123976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.131900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 338.143242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 338.154342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 338.169697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.179884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.187859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.217625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.225515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.243273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.252273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 338.260274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 338.270524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 338.291168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 338.317587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.327611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.337458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.355766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.368321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.376037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.384157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.392089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.404784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 338.420011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 338.433898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.453053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.477924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.485919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.498278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 338.506557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.528562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.555230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 338.567819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.575936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.622620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 338.638551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.657556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.683015] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.689585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.696537] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.702976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.739384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 339.757730] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.764097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.770831] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.777273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.786819] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 339.798463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.808586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.825060] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.831464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.838215] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.844590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.886354] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 340.014712] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.021162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.027905] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.034277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.050714] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 340.074619] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.081077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.087818] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.094197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.123110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 340.143510] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.149940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.156584] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.162990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.171081] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 340.857625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.868707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.895625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.903449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.732195] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.128426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.151734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.226190] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 345.268928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.374617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.411321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.617949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 345.650899] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 345.696909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 345.729212] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 345.735391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.753755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.909351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 345.958845] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 346.108181] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 346.114370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.127879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.138503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 346.162867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.185226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.217924] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 346.224170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.238281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.272043] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.410954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 346.431813] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 346.463480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.485526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.507784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.521834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.658588] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.718098] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.827586] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.913634] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.926263] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.308284] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 01:05:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x80003, 0xfb) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 01:05:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x100000000009) listen(r0, 0x0) 01:05:40 executing program 4: 01:05:41 executing program 4: 01:05:41 executing program 2: 01:05:41 executing program 4: [ 350.065141] audit: type=1326 audit(1536887141.428:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7184 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 01:05:42 executing program 0: 01:05:42 executing program 5: 01:05:42 executing program 2: 01:05:42 executing program 4: 01:05:42 executing program 3: 01:05:42 executing program 1: [ 350.843928] audit: type=1326 audit(1536887142.208:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7184 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0xffff0000 01:05:42 executing program 1: 01:05:42 executing program 5: 01:05:42 executing program 4: 01:05:42 executing program 2: 01:05:42 executing program 3: 01:05:42 executing program 0: 01:05:42 executing program 4: 01:05:42 executing program 5: 01:05:42 executing program 1: 01:05:42 executing program 3: 01:05:42 executing program 2: 01:05:42 executing program 0: 01:05:42 executing program 3: 01:05:42 executing program 4: 01:05:42 executing program 1: 01:05:42 executing program 5: 01:05:42 executing program 2: 01:05:42 executing program 0: 01:05:42 executing program 5: 01:05:42 executing program 1: 01:05:42 executing program 4: 01:05:42 executing program 0: 01:05:42 executing program 5: 01:05:42 executing program 2: 01:05:42 executing program 3: 01:05:43 executing program 1: 01:05:43 executing program 4: 01:05:43 executing program 0: 01:05:43 executing program 5: 01:05:43 executing program 3: 01:05:43 executing program 2: 01:05:43 executing program 0: 01:05:43 executing program 1: 01:05:43 executing program 3: 01:05:43 executing program 4: 01:05:43 executing program 5: 01:05:43 executing program 2: 01:05:43 executing program 1: 01:05:43 executing program 4: 01:05:43 executing program 0: 01:05:43 executing program 5: 01:05:43 executing program 3: 01:05:43 executing program 4: 01:05:43 executing program 0: 01:05:43 executing program 2: 01:05:43 executing program 1: 01:05:43 executing program 5: 01:05:43 executing program 3: 01:05:43 executing program 2: 01:05:43 executing program 1: 01:05:43 executing program 4: 01:05:43 executing program 5: 01:05:43 executing program 0: 01:05:43 executing program 3: 01:05:43 executing program 2: 01:05:43 executing program 4: 01:05:43 executing program 5: 01:05:43 executing program 0: 01:05:43 executing program 1: 01:05:43 executing program 3: 01:05:43 executing program 2: 01:05:44 executing program 0: 01:05:44 executing program 5: 01:05:44 executing program 1: 01:05:44 executing program 3: 01:05:44 executing program 4: 01:05:44 executing program 0: 01:05:44 executing program 5: 01:05:44 executing program 2: 01:05:44 executing program 1: 01:05:44 executing program 4: 01:05:44 executing program 3: 01:05:44 executing program 2: 01:05:44 executing program 0: 01:05:44 executing program 4: 01:05:44 executing program 1: 01:05:44 executing program 5: 01:05:44 executing program 3: 01:05:44 executing program 1: 01:05:44 executing program 2: 01:05:44 executing program 4: 01:05:44 executing program 3: 01:05:44 executing program 5: 01:05:44 executing program 0: 01:05:44 executing program 2: 01:05:44 executing program 3: 01:05:44 executing program 1: 01:05:44 executing program 4: 01:05:44 executing program 5: 01:05:44 executing program 1: 01:05:44 executing program 0: 01:05:44 executing program 3: 01:05:44 executing program 2: 01:05:44 executing program 5: 01:05:44 executing program 4: 01:05:44 executing program 0: 01:05:44 executing program 3: 01:05:44 executing program 2: 01:05:44 executing program 1: 01:05:45 executing program 4: 01:05:45 executing program 1: 01:05:45 executing program 5: 01:05:45 executing program 0: 01:05:45 executing program 3: 01:05:45 executing program 2: 01:05:45 executing program 5: 01:05:45 executing program 4: 01:05:45 executing program 0: 01:05:45 executing program 1: 01:05:45 executing program 3: 01:05:45 executing program 2: 01:05:45 executing program 5: 01:05:45 executing program 4: 01:05:45 executing program 1: 01:05:45 executing program 3: 01:05:45 executing program 2: 01:05:45 executing program 0: 01:05:45 executing program 5: 01:05:45 executing program 4: 01:05:45 executing program 1: 01:05:45 executing program 5: 01:05:45 executing program 2: 01:05:45 executing program 3: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) add_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000600)=@security={'security\x00', 0xe, 0x4, 0x2f0, 0x0, 0xc0, 0xc0, 0xc0, 0xc0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x4, &(0x7f0000000200), {[{{@uncond, 0x0, 0x98, 0xc0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x98, 0xd8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ip={@local, @dev, 0x0, 0x0, 'teql0\x00', 'bcsh0\x00'}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 01:05:45 executing program 0: getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 01:05:45 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000004c0), 0xc) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 01:05:45 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) setrlimit(0x0, &(0x7f0000000200)) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) accept4(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 01:05:45 executing program 5: 01:05:45 executing program 1: sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002480), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004800), &(0x7f0000000240)=0xc) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) sched_getattr(0x0, &(0x7f0000000280), 0x30, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 01:05:45 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 01:05:45 executing program 5: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) getpgrp(0x0) getuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002440)=0xe8) getresgid(&(0x7f0000002480), &(0x7f00000024c0), &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) geteuid() lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in=@rand_addr, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003180)=0xe8) getresgid(&(0x7f00000031c0), &(0x7f0000003200), &(0x7f0000003240)) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 01:05:45 executing program 0: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, {0x1, 0x400, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, "a0f41d871169c973be17da5c5ab7b0398a8cfa1af943fd688600436b678705dd"}}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) 01:05:45 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1}) 01:05:45 executing program 0: clock_gettime(0xfffffffffffffffa, &(0x7f0000001400)) getpid() r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001480)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001680)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001700)=0x14, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008200), 0x0, 0x0, &(0x7f0000008340)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008380)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008400)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008480)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008580), &(0x7f00000085c0)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008880)={&(0x7f00000014c0), 0xc, &(0x7f0000008840)={&(0x7f0000008900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000005840)) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000001440)={0x18}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000380)=""/4096, &(0x7f0000001380)=0x1000) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000240)=""/191, 0xbf, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000015c0)={0x0, {{0x2, 0x0, @dev}}}, 0xfffffd9c) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000013c0)={@rand_addr, @rand_addr}, &(0x7f0000001500)=0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000001540)='/dev/zero\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000001580), 0x12) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000300)={0x43}, 0x43) 01:05:45 executing program 3: 01:05:46 executing program 2: prctl$intptr(0x40000000002a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000100)) getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) getpgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000180)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 01:05:46 executing program 4: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) getpgid(0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getpgid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rename(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) chroot(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 01:05:46 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = getegid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, r2}, 0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r1) 01:05:46 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) geteuid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') 01:05:46 executing program 1: futex(&(0x7f00000001c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x0, &(0x7f0000000540)) getegid() getgroups(0x0, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 01:05:46 executing program 5: add_key(&(0x7f0000000400)='user\x00', &(0x7f00000007c0), &(0x7f0000000b80)='O', 0x1, 0xfffffffffffffffc) add_key(&(0x7f0000000bc0)='cifs.idmap\x00', &(0x7f0000000c00), &(0x7f0000000c40), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000a80)="df5c707871f77276bf343322a86ed9217e1e2223e4230c988f7ad453c70cfde0c3ab169dd6e1c2e4f0414c97d9e95691f537644fa112bccc9a5f171f804e8f424c78331a3b69ed78dc80846d779de0912ba00292f0bb64ed73f460554833424d171ec5d997d75ef26d0b462142d085cdc24512def76bad5850de0c0004000000000000108a3a1d24e7229a63aafbef9d02a0ae862625dc352e07c3e26277d57bf4083e019c9ca3b7645341cbf0459f89d8c17c068f2a0fa81d22b6784206ea51fb8630ff19c2607b55c82e13f589fdec1fa0e3", &(0x7f0000000840), &(0x7f0000000c80)='wlan0eth0\\\x00', 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000380)) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000900)=""/70) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) syz_execute_func(&(0x7f0000000980)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00'}) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'veth0_to_bond\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001080)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001700)={@broadcast, @broadcast}, &(0x7f0000001740)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001780)={0x0, @multicast2, @dev}, &(0x7f00000017c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001800)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000001900)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001940), &(0x7f0000001980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c80)={0x0, @rand_addr, @local}, &(0x7f0000001cc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001ec0)={@local, @broadcast}, &(0x7f0000001f00)=0xc) 01:05:46 executing program 0: prctl$intptr(0x0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getgroups(0x0, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001000)={{{@in=@loopback, @in=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001100)=0xe8) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002a00)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b00)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000002ac0)='\\\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002c40)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004300)) fstat(0xffffffffffffffff, &(0x7f0000004380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004400)) stat(&(0x7f0000004440)='./file0\x00', &(0x7f0000004480)) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005780), &(0x7f00000057c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005800)={{{@in, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005940)) stat(&(0x7f0000005980)='./file0\x00', &(0x7f00000059c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 355.612746] kasan: CONFIG_KASAN_INLINE enabled 01:05:47 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) accept4(r0, &(0x7f00000002c0)=@ax25, &(0x7f00000000c0)=0x80, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000100)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 355.661789] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 355.697761] general protection fault: 0000 [#1] PREEMPT SMP KASAN 01:05:47 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) accept4(r0, &(0x7f00000002c0)=@ax25, &(0x7f00000000c0)=0x80, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000100)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 355.704020] CPU: 1 PID: 7521 Comm: syz-executor4 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 355.712422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.721792] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 355.726812] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 355.745713] RSP: 0018:ffff88013e09f8d8 EFLAGS: 00010206 [ 355.751073] RAX: 0000000000000000 RBX: ffff88013e09f9f8 RCX: 0000000000000006 01:05:47 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) accept4(r0, &(0x7f00000002c0)=@ax25, &(0x7f00000000c0)=0x80, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000100)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 355.758345] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 355.765612] RBP: ffff88013e09f9c8 R08: ffff88013e090200 R09: fffffbfff12c24e5 [ 355.772922] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013e78e340 [ 355.780191] R13: 1ffff10027c13f20 R14: 0000000000000000 R15: ffff88013e09fadc [ 355.787457] FS: 00007fb1bb41e700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 355.795680] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 355.801562] CR2: 0000000020000080 CR3: 00000001c03d8000 CR4: 00000000001406e0 [ 355.808839] Call Trace: 01:05:47 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) accept4(r0, &(0x7f00000002c0)=@ax25, &(0x7f00000000c0)=0x80, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000100)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:05:47 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) accept4(r0, &(0x7f00000002c0)=@ax25, &(0x7f00000000c0)=0x80, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000100)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 355.811435] ? user_get_super+0x250/0x250 [ 355.815669] ? down_write+0x8a/0x130 [ 355.819395] ? do_umount_root+0x218/0x320 [ 355.823549] ? down_read+0x120/0x120 [ 355.827267] do_umount_root+0x2b1/0x320 [ 355.831258] ? namespace_unlock+0x210/0x210 [ 355.835588] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 355.841165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.846714] ? ns_capable_common+0x13f/0x170 [ 355.851132] ksys_umount+0x8b6/0x1230 [ 355.854953] ? kfree+0xcf/0x230 [ 355.858230] ? ksys_mount+0xa3/0x140 [ 355.861958] ? __x64_sys_mount+0xbe/0x150 [ 355.866107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.871479] ? __detach_mounts+0x430/0x430 [ 355.875716] ? do_raw_spin_unlock+0xa7/0x2f0 [ 355.880140] ? trace_hardirqs_on_caller+0x310/0x310 [ 355.885201] ? kasan_check_write+0x14/0x20 [ 355.889449] ? trace_hardirqs_off+0xb8/0x310 [ 355.893861] ? kfree+0x107/0x230 [ 355.897242] ? kfree+0x107/0x230 [ 355.900619] ? lockdep_hardirqs_on+0x421/0x5c0 [ 355.905223] ? trace_hardirqs_on+0xbd/0x310 [ 355.909547] ? __x64_sys_futex+0x47f/0x6a0 [ 355.913796] ? do_syscall_64+0x9a/0x820 [ 355.917770] ? do_syscall_64+0x9a/0x820 [ 355.921749] ? lockdep_hardirqs_on+0x421/0x5c0 [ 355.926334] ? trace_hardirqs_on+0xbd/0x310 [ 355.930663] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.936046] ? trace_hardirqs_off_caller+0x300/0x300 [ 355.941168] ? ksys_mount+0xa8/0x140 [ 355.944885] __x64_sys_umount+0x54/0x80 [ 355.948861] do_syscall_64+0x1b9/0x820 [ 355.952750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 355.958153] ? syscall_return_slowpath+0x5e0/0x5e0 [ 355.963097] ? trace_hardirqs_off+0x310/0x310 [ 355.967596] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 355.972611] ? recalc_sigpending_tsk+0x180/0x180 [ 355.977383] ? kasan_check_write+0x14/0x20 [ 355.981626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.986471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.991653] RIP: 0033:0x4572d9 [ 355.994872] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.013815] RSP: 002b:00007fb1bb41dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 356.021525] RAX: ffffffffffffffda RBX: 00007fb1bb41e6d4 RCX: 00000000004572d9 [ 356.028800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 356.036095] RBP: 0000000000930280 R08: 0000000000000000 R09: 0000000000000000 [ 356.043364] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 356.050633] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000003 [ 356.057921] Modules linked in: 01:05:47 executing program 2: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") getsockname(0xffffffffffffff9c, &(0x7f00000006c0)=@pppol2tp, &(0x7f0000000080)=0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002f80)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000002fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000008c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)='/dev/full\x00'}, 0xffffffffffffff68) syz_open_procfs(0x0, &(0x7f0000000740)='numa_maps\x00') gettid() clock_nanosleep(0x0, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000600)) openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) setpriority(0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @multicast2}, &(0x7f0000000180)=0xc) clock_gettime(0x0, &(0x7f0000000840)) rt_sigtimedwait(&(0x7f0000000800), 0x0, &(0x7f0000000880), 0x8) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000380)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000400), &(0x7f0000000440)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) [ 356.061988] kobject: 'loop3' (0000000025919370): kobject_uevent_env [ 356.072979] kobject: 'loop3' (0000000025919370): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 356.083095] kobject: 'loop0' (000000006467f0ef): kobject_uevent_env [ 356.087152] ---[ end trace e6bd115e18b86625 ]--- [ 356.089619] kobject: 'loop0' (000000006467f0ef): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 356.104296] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 356.116169] kobject: 'loop2' (000000003e9df5d5): kobject_uevent_env [ 356.117221] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 356.127413] kobject: 'loop2' (000000003e9df5d5): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 356.197103] RSP: 0018:ffff88013e09f8d8 EFLAGS: 00010206 [ 356.218528] RAX: 0000000000000000 RBX: ffff88013e09f9f8 RCX: 0000000000000006 [ 356.242973] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 356.260243] RBP: ffff88013e09f9c8 R08: ffff88013e090200 R09: fffffbfff12c24e5 [ 356.277593] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013e78e340 [ 356.299339] R13: 1ffff10027c13f20 R14: 0000000000000000 R15: ffff88013e09fadc [ 356.326685] kobject: 'loop1' (000000001d74049e): kobject_uevent_env [ 356.333476] kobject: 'loop1' (000000001d74049e): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 356.385711] FS: 00007fb1bb41e700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 356.388146] kobject: 'loop5' (0000000091c3893d): kobject_uevent_env [ 356.402092] kobject: 'loop5' (0000000091c3893d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 356.415180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 356.421613] CR2: 00007f540b6d1ea0 CR3: 00000001c03d8000 CR4: 00000000001406f0 [ 356.429027] Kernel panic - not syncing: Fatal exception [ 356.435405] Kernel Offset: disabled [ 356.439027] Rebooting in 86400 seconds..