Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. [ 69.689167] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 09:06:38 fuzzer started [ 74.238909] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 09:06:43 dialing manager at 10.128.0.26:36867 2018/10/08 09:06:43 syscalls: 1 2018/10/08 09:06:43 code coverage: enabled 2018/10/08 09:06:43 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 09:06:43 setuid sandbox: enabled 2018/10/08 09:06:43 namespace sandbox: enabled 2018/10/08 09:06:43 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 09:06:43 fault injection: enabled 2018/10/08 09:06:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 09:06:43 net packed injection: enabled 2018/10/08 09:06:43 net device setup: enabled [ 80.339029] random: crng init done 09:08:43 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000007fed)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x0) [ 197.543946] IPVS: ftp: loaded support on port[0] = 21 [ 200.186461] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.193040] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.201644] device bridge_slave_0 entered promiscuous mode [ 200.345600] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.352085] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.360705] device bridge_slave_1 entered promiscuous mode [ 200.504291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.647937] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:08:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x80003, 0x2000000080) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x4000000000001c8, 0x22, 0x0) [ 201.091284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.338253] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.601001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.608211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.830838] IPVS: ftp: loaded support on port[0] = 21 [ 201.854839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.861860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.430022] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.438236] team0: Port device team_slave_0 added [ 202.594154] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.602234] team0: Port device team_slave_1 added [ 202.880060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.887277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.896279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.107234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.114799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.123817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.311753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.319562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.328921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.511835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.519612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.528962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.690154] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.696768] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.705463] device bridge_slave_0 entered promiscuous mode [ 205.874202] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.880675] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.889352] device bridge_slave_1 entered promiscuous mode [ 206.060304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.170138] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.176718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.183764] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.190230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.199259] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.335618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.662631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.944915] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:08:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="3b00000002"]}) [ 207.189883] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.509943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.518853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.827568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.834806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.030027] IPVS: ftp: loaded support on port[0] = 21 [ 208.749695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.757894] team0: Port device team_slave_0 added [ 209.040784] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.049136] team0: Port device team_slave_1 added [ 209.392734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.399824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.408789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.754665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.762263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.771224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.024422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.032204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.041628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.429168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.436987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.446079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.048047] ip (6616) used greatest stack depth: 53056 bytes left [ 212.686908] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.693604] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.701916] device bridge_slave_0 entered promiscuous mode [ 212.927535] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.934102] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.942749] device bridge_slave_1 entered promiscuous mode [ 213.265526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.550625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.926845] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.933454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.940376] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.946954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.955862] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.232728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.660947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.988054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.298176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.307841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.548595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.556168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:09:02 executing program 3: r0 = socket$inet6(0xa, 0x21000000000002, 0x0) ioctl(r0, 0x800008912, &(0x7f0000000040)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0x4140, &(0x7f0000001f64)) [ 216.522922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.531078] team0: Port device team_slave_0 added [ 216.911368] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.919629] team0: Port device team_slave_1 added [ 217.015255] IPVS: ftp: loaded support on port[0] = 21 [ 217.238774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.245942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.254900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.555725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.562993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.571796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.979154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.986903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.996243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.307705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.315481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.324782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.346128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.711210] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.141781] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.148358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.156531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.381232] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.387794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.394811] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.401551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.410552] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.494916] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.139657] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.146602] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.155187] device bridge_slave_0 entered promiscuous mode [ 223.222847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.607997] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.614662] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.623274] device bridge_slave_1 entered promiscuous mode [ 223.970507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.328515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.522928] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.879209] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.265388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.272608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.638022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.645243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:09:13 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000440)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 227.879263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.887800] team0: Port device team_slave_0 added [ 228.392666] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.400896] team0: Port device team_slave_1 added [ 228.486227] IPVS: ftp: loaded support on port[0] = 21 [ 228.881809] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.889043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.898294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.319737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.326995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.336121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.905727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.913419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.922570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.022242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.409605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.417520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.427010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.815428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:09:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000007fed)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x0) [ 233.275680] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.282094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.290108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:09:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000019c0)=[{0x10}], 0x10}, 0x0) 09:09:21 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x28200, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009fe8)={0xfffb, 0x1a, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r1, 0x0) [ 234.312742] x86/PAT: syz-executor0:7113 map pfn RAM range req write-combining for [mem 0x147670000-0x147673fff], got write-back [ 234.378257] x86/PAT: syz-executor0:7114 map pfn RAM range req write-combining for [mem 0x147670000-0x147673fff], got write-back 09:09:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="1aff1321", 0x4, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @loopback}, 0x10) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) r1 = gettid() sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x6a3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000180)=0x1, 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 235.051705] 8021q: adding VLAN 0 to HW filter on device team0 09:09:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000140)={0x8, 0x319, 0xffc}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) sendmsg$key(r0, &(0x7f00000000c0)={0x1000000efffffff, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000e2000000200006ae000e40000000000010000000800120002000200000000000000000030000000020300000000000f4b48000002000000000000009cab000000000001020000000020000000000000000008000300050000000000020000f3df0000210000000002000000"], 0x80}}, 0x0) [ 235.385360] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.391846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.398956] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.405497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.414206] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.420789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:09:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 236.077704] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.084353] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.093039] device bridge_slave_0 entered promiscuous mode 09:09:23 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x8, {0x2}}, 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) [ 236.562280] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.569080] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.577695] device bridge_slave_1 entered promiscuous mode [ 237.086884] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 09:09:24 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x40) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) waitid(0x1, 0x0, &(0x7f00000000c0), 0x1000000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x5, 0x4) write$P9_RLCREATE(r0, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x40, 0x1, 0x2}, 0x10000000000000}}, 0x18) ioctl$RTC_WIE_ON(r0, 0x700f) [ 237.543527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.680274] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.051337] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.493265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.500399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.691607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.790418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 239.797750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.700838] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.709284] team0: Port device team_slave_0 added [ 240.771526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.028839] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 241.037353] team0: Port device team_slave_1 added [ 241.410232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 241.417584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.426450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.707903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 241.715165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.723902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.834074] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.840785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.848762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.061915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 242.069636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.078675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.365673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 242.373391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.382270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.871959] 8021q: adding VLAN 0 to HW filter on device team0 09:09:30 executing program 1: [ 245.475232] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.481729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.488792] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.495333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.503918] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.510513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.058198] 8021q: adding VLAN 0 to HW filter on device bond0 09:09:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000002d80)=""/4096, 0x1000}], 0x1) write$binfmt_elf64(r1, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x263) [ 248.433298] hrtimer: interrupt took 64836 ns [ 248.869933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.412556] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.419006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.427092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.984460] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.471051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.017577] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:09:40 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8911, &(0x7f0000000000)='tunl0\x00') [ 253.583271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.589680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.597779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.947068] 8021q: adding VLAN 0 to HW filter on device team0 09:09:43 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0x430800, 0x108) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r1 = socket(0x11, 0x2, 0x9) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'syz_tun\x00', {0x2, 0x4e22, @multicast1}}) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'lo\x00', 0x200}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r5, 0x200, 0x8}, 0xc) r6 = getuid() getresgid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) fchown(r4, r6, r7) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) 09:09:43 executing program 0: r0 = socket$inet6(0xa, 0x100000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r3 = getuid() read(r0, &(0x7f0000000580)=""/132, 0x84) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000400)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="c073613f09f544de59b8c0e58b1193dcbfcfec987f6041f79b93efc7179c023e893fb06c2e382bd95fff5c837e89eb185b2c34611bbf27d6ddbe3f214d70a7a2a52b6fe77b09f3a46a676908c777fdcf209a93f49bd6a5e0542d697d817b82c1b98d58de2040dfeff11adbef45d02f9a9f9b0bfab2e83877f64b37bdb83d35659d17f2f21f7d2c8da52d9bea7e54f5aee76f86f0bac3cae6620ea51c4ccca6f72cbc92cd433132275c1c51f7a186682e668356525b26a61fd53aa8cae0bf7eac6a392666267732f9c526a0317d4054d7aeed574ea4fc4688330e12620f4b5ce34350a543874b20de79d8516f9eb63e476d6ba27d261760", 0xf7}], 0x1, &(0x7f0000000380)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}], 0x70, 0x4000}, 0x4000040) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000440)=""/213, &(0x7f0000000540)=0xd5) sendto$inet6(r0, &(0x7f0000000300), 0xfffffffffffffe04, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 09:09:43 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffff, 0x2) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x8, 0xff, 0xff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)={{0x2, 0x7f}, 0x1, 0xb1, 0x6, {}, 0x1, 0x6}) fstat(r0, &(0x7f0000000140)) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'ipddp0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000004c0)={@mcast2, 0x0}, &(0x7f0000000500)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'ip_vti0\x00', 0x0}) r8 = accept4$packet(r0, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x80000) accept$packet(r1, &(0x7f0000003300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007b40)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008940)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000008a40)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000008a80)={'veth0_to_bridge\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008ac0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000008bc0)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000009000)={0x0, @empty, @loopback}, &(0x7f0000009040)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000009080)={@remote, 0x0}, &(0x7f00000090c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000009640)={@loopback, @multicast2, 0x0}, &(0x7f0000009680)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000009b00)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000009b40)={@empty, @local, 0x0}, &(0x7f0000009b80)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000009bc0)={@remote, 0x0}, &(0x7f0000009c00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000a180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f000000a140)={&(0x7f0000009c40)={0x4c4, r2, 0x0, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x84, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffe1}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r6}, {0xf8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xd51}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r9}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8, 0x1, r12}, {0x104, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x22d0}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x84, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2000000000000000}}}]}}]}, 0x4c4}, 0x1, 0x0, 0x0, 0x91a1dfb26887e87b}, 0x4000000) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f000000a1c0)={'team_slave_0\x00', {0x2, 0x4e21, @broadcast}}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f000000a200)=0x7) flistxattr(r1, &(0x7f000000a240)=""/205, 0xcd) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f000000a340)={0x0, 0x5}, &(0x7f000000a380)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f000000a3c0)={r21, @in6={{0xa, 0x4e22, 0x0, @mcast1}}, 0x6, 0xaa6, 0x4a, 0x400, 0x1}, &(0x7f000000a480)=0x98) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000a4c0)={{{@in6=@mcast2, @in=@local, 0x4e22, 0x2, 0x4e20, 0x0, 0xa, 0x20, 0x0, 0x87, r14, r5}, {0x3, 0x3, 0xffffffffffffff80, 0xa61, 0x2, 0x0, 0x6, 0x3}, {0x1, 0xffffffffffff7fff, 0x3f, 0x7}, 0x7, 0x6e6bb7, 0x3, 0x0, 0x1, 0x3}, {{@in=@local, 0x4d2, 0x2b}, 0x2, @in=@multicast1, 0x3504, 0x0, 0x1, 0x0, 0x8, 0x1, 0x3}}, 0xe8) 09:09:43 executing program 2: r0 = memfd_create(&(0x7f0000000240)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0xfffffffffffffffe) 09:09:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f6e65742f74756eff", 0x241, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_type(r0, &(0x7f00000008c0)="746872656164656406", 0x9) 09:09:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"38f32b01fa96cf727edb403aa628cd6e"}}}}, 0x90) 09:09:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) close(r1) 09:09:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') [ 257.028176] device lo entered promiscuous mode 09:09:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x8}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x2e8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)="7965616800992ba5bd7a6b", 0xb) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) [ 257.173010] device lo left promiscuous mode 09:09:44 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x0, r0+10000000}, 0x8) r1 = getpid() clock_gettime(0x0, &(0x7f0000003d40)) r2 = socket(0x10, 0x802, 0x0) rt_sigtimedwait(&(0x7f0000000440), 0x0, &(0x7f0000000480)={0x77359400}, 0x8) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) ptrace(0x10, r1) ptrace$poke(0x4, r1, &(0x7f0000003f80), 0x4) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f00000001c0)=0x40) 09:09:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00/\x00\x00\x00'], 0x1) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x14088) 09:09:44 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x6, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0x430800, 0x108) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r1 = socket(0x11, 0x2, 0x9) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'syz_tun\x00', {0x2, 0x4e22, @multicast1}}) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'lo\x00', 0x200}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r5, 0x200, 0x8}, 0xc) r6 = getuid() getresgid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) fchown(r4, r6, r7) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) 09:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r1, &(0x7f0000000480), 0x20000000000002af, 0x6000000) [ 257.760673] sctp: failed to load transform for md5: -2 09:09:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x8}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x2e8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)="7965616800992ba5bd7a6b", 0xb) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) [ 258.052531] device lo entered promiscuous mode [ 258.378609] IPVS: ftp: loaded support on port[0] = 21 [ 259.834895] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.841338] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.849644] device bridge_slave_0 entered promiscuous mode [ 259.927522] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.934028] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.941559] device bridge_slave_1 entered promiscuous mode [ 260.018988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 260.097175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 260.337178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.420133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.572899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 260.579858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.814539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.822208] team0: Port device team_slave_0 added [ 260.900459] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.908734] team0: Port device team_slave_1 added [ 260.987291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.069728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.148546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.155879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.165131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.244745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.252122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.261549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.123460] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.129876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.136882] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.143371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.151228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.522835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.352834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.652149] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.945551] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.951786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.959809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.253164] 8021q: adding VLAN 0 to HW filter on device team0 09:09:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680), 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0xd6, &(0x7f0000000480)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e"}, 0x30) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000000), 0x1000000000000241}, 0x0) 09:09:55 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000b00)=[{{&(0x7f0000000600)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)=[{0x10, 0x10d, 0xf08}], 0x10}}], 0x1, 0x80) 09:09:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0xfffffffffffffffe) 09:09:55 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000440)}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000002d80)=""/4096, 0x1000}], 0x1) write$binfmt_elf64(r1, &(0x7f00000010c0)=ANY=[@ANYBLOB="7f454c46000101000100000000000000000006003f00001012030000000000004000000000000000a90200000007000008000000000000000008000000007f000000000018000000ff7f00000000000006000000000000000800000000000000cb00000000000000020012a500000000f90c000000a7311fd69fbc823144b8367127210bcdbe1f845afa95c8b7a03daee20e7aa231a773d700000000000000000000000000000000000000000000000000000000000000000000000000000000ec3329432e12309f1300000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000d968c91dd1bacc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000085d99d57bd98c0de6ee653042f6a4e12275e06bfb1a5d6fb446c30e40ed9e916141fc67a035f9cf8b9b6eaae40711a3fa3158ad3e37d193b62a5044d02a5f41b1434e6eb8582bf7632eebaeb52f5b654cecebd7805f5292e9335c763ea6009e3f3b1000000cbb349bfa9809fa10b8135141ade"], 0x263) 09:09:55 executing program 1: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000280)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x7}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, 0x6e) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:09:55 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_bt(r0, 0x541b, &(0x7f0000000040)) [ 268.382156] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 09:09:55 executing program 3: [ 268.592191] ================================================================== [ 268.599723] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 268.606330] CPU: 0 PID: 8046 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #63 [ 268.613538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.622904] Call Trace: [ 268.625526] dump_stack+0x306/0x460 [ 268.629193] ? _raw_spin_lock_irqsave+0x227/0x340 [ 268.634066] ? vmx_create_vcpu+0x10df/0x7920 [ 268.638519] kmsan_report+0x1a3/0x2d0 [ 268.642394] __msan_warning+0x7c/0xe0 [ 268.646240] vmx_create_vcpu+0x10df/0x7920 [ 268.650509] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.655422] ? __msan_poison_alloca+0x17a/0x210 [ 268.660167] ? vmx_vm_init+0x340/0x340 [ 268.664087] kvm_arch_vcpu_create+0x25d/0x2f0 [ 268.668627] kvm_vm_ioctl+0x13fd/0x33d0 [ 268.672665] ? __msan_poison_alloca+0x17a/0x210 [ 268.677392] ? do_vfs_ioctl+0x18a/0x2810 [ 268.681481] ? __se_sys_ioctl+0x1da/0x270 [ 268.685676] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.690579] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.695457] do_vfs_ioctl+0xcf3/0x2810 [ 268.699411] ? security_file_ioctl+0x92/0x200 [ 268.703957] __se_sys_ioctl+0x1da/0x270 [ 268.707975] __x64_sys_ioctl+0x4a/0x70 [ 268.711893] do_syscall_64+0xbe/0x100 [ 268.715736] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.720952] RIP: 0033:0x457579 [ 268.724178] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.743129] RSP: 002b:00007f90b51efc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.750888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 268.758193] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 268.765494] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 268.772801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90b51f06d4 [ 268.780103] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 268.787439] [ 268.789106] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 268.796081] Variable was created at: [ 268.799846] vmx_create_vcpu+0xd5/0x7920 [ 268.803958] kvm_arch_vcpu_create+0x25d/0x2f0 [ 268.808473] ================================================================== [ 268.815860] Disabling lock debugging due to kernel taint [ 268.821349] Kernel panic - not syncing: panic_on_warn set ... [ 268.821349] [ 268.828776] CPU: 0 PID: 8046 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #63 [ 268.837379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.846766] Call Trace: [ 268.849427] dump_stack+0x306/0x460 [ 268.853113] panic+0x54c/0xafa [ 268.856428] kmsan_report+0x2cd/0x2d0 [ 268.860288] __msan_warning+0x7c/0xe0 [ 268.864162] vmx_create_vcpu+0x10df/0x7920 [ 268.868453] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.873337] ? __msan_poison_alloca+0x17a/0x210 [ 268.878139] ? vmx_vm_init+0x340/0x340 [ 268.882089] kvm_arch_vcpu_create+0x25d/0x2f0 [ 268.886620] kvm_vm_ioctl+0x13fd/0x33d0 [ 268.890639] ? __msan_poison_alloca+0x17a/0x210 [ 268.895360] ? do_vfs_ioctl+0x18a/0x2810 [ 268.899460] ? __se_sys_ioctl+0x1da/0x270 [ 268.903651] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.908526] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 268.913412] do_vfs_ioctl+0xcf3/0x2810 [ 268.917362] ? security_file_ioctl+0x92/0x200 [ 268.921920] __se_sys_ioctl+0x1da/0x270 [ 268.925947] __x64_sys_ioctl+0x4a/0x70 [ 268.929869] do_syscall_64+0xbe/0x100 [ 268.933705] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.938929] RIP: 0033:0x457579 [ 268.942157] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.961088] RSP: 002b:00007f90b51efc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.968839] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 268.976142] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 268.983446] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 268.990740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90b51f06d4 [ 268.998033] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 269.006396] Kernel Offset: disabled [ 269.010061] Rebooting in 86400 seconds..