[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 63.016907] sshd (6234) used greatest stack depth: 53216 bytes left [....] Starting OpenBSD Secure Shell server: sshd[ 63.202349] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 65.414637] random: sshd: uninitialized urandom read (32 bytes read) [ 65.999536] random: sshd: uninitialized urandom read (32 bytes read) [ 67.708537] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. [ 73.492533] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 10:52:50 fuzzer started [ 78.206241] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 10:52:55 dialing manager at 10.128.0.26:39089 2018/10/11 10:52:55 syscalls: 1 2018/10/11 10:52:55 code coverage: enabled 2018/10/11 10:52:55 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 10:52:55 setuid sandbox: enabled 2018/10/11 10:52:55 namespace sandbox: enabled 2018/10/11 10:52:55 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 10:52:55 fault injection: enabled 2018/10/11 10:52:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 10:52:55 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 10:52:55 net device setup: enabled [ 85.234519] random: crng init done 10:54:56 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 202.503403] IPVS: ftp: loaded support on port[0] = 21 [ 203.914680] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.921234] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.930050] device bridge_slave_0 entered promiscuous mode [ 204.093772] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.100271] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.109171] device bridge_slave_1 entered promiscuous mode [ 204.254685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.397179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.855840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.008387] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.297293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.304563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:55:00 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)={0x0, 0x0, {0xffffffffffffffff}}) sched_yield() getuid() getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffff8, 0x6, 0x1a2abc2d, 0x7ff, 0x9, 0x0, 0x3f, 0x3f, 0x10f, 0x38, 0x1dc, 0x2, 0x0, 0x20, 0x1, 0x80, 0x1, 0x3}, [{0x4, 0x0, 0x0, 0x0, 0x3ff, 0x2, 0x6, 0x3f}], "", [[], [], [], [], [], []]}, 0x658) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000200)={0x0, 0x0, 0x6}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0x0, @reserved}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10062100, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000000), &(0x7f0000000080)) [ 205.752737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.760987] team0: Port device team_slave_0 added [ 206.065330] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.073692] team0: Port device team_slave_1 added [ 206.269191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.553322] IPVS: ftp: loaded support on port[0] = 21 [ 206.556125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.565818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.574738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.830172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.838034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.847515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.000910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.009438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.018848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.837596] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.844180] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.852983] device bridge_slave_0 entered promiscuous mode [ 209.064802] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.071316] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.080032] device bridge_slave_1 entered promiscuous mode [ 209.375283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.497009] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.503655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.510731] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.517428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.526938] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.583384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.311467] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.341950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.628922] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.920723] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.928057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.266411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.273703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:55:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000200)) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 212.178994] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.187556] team0: Port device team_slave_0 added [ 212.510119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.518509] team0: Port device team_slave_1 added [ 212.769134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.776468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.785748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.916227] IPVS: ftp: loaded support on port[0] = 21 [ 213.080661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.093416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.102821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.456820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.464631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.473893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.806757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 213.814734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.823853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.498417] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.505159] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.514057] device bridge_slave_0 entered promiscuous mode [ 215.806555] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.813139] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.821957] device bridge_slave_1 entered promiscuous mode [ 216.165258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.501271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.182006] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.188534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.195646] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.202210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.211219] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.571529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.900541] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.934918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.155195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 218.162395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.430682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.437912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.164780] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.173261] team0: Port device team_slave_0 added [ 219.537818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.546092] team0: Port device team_slave_1 added [ 219.839880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.847151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.856239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.112915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.120144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.129479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.352381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.360312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.369517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:55:15 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f00000001c0), 0x1000000000000172, 0x2000107c) [ 220.765673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.773427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.783036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.090085] IPVS: ftp: loaded support on port[0] = 21 [ 222.108557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.562913] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.588286] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.594878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.602004] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.608490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.617442] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.922305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.099785] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.108106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.116437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.854138] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.860647] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.869618] device bridge_slave_0 entered promiscuous mode [ 226.296816] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.303561] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.312412] device bridge_slave_1 entered promiscuous mode [ 226.474405] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.668473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.037261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.124829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.499428] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.900288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.907588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.296451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.303790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.443609] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.452054] team0: Port device team_slave_0 added [ 230.837005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.845512] team0: Port device team_slave_1 added [ 231.266475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.273743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.283085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.533262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.682309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.721815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.730970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 10:55:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000100)="24000000070a07031dfffd946fa2830020200a0009000200021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 232.086462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.096727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.106085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.514882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.522726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.532074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.123413] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.819550] IPVS: ftp: loaded support on port[0] = 21 [ 234.786374] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.792963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.801266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.620694] 8021q: adding VLAN 0 to HW filter on device team0 10:55:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000002, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f00000000c0)={0x0, @empty, 0x0, 0x0, "776c63000000000000008800"}, 0x2c) 10:55:32 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000005200)=[{{&(0x7f0000002700)=@can, 0x80, &(0x7f0000004b80)=[{&(0x7f0000002780)=""/152, 0x98}, {&(0x7f00000048c0)=""/150, 0x96}], 0x2, &(0x7f0000004c40)=""/65, 0x41}}], 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x2ce, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 237.716481] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.723078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.730058] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.736673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.745476] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 10:55:32 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='trustedselinuxtrusted[#ppp0bdevcpuset^+security#+cpuset\x00', &(0x7f00000003c0)='\x00'], &(0x7f0000000600)=[&(0x7f0000000440)='/dev/input/mice\x00', &(0x7f0000000480)=',\x00', &(0x7f00000004c0)='security@posix_acl_accesswlan0{ppp0)+vmnet0\x00', &(0x7f0000000500)='mime_typeusercpuset,)wlan0mime_typeeth1selinux&bdev&procbdevposix_acl_accessloem1\x00', &(0x7f0000000580)='/dev/input/mice\x00', &(0x7f00000005c0)='\x00']) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x2488, 0x1000, 0x3, 0x5, 0x5, 0x5, 0x4, 0x2, 0x3, 0x7ff, 0xfff, 0x5e, 0x3, 0x101, 0x2]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) r3 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0xfffffffffffffffd, 0x1, 0x3, 0xfffffffffffffffb, r2}, 0x10) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="ba0200000003000000e99f7b", 0xc}], 0x1, &(0x7f0000000100)}, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) [ 237.821992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:55:33 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='trustedselinuxtrusted[#ppp0bdevcpuset^+security#+cpuset\x00', &(0x7f00000003c0)='\x00'], &(0x7f0000000600)=[&(0x7f0000000440)='/dev/input/mice\x00', &(0x7f0000000480)=',\x00', &(0x7f00000004c0)='security@posix_acl_accesswlan0{ppp0)+vmnet0\x00', &(0x7f0000000500)='mime_typeusercpuset,)wlan0mime_typeeth1selinux&bdev&procbdevposix_acl_accessloem1\x00', &(0x7f0000000580)='/dev/input/mice\x00', &(0x7f00000005c0)='\x00']) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x2488, 0x1000, 0x3, 0x5, 0x5, 0x5, 0x4, 0x2, 0x3, 0x7ff, 0xfff, 0x5e, 0x3, 0x101, 0x2]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) r3 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0xfffffffffffffffd, 0x1, 0x3, 0xfffffffffffffffb, r2}, 0x10) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="ba0200000003000000e99f7b", 0xc}], 0x1, &(0x7f0000000100)}, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) [ 238.274467] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.280980] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.289783] device bridge_slave_0 entered promiscuous mode 10:55:33 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) lseek(r1, 0x4, 0x0) fcntl$notify(r0, 0x402, 0x28) [ 238.737000] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.744348] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.753098] device bridge_slave_1 entered promiscuous mode [ 239.155194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 10:55:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73d41196c3cdf8311cfc093a52a7d10000", 0x20) r1 = socket(0x1, 0x8000e, 0x2) recvmsg$kcm(r1, &(0x7f0000003780)={&(0x7f0000003180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0xfffffe8a, &(0x7f00000036c0)=[{&(0x7f0000003200)=""/249, 0xf9}, {&(0x7f0000000000)=""/95, 0x5f}], 0x2f0, &(0x7f0000003740)=""/31, 0x1f}, 0xfffffffffffffffd) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000003b80)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="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", 0x169}], 0x1, &(0x7f0000000000)}, 0x0) recvmmsg(r2, &(0x7f0000002480), 0x871, 0x0, &(0x7f00000001c0)={0x77359400}) [ 239.523876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 10:55:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000ec0)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/34, 0x22}], 0x1, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000140100000c000000080000000000000018000000000000001401000002000000050000000600000000000000000000001401000003000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00', @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="1800000000000000584c5cbce700000014010000060000000000000000000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffedc, 0x800}, 0x0) 10:55:35 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x410080, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="c26e42cb3c95c1318c8796caea0d0ef120eda44b5d99820d84823dc52a25dcb54914c6f4c00fbd50eec0b2116fb4b1c478faf9b37807c51a649ccaf3fc1d27d7b978db4ff68292b3059f424b6655d20a3fa5e4074e9aa5c6bcf46c33497de87ece0516e718f87e84305d82288d5fd62786efe52aff041d02761e07cb08c0c21f31ed99a9279c06faae85d8c4ec2fe1950b63c71c3f61c76b75661e83770138f4774c2d9a3fbe2dfaddc7f5389074ac16c16cdf8c23def212dddc725d0c649cedbedeab2a41a8d7"], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000038000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000000)) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000000c0)=0x5) [ 240.877791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 241.246514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.671741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.678850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.127528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 242.136914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.264137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.696649] mmap: syz-executor0 (7135) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 243.458129] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.466810] team0: Port device team_slave_0 added [ 243.928207] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.937124] team0: Port device team_slave_1 added [ 243.944610] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.419558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 244.426812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.435993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.870892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.878187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.887329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.320269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.328148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.337355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.591676] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.598104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.606167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.699182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.707071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.716335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.772767] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.232753] hrtimer: interrupt took 64641 ns 10:55:42 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000001340)=""/155, 0x9b}], 0x1, &(0x7f00000042c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003100)={0x0, 0x1c9c380}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006a00)={&(0x7f0000000040), 0xc, &(0x7f00000069c0)={&(0x7f0000006500)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 249.023491] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.030006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.037134] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.044173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.053280] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.059931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.047589] 8021q: adding VLAN 0 to HW filter on device bond0 10:55:47 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) exit(0x5) userfaultfd(0x0) lremovexattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', "0a1700"}) ioctl$VT_WAITACTIVE(r0, 0x5607) io_submit(0x0, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x0, 0x81c, 0x6, 0x0, 0x0, 0x5}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000540), &(0x7f0000000580)=0xfffffffffffffcb1) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000340)=0x8) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xfe1, 0x3d1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000380)={r3, 0xe9be}, &(0x7f00000003c0)=0x8) add_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="95b8044c7e9b7b0b8e073be2a335940939feaff31e0e59f1a71aad0d1b0abd1f093f8112037ed5b4cbe248bdc5697127031f881bb7734f006ee61d9b0ac3378d08abe4ec79f848ff5d2e409e4dfc0b438f6d2a094b78697ec647e1e3f01c33073d7edd05336e26e6b02dc0f0a36b55c1efbae1e6bfab4b1d642e87a936a210fce82bca5b94b3388c77e9740527db7a78dcd2dfb7eee986f58fa6dc9986babe24bda951", 0xa3, 0xfffffffffffffff9) add_key(&(0x7f0000000780)='.request_key_auth\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="aa0bc6199df4a4142fbb908ec7c116a878733cc422dff5e5e7d27587a500074f35f895d780e7a79482e7c5c775afeeeffc536ab63a168d3145609354efc880270c22102deb40e6bace9140e9014520ab480f9191f08e87b0bfd59ba95a9cbc557150cd47a9906647f49fe0b3be9964747662217c66d29c710c26f8c12128e4de6e7a48efa69032b44e11a64aad4190d3863c87afaa6dd8d3f512effb59f8063a705b673a68d480a26333d991185032023bfbe93defc097d5d3", 0xb9, 0xfffffffffffffffe) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000400)) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000005c0)) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x100000001) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000600)=0x2, 0x4) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x1}, 0x8) [ 252.853497] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.195269] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.201858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.209790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.786516] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.124706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.695837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.267110] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.273652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.281800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:55:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='comm\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 258.843719] 8021q: adding VLAN 0 to HW filter on device team0 10:55:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\b\x00', 0xfd}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={"6c6f0000001800"}) 10:55:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141048, 0x0) close(r0) read$FUSE(r0, &(0x7f0000000240), 0x139c) 10:55:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket(0xf59a867dc49c04aa, 0x0, 0x6) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x808, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x287}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x8000) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r3, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0xfffffffffffffff9, 0x8000, "99157d9eec968b1de9bd42f712289663bfbe6130c9fb13b532e1c0a0602b516a39abf1fe6abaebc37b5b06466e496a8ea0bfd8ab3382ee57318a3f59a403ef", 0x11}, 0x80) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r2, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff38}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004084}, 0x40) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000340)="341b8a77c3764b9aece9aa61f92de543eadfd5cd9a28a4708d7881f01208b6a702642f66267e2c3011c8c5cd9a0d656d796c0252ee04b818527adbc7786072", 0x3f) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r5, 0x4040ae70, &(0x7f00000003c0)={0x100000000, 0x3, 0x1, 0x200}) time(&(0x7f0000000400)) sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @multicast2}, 0x3, 0x1, 0x1, 0x3}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000004c0)="fc6db9db1e370fd3f3f258ebe6ecfc38776f970980307f656e76af9398a499de533e4093f3119552045ecf25210b51f3672d765dbe42aa69", 0x38}], 0x1, 0x0, 0x0, 0x20004050}, 0x40000) write$9p(r5, &(0x7f0000000580)="3f56ff21", 0x4) umount2(&(0x7f00000005c0)='./file0\x00', 0xa) syslog(0x9, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000600)={'filter\x00'}, &(0x7f0000000680)=0x78) r6 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ifreq(r5, 0x891f, &(0x7f0000000700)={'syz_tun\x00', @ifru_settings={0x80000000, 0x4, @fr=&(0x7f00000006c0)={0x400, 0x1, 0x9, 0xfff, 0xffff, 0x450, 0x4}}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x1, 0x3}, &(0x7f0000000780)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000007c0)={r7, 0x7fff}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r5, &(0x7f0000000800)={0x1}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f0000000840)={0x78b4, 0x9}) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000009c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000980)={&(0x7f00000008c0)={0x94, r2, 0x50a, 0x7f, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6b}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ee}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6f8}]}, 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f0000000a00)=""/114) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000ac0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000a80)={0xffffffffffffffff}, 0x113, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000b00)={0x8, 0x120, 0xfa00, {0x0, {0x2, 0x8000, "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", 0xe2, 0x3, 0x1, 0x8, 0x2, 0x9, 0x1, 0x1}, r8}}, 0x128) connect(r4, &(0x7f0000000c40)=@ipx={0x4, 0x5, 0x2, "9cadecfdd59b", 0x5}, 0x80) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @broadcast}, &(0x7f0000000d00)=0xc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000d40)=0x2, 0x4) 10:55:55 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) exit(0x5) userfaultfd(0x0) lremovexattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', "0a1700"}) ioctl$VT_WAITACTIVE(r0, 0x5607) io_submit(0x0, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x0, 0x81c, 0x6, 0x0, 0x0, 0x5}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000540), &(0x7f0000000580)=0xfffffffffffffcb1) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000340)=0x8) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xfe1, 0x3d1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000380)={r3, 0xe9be}, &(0x7f00000003c0)=0x8) add_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="95b8044c7e9b7b0b8e073be2a335940939feaff31e0e59f1a71aad0d1b0abd1f093f8112037ed5b4cbe248bdc5697127031f881bb7734f006ee61d9b0ac3378d08abe4ec79f848ff5d2e409e4dfc0b438f6d2a094b78697ec647e1e3f01c33073d7edd05336e26e6b02dc0f0a36b55c1efbae1e6bfab4b1d642e87a936a210fce82bca5b94b3388c77e9740527db7a78dcd2dfb7eee986f58fa6dc9986babe24bda951", 0xa3, 0xfffffffffffffff9) add_key(&(0x7f0000000780)='.request_key_auth\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="aa0bc6199df4a4142fbb908ec7c116a878733cc422dff5e5e7d27587a500074f35f895d780e7a79482e7c5c775afeeeffc536ab63a168d3145609354efc880270c22102deb40e6bace9140e9014520ab480f9191f08e87b0bfd59ba95a9cbc557150cd47a9906647f49fe0b3be9964747662217c66d29c710c26f8c12128e4de6e7a48efa69032b44e11a64aad4190d3863c87afaa6dd8d3f512effb59f8063a705b673a68d480a26333d991185032023bfbe93defc097d5d3", 0xb9, 0xfffffffffffffffe) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000400)) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000005c0)) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x100000001) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000600)=0x2, 0x4) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x1}, 0x8) 10:55:55 executing program 1: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) exit(0x5) userfaultfd(0x0) lremovexattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', "0a1700"}) ioctl$VT_WAITACTIVE(r0, 0x5607) io_submit(0x0, 0x0, &(0x7f00000000c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x0, 0x81c, 0x6, 0x0, 0x0, 0x5}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000540), &(0x7f0000000580)=0xfffffffffffffcb1) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000380)={r3, 0xe9be}, &(0x7f00000003c0)=0x8) r4 = add_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz'}, &(0x7f00000006c0)="95b8044c7e9b7b0b8e073be2a335940939feaff31e0e59f1a71aad0d1b0abd1f093f8112037ed5b4cbe248bdc5697127031f881bb7734f006ee61d9b0ac3378d08abe4ec79f848ff5d2e409e4dfc0b438f6d2a094b78697ec647e1e3f01c33073d7edd05336e26e6b02dc0f0a36b55c1efbae1e6bfab4b1d642e87a936a210fce82bca5b94b3388c77e9740527db7a78dcd2dfb7eee986f58fa6dc9986babe24bda951", 0xa3, 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000780)='.request_key_auth\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="aa0bc6199df4a4142fbb908ec7c116a878733cc422dff5e5e7d27587a500074f35f895d780e7a79482e7c5c775afeeeffc536ab63a168d3145609354efc880270c22102deb40e6bace9140e9014520ab480f9191f08e87b0bfd59ba95a9cbc557150cd47a9906647f49fe0b3be9964747662217c66d29c710c26f8c12128e4de6e7a48efa69032b44e11a64aad4190d3863c87afaa6dd8d3f512effb59f8063a705b673a68d480a26333d991185032023bfbe93defc097d5d3", 0xb9, 0xfffffffffffffffe) keyctl$link(0x8, r4, r5) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000400)) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000005c0)) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x100000001) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000600)=0x2, 0x4) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x1}, 0x8) 10:55:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000012000/0x1000)=nil, 0x1000, 0xe0ffffff}, &(0x7f00000000c0)=0x10) close(r3) dup3(r1, r2, 0x0) 10:55:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\b\x00', 0xfd}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={"6c6f0000001800"}) 10:55:56 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3fd) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) 10:55:56 executing program 3: pipe(&(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3fd) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 261.610984] ================================================================== [ 261.618475] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 261.625613] CPU: 1 PID: 7623 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 261.632839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.642232] Call Trace: [ 261.644889] dump_stack+0x306/0x460 [ 261.648554] ? vmap_page_range_noflush+0x975/0xed0 [ 261.653546] kmsan_report+0x1a2/0x2e0 [ 261.657420] __msan_warning+0x7c/0xe0 [ 261.661263] vmap_page_range_noflush+0x975/0xed0 [ 261.666132] map_vm_area+0x17d/0x1f0 [ 261.669928] kmsan_vmap+0xf2/0x180 [ 261.673514] vmap+0x3a1/0x510 [ 261.676673] ? relay_open_buf+0x81e/0x19d0 [ 261.680982] relay_open_buf+0x81e/0x19d0 [ 261.685137] relay_open+0xabb/0x1370 [ 261.688920] do_blk_trace_setup+0xaf7/0x1780 [ 261.693398] __blk_trace_setup+0x20b/0x380 [ 261.697689] blk_trace_setup+0xfb/0x140 [ 261.701720] sg_ioctl+0x10ff/0x58b0 [ 261.705396] ? do_vfs_ioctl+0x18a/0x2810 [ 261.709472] ? __se_sys_ioctl+0x1da/0x270 [ 261.713658] ? sg_poll+0x870/0x870 [ 261.717240] do_vfs_ioctl+0xcf3/0x2810 [ 261.721168] ? security_file_ioctl+0x92/0x200 [ 261.725716] __se_sys_ioctl+0x1da/0x270 [ 261.729744] __x64_sys_ioctl+0x4a/0x70 [ 261.733665] do_syscall_64+0xbe/0x100 [ 261.737510] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 261.742725] RIP: 0033:0x457519 [ 261.745938] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.764883] RSP: 002b:00007f84edb6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.772640] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 261.779949] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000007 [ 261.787240] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 261.794537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f84edb6b6d4 [ 261.801838] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 261.809148] [ 261.810803] Uninit was created at: [ 261.814408] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 261.819582] kmsan_kmalloc+0xa4/0x120 [ 261.823415] __kmalloc+0x14b/0x440 [ 261.826970] kmsan_vmap+0x9b/0x180 [ 261.830528] vmap+0x3a1/0x510 [ 261.833669] relay_open_buf+0x81e/0x19d0 [ 261.837764] relay_open+0xabb/0x1370 [ 261.841520] do_blk_trace_setup+0xaf7/0x1780 [ 261.845971] __blk_trace_setup+0x20b/0x380 [ 261.850233] blk_trace_setup+0xfb/0x140 [ 261.854237] sg_ioctl+0x10ff/0x58b0 [ 261.857918] do_vfs_ioctl+0xcf3/0x2810 [ 261.861855] __se_sys_ioctl+0x1da/0x270 [ 261.865862] __x64_sys_ioctl+0x4a/0x70 [ 261.869776] do_syscall_64+0xbe/0x100 [ 261.873604] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 261.878797] ================================================================== [ 261.886189] Disabling lock debugging due to kernel taint [ 261.891655] Kernel panic - not syncing: panic_on_warn set ... [ 261.891655] [ 261.899064] CPU: 1 PID: 7623 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #66 [ 261.907658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.917054] Call Trace: [ 261.919716] dump_stack+0x306/0x460 [ 261.923389] panic+0x54c/0xafa [ 261.926658] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 261.932147] kmsan_report+0x2d3/0x2e0 [ 261.936006] __msan_warning+0x7c/0xe0 [ 261.939895] vmap_page_range_noflush+0x975/0xed0 [ 261.944725] map_vm_area+0x17d/0x1f0 [ 261.948491] kmsan_vmap+0xf2/0x180 [ 261.952089] vmap+0x3a1/0x510 [ 261.955232] ? relay_open_buf+0x81e/0x19d0 [ 261.959520] relay_open_buf+0x81e/0x19d0 [ 261.963666] relay_open+0xabb/0x1370 [ 261.967441] do_blk_trace_setup+0xaf7/0x1780 [ 261.971942] __blk_trace_setup+0x20b/0x380 [ 261.976229] blk_trace_setup+0xfb/0x140 [ 261.980235] sg_ioctl+0x10ff/0x58b0 [ 261.983908] ? do_vfs_ioctl+0x18a/0x2810 [ 261.987992] ? __se_sys_ioctl+0x1da/0x270 [ 261.992175] ? sg_poll+0x870/0x870 [ 261.995751] do_vfs_ioctl+0xcf3/0x2810 [ 261.999696] ? security_file_ioctl+0x92/0x200 [ 262.004238] __se_sys_ioctl+0x1da/0x270 [ 262.008263] __x64_sys_ioctl+0x4a/0x70 [ 262.012213] do_syscall_64+0xbe/0x100 [ 262.016074] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 262.021308] RIP: 0033:0x457519 [ 262.024595] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.043518] RSP: 002b:00007f84edb6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.051291] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 262.058595] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000007 [ 262.065882] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.073174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f84edb6b6d4 [ 262.080466] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 262.088841] Kernel Offset: disabled [ 262.092504] Rebooting in 86400 seconds..