[ 60.136505] audit: type=1800 audit(1539249397.181:27): pid=6079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 61.714555] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 65.475002] random: sshd: uninitialized urandom read (32 bytes read) [ 65.968264] random: sshd: uninitialized urandom read (32 bytes read) [ 68.467308] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. [ 74.363587] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 09:16:53 fuzzer started [ 78.896473] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 09:16:58 dialing manager at 10.128.0.26:39089 2018/10/11 09:16:58 syscalls: 1 2018/10/11 09:16:58 code coverage: enabled 2018/10/11 09:16:58 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 09:16:58 setuid sandbox: enabled 2018/10/11 09:16:58 namespace sandbox: enabled 2018/10/11 09:16:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 09:16:58 fault injection: enabled 2018/10/11 09:16:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 09:16:58 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 09:16:58 net device setup: enabled [ 83.528855] random: crng init done 09:18:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000040)={0x10, 0xa00}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) [ 199.431960] IPVS: ftp: loaded support on port[0] = 21 [ 200.368714] ip (6260) used greatest stack depth: 53056 bytes left [ 200.863030] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.869607] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.878562] device bridge_slave_0 entered promiscuous mode [ 201.085664] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.092287] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.100654] device bridge_slave_1 entered promiscuous mode [ 201.265058] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.439656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.864299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.014397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.158108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.165482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.309694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.316868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:18:59 executing program 1: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)='A', 0x1}], 0x1, &(0x7f00000003c0)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f00000001c0), 0x4) [ 202.906978] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.915442] team0: Port device team_slave_0 added [ 203.196556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.204909] team0: Port device team_slave_1 added [ 203.330543] IPVS: ftp: loaded support on port[0] = 21 [ 203.523989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.531077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.540116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.711882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.719018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.728134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.955340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.963034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.972349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.121768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.129514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.138931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.606028] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.612599] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.621326] device bridge_slave_0 entered promiscuous mode [ 205.894323] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.900789] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.909704] device bridge_slave_1 entered promiscuous mode [ 206.215677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.407674] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.414288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.421306] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.427916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.437202] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.466070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.074208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.305062] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.362757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.547729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.554992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.776529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.783769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:19:05 executing program 2: [ 208.524684] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.533075] team0: Port device team_slave_0 added [ 208.738770] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.747326] team0: Port device team_slave_1 added [ 209.036729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.043978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.053149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.366421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.370824] IPVS: ftp: loaded support on port[0] = 21 [ 209.373971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.387688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.666358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.674163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.683421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.967626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.975437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.984811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.047615] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.054669] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.063694] device bridge_slave_0 entered promiscuous mode [ 212.318678] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.325318] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.334128] device bridge_slave_1 entered promiscuous mode [ 212.645215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.903221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.256719] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.263312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.270271] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.276908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.286050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.764105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.847424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.070548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.329679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.336940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.645551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.652716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.477691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.486033] team0: Port device team_slave_0 added [ 215.780641] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.788873] team0: Port device team_slave_1 added 09:19:13 executing program 3: [ 216.104642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.111740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.121102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.410973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.418239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.427176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.855977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.864092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.873411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.188043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 217.195799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.205137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.454180] IPVS: ftp: loaded support on port[0] = 21 [ 218.796398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.066329] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.897070] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.903664] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.912275] device bridge_slave_0 entered promiscuous mode [ 221.163505] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.170054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.177144] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.183735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.192760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.325758] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.332282] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.340980] device bridge_slave_1 entered promiscuous mode [ 221.377291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.383842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.392178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.723445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.050691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.082296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.745301] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.060943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.385039] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.764892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.783533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.066381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.073676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.126863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.135153] team0: Port device team_slave_0 added [ 225.415993] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.424245] team0: Port device team_slave_1 added [ 225.729618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.736973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.745949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:19:22 executing program 4: [ 226.152484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.159573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.168405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.524211] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.531780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.540903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.909621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.917403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.926636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.525395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.858443] IPVS: ftp: loaded support on port[0] = 21 [ 229.114640] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.528612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.535069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.543199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.794610] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.801083] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.809755] device bridge_slave_0 entered promiscuous mode [ 231.883725] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.890205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.897367] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.903926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.912688] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:19:29 executing program 0: [ 232.274910] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.300482] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.307543] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.316155] device bridge_slave_1 entered promiscuous mode 09:19:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e5, &(0x7f0000000000)="27b161b59b0da55d99c1de3672cbe745e75b84e7a3df08f82e9fcbc1530df9f82d9d5dc6c540f613708e454aeffa015eb37a7f39ee972d0b71a3ea3adee55d0e9144cd432bd5f6236195e8466130eef7e082c3f30126efe144e7f4f3144b1244357567d80afaf840818452aae508000000000000000000f78d02636761f88696610e1b649db2b7007649d63e73555c24e44777f7272a6bc52821af83a2490c43817056640a895ad216d31ff688150700de95a31404bd6b96b2b646e3e7ec46523d625f2c564302509ec1f2dd553014f3ee8e907a1db82e6388d3ecedd8ac48b3789f0f8ed88790cab43800008600000000") 09:19:29 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000004c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x4e22, 0x8, @ipv4={[], [], @loopback}, 0x7}}, {{0xa, 0x4e21, 0x1000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, 0x80000001}}, {{0xa, 0x4e20, 0xfc7, @local, 0x1}}, {{0xa, 0x4e20, 0xe0b1, @dev={0xfe, 0x80, [], 0x1b}, 0x4ee}}, {{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x4}}]}, 0x310) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0x24, [], 0x4, &(0x7f0000000200)=[{}, {}, {}, {}], &(0x7f00000002c0)=""/36}, &(0x7f0000000380)=0x78) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1, 0x2, [{}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}]}, 0x190) [ 232.760617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.802274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.191327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:19:30 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000004c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x4e22, 0x8, @ipv4={[], [], @loopback}, 0x7}}, {{0xa, 0x4e21, 0x1000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, 0x80000001}}, {{0xa, 0x4e20, 0xfc7, @local, 0x1}}, {{0xa, 0x4e20, 0xe0b1, @dev={0xfe, 0x80, [], 0x1b}, 0x4ee}}, {{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x4}}]}, 0x310) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0x24, [], 0x4, &(0x7f0000000200)=[{}, {}, {}, {}], &(0x7f00000002c0)=""/36}, &(0x7f0000000380)=0x78) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1, 0x2, [{}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}]}, 0x190) 09:19:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x3) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x14, 0x9, 0xf, 0x10, 0x0, 0x70bd28, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@remote, 0x5, 0x10, 0x14}, @sadb_lifetime={0x4, 0x3, 0xc9, 0x1fffffffc00, 0x3ff, 0x4}, @sadb_address={0x5, 0x17, 0x7c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x2, @loopback, 0x6}}]}, 0x80}}, 0xc5) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 234.486804] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.884421] bond0: Enslaving bond_slave_1 as an active interface with an up link 09:19:32 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe6e, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/249}], 0x2b7, 0x0, 0xffffffffffffff35}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40100, 0x0) accept$unix(r1, &(0x7f0000000140)=@abs, &(0x7f0000000040)=0x6e) [ 235.347843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 235.355093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:19:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0xfffffd52, 0xfa00, {{0x2, 0x4e21}, {0xa, 0x0, 0x0, @local, 0x5}, r2}}, 0x1ff) [ 235.772613] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 235.779738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:19:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x9f) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x2, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000180)="8e", 0x1, 0x8000, &(0x7f0000000200), 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffdef, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 237.017561] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.025949] team0: Port device team_slave_0 added [ 237.371385] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.379709] team0: Port device team_slave_1 added [ 237.757518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 237.764725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.773485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.840177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.042382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.049483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.058496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.265052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.272969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.281824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.572298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.580334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.589384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.939897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.184958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.191419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.199367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:19:38 executing program 1: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)='A', 0x1}], 0x1, &(0x7f00000003c0)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f00000001c0), 0x4) [ 241.440585] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.529672] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.536195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.543288] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.549751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.558162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.565042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.594356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.445755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:19:43 executing program 2: r0 = socket$kcm(0x11, 0x2000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@in6={0xa, 0x6558, 0xd, @mcast1}, 0x80, &(0x7f0000000240)}, 0x0) [ 246.207534] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.214077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.221776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.901767] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.076461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.610115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.095416] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.101622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.109498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:19:47 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x14, &(0x7f00000001c0), 0x4) [ 250.349286] sctp: [Deprecated]: syz-executor3 (pid 7443) Use of int in max_burst socket option deprecated. [ 250.349286] Use struct sctp_assoc_value instead [ 250.595559] 8021q: adding VLAN 0 to HW filter on device team0 09:19:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000040)='F', 0x1, r0) keyctl$setperm(0x5, r1, 0x10000) keyctl$describe(0x6, r1, &(0x7f0000000240)=""/196, 0x13be4e8f87edf409) 09:19:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x10, 0xbd, &(0x7f0000000100)="bc15a54b0e46cdc214c494cbfc7e04c2", &(0x7f0000000380)=""/189, 0x869c}, 0x28) 09:19:49 executing program 5: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x200, 0x4) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x100000001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r3, 0x3d34}, &(0x7f0000000180)=0x8) r5 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xc7f, 0x200800) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000200)=0x0) prctl$setptracer(0x59616d61, r6) ioctl$void(r1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000240)=""/139) r7 = accept4$unix(r2, &(0x7f0000000300), &(0x7f0000000380)=0x6e, 0x80000) fcntl$lock(r7, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x30, 0xa9fb, r6}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000400)={r4, 0xffffffff00000001, 0xf4, 0x48eb, 0x18, 0x5}, 0x14) openat$random(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x101000, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000480)) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) ioctl(r0, 0x7fffffff, &(0x7f00000004c0)="296320a74600f41b714940d97c233b1027489f37cc144a8111edabf5eb6f74ccfbb35a771f3318a4f60fed08d9") fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000500)) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000540)) syz_open_dev$rtc(&(0x7f0000000580)='/dev/rtc#\x00', 0xbe8, 0x200) fstatfs(r7, &(0x7f00000005c0)=""/35) ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000000600)) fstatfs(r1, &(0x7f0000000640)=""/149) getpid() ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000700)={0x4bd, 0x4}) r8 = semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000740)=r6) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000780)={r4}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000007c0)={'nat\x00', 0x6c, "0a4543d9bc5a7bb5df57e6b9c3db7b4804cffd20b7fb6da8cdad35b7a1f03817de854907db29faa5eda39378af5d96660bb562fbdb470a9055831b7ff039bfd0db31cab4983a37f0dba39c81a44ed62adc5b16258e2224f13a1022852f691c6e235d36a8613878a30aad210a"}, &(0x7f0000000880)=0x90) 09:19:49 executing program 1: 09:19:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="180000000000000084000000e50f0000000000000000000030000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0], 0x3e}, 0x0) 09:19:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) socket$inet_smc(0x2b, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 09:19:49 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x1}) 09:19:49 executing program 2: 09:19:49 executing program 0: 09:19:50 executing program 4: 09:19:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) close(r1) socket$inet_smc(0x2b, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 09:19:50 executing program 2: 09:19:50 executing program 1: 09:19:50 executing program 0: [ 253.861066] IPVS: ftp: loaded support on port[0] = 21 [ 254.543919] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.550352] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.558545] device bridge_slave_0 entered promiscuous mode [ 254.632294] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.638658] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.646889] device bridge_slave_1 entered promiscuous mode [ 254.721615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.796036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.020317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.099477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.247344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.254724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.482596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.490241] team0: Port device team_slave_0 added [ 255.563508] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.571126] team0: Port device team_slave_1 added [ 255.645605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.724993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.800291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.807776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.816792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.884398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.891681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.900695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.701376] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.708106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.715093] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.721533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.729934] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.212297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.800422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.084240] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.366795] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.373129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.380956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.657404] 8021q: adding VLAN 0 to HW filter on device team0 09:19:59 executing program 5: 09:19:59 executing program 4: 09:19:59 executing program 2: 09:19:59 executing program 3: 09:19:59 executing program 1: 09:19:59 executing program 0: 09:19:59 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x40045730, &(0x7f0000000000)={0x1}) 09:19:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) capset(&(0x7f0000000040), &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00', 0x18}, 0x2c) 09:19:59 executing program 4: 09:19:59 executing program 0: 09:20:00 executing program 5: 09:20:00 executing program 2: [ 263.073354] syz-executor3: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 263.084532] syz-executor3 cpuset=syz3 mems_allowed=0 [ 263.089759] CPU: 1 PID: 7799 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #66 [ 263.096993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.106437] Call Trace: [ 263.109130] dump_stack+0x306/0x460 [ 263.112828] warn_alloc+0x4c1/0x6f0 [ 263.116541] ? __msan_metadata_ptr_for_store_8+0x13/0x20 09:20:00 executing program 1: [ 263.122136] __vmalloc_node_range+0xd9b/0x1280 [ 263.126777] ? task_kmsan_context_state+0x6b/0x120 [ 263.131825] ? task_kmsan_context_state+0x6b/0x120 [ 263.136832] __vmalloc_node_flags_caller+0x12b/0x140 [ 263.142020] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 263.146774] ? xt_alloc_entry_offsets+0xb1/0xe0 [ 263.151510] kvmalloc_node+0xd1/0x1a0 [ 263.155379] xt_alloc_entry_offsets+0xb1/0xe0 [ 263.159976] translate_table+0x1e6/0x3400 [ 263.164226] ? task_kmsan_context_state+0x6b/0x120 [ 263.169248] ? task_kmsan_context_state+0x6b/0x120 [ 263.174270] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 263.179703] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 263.185182] ? vmalloc_to_page+0x57d/0x6b0 [ 263.189549] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 263.194987] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 263.200465] do_arpt_set_ctl+0x672/0xca0 [ 263.204635] ? INIT_S64+0xd/0x30 [ 263.208104] ? mutex_unlock+0x1f2/0x2d0 [ 263.212190] ? arpt_unregister_table+0x5d0/0x5d0 [ 263.217050] nf_setsockopt+0x47c/0x4e0 [ 263.221022] ip_setsockopt+0x24b/0x2b0 [ 263.225023] ? ipv4_pktinfo_prepare+0x6d0/0x6d0 [ 263.229792] tcp_setsockopt+0x1c0/0x1f0 [ 263.233861] ? tcp_disconnect+0x19c0/0x19c0 [ 263.238294] sock_common_setsockopt+0x13b/0x170 [ 263.243044] ? sock_common_recvmsg+0x290/0x290 [ 263.247707] __sys_setsockopt+0x496/0x540 [ 263.251972] __se_sys_setsockopt+0xdd/0x100 [ 263.256409] __x64_sys_setsockopt+0x62/0x80 [ 263.260798] do_syscall_64+0xbe/0x100 [ 263.264668] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 263.269916] RIP: 0033:0x457519 [ 263.273168] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.292121] RSP: 002b:00007efe32cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 263.299898] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457519 [ 263.307213] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003 [ 263.314535] RBP: 000000000072bf00 R08: 000000000000002c R09: 0000000000000000 09:20:00 executing program 1: [ 263.321856] R10: 0000000020000080 R11: 0000000000000246 R12: 00007efe32cf46d4 [ 263.329180] R13: 00000000004c3a3e R14: 00000000004d5af0 R15: 00000000ffffffff [ 263.336988] Mem-Info: [ 263.339626] active_anon:56895 inactive_anon:108 isolated_anon:0 [ 263.339626] active_file:7545 inactive_file:35714 isolated_file:0 [ 263.339626] unevictable:0 dirty:42 writeback:0 unstable:0 [ 263.339626] slab_reclaimable:3821 slab_unreclaimable:10829 [ 263.339626] mapped:54957 shmem:119 pagetables:825 bounce:0 [ 263.339626] free:992776 free_pcp:770 free_cma:0 [ 263.373275] Node 0 active_anon:227580kB inactive_anon:432kB active_file:30180kB inactive_file:142856kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:219828kB dirty:168kB writeback:0kB shmem:476kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 190464kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 263.401632] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 263.427998] lowmem_reserve[]: 0 2803 7229 7229 [ 263.432770] Node 0 DMA32 free:2873792kB min:26148kB low:32684kB high:39220kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2875232kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1440kB local_pcp:0kB free_cma:0kB [ 263.460578] lowmem_reserve[]: 0 0 4425 4425 [ 263.465182] Node 0 Normal free:1080520kB min:41284kB low:51604kB high:61924kB active_anon:227580kB inactive_anon:432kB active_file:30180kB inactive_file:142856kB unevictable:0kB writepending:168kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:11712kB pagetables:3472kB bounce:0kB free_pcp:768kB local_pcp:552kB free_cma:0kB [ 263.495383] lowmem_reserve[]: 0 0 0 0 [ 263.499309] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 263.513046] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 2*16kB (M) 4*32kB (M) 2*64kB (M) 3*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 3*2048kB (M) 699*4096kB (M) = 2873792kB [ 263.528744] Node 0 Normal: 773*4kB (UME) 677*8kB (ME) 458*16kB (UME) 153*32kB (UME) 24*64kB (UME) 7*128kB (UME) 2*256kB (UE) 2*512kB (E) 3*1024kB (UME) 4*2048kB (UME) 255*4096kB (M) = 1080444kB [ 263.546753] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 263.552042] hrtimer: interrupt took 201807 ns [ 263.555726] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 263.569009] 43377 total pagecache pages 09:20:00 executing program 0: 09:20:00 executing program 4: [ 263.573103] 0 pages in swap cache [ 263.576584] Swap cache stats: add 0, delete 0, find 0/0 [ 263.581961] Free swap = 0kB [ 263.585167] Total swap = 0kB [ 263.588211] 1965979 pages RAM [ 263.591336] 0 pages HighMem/MovableOnly [ 263.595446] 110157 pages reserved [ 263.598922] 0 pages cma reserved 09:20:00 executing program 1: 09:20:00 executing program 2: 09:20:00 executing program 0: 09:20:01 executing program 3: 09:20:01 executing program 4: 09:20:01 executing program 5: 09:20:01 executing program 1: 09:20:01 executing program 0: 09:20:01 executing program 2: 09:20:01 executing program 3: 09:20:01 executing program 5: 09:20:01 executing program 4: 09:20:01 executing program 0: 09:20:01 executing program 1: 09:20:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 09:20:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x203, &(0x7f0000000040)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 09:20:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) lseek(r0, 0xfffffffffffffffe, 0x1) 09:20:02 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb}, 0xb) 09:20:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 09:20:02 executing program 1: unshare(0x8000400) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) 09:20:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)=ANY=[@ANYBLOB="2303338408"]) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000200)}, 0x91c, 0x3cc, 0x0, 0x0, 0x6, 0x0, 0x10001}, 0x0, 0x0, r0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000000c0)={0x1000, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e21}, {0x2, 0x0, @multicast1}, 0x4c, 0x6, 0x1, 0x0, 0x0, &(0x7f0000000040)='ip6gre0\x00', 0x800, 0x3, 0x80}) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000002c0)={0x2, 0x0, [{0x9e9, 0x0, 0x7129}, {0xbf7, 0x0, 0x7ff}]}) 09:20:02 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x176}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff00000000030006000000000002000003e80000bb000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0xd0, 0x0) 09:20:02 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x80045505, &(0x7f00000000c0)={0x0, {0x2, 0x0, @dev}, {}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ip6gre0\x00'}) 09:20:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000480)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) socketpair$unix(0x1, 0x1000000000002, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x77, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:20:03 executing program 1: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000002400)='I', 0x1}], 0x1, 0x40000) truncate(&(0x7f0000000000)='./file1\x00', 0x1) fallocate(r0, 0x0, 0x0, 0x8000) lseek(r0, 0x0, 0x4) [ 266.053178] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 266.213558] ================================================================== [ 266.221055] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 266.228690] CPU: 1 PID: 7885 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #66 [ 266.235878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.245248] Call Trace: [ 266.247862] dump_stack+0x306/0x460 [ 266.251501] ? vmx_set_constant_host_state+0x1778/0x1830 [ 266.257009] kmsan_report+0x1a2/0x2e0 [ 266.260835] __msan_warning+0x7c/0xe0 [ 266.264656] vmx_set_constant_host_state+0x1778/0x1830 [ 266.269954] vmx_create_vcpu+0x3e6f/0x7870 [ 266.274238] ? kmsan_set_origin_inline+0x6b/0x120 [ 266.279113] ? __msan_poison_alloca+0x17a/0x210 [ 266.283831] ? vmx_vm_init+0x340/0x340 [ 266.287750] kvm_arch_vcpu_create+0x25d/0x2f0 [ 266.292295] kvm_vm_ioctl+0x13fd/0x33d0 [ 266.296313] ? __msan_poison_alloca+0x17a/0x210 [ 266.300999] ? do_vfs_ioctl+0x18a/0x2810 [ 266.305092] ? __se_sys_ioctl+0x1da/0x270 [ 266.309279] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 266.314197] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 266.319077] do_vfs_ioctl+0xcf3/0x2810 [ 266.323028] ? security_file_ioctl+0x92/0x200 [ 266.327567] __se_sys_ioctl+0x1da/0x270 [ 266.331566] __x64_sys_ioctl+0x4a/0x70 [ 266.335469] do_syscall_64+0xbe/0x100 [ 266.339309] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 266.344534] RIP: 0033:0x457519 09:20:03 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x176}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff00000000030006000000000002000003e80000bb000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0xd0, 0x0) 09:20:03 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x80045505, &(0x7f00000000c0)={0x0, {0x2, 0x0, @dev}, {}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ip6gre0\x00'}) [ 266.347745] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.366658] RSP: 002b:00007f50558e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.374388] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 266.381667] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 266.388951] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 266.396271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f50558e36d4 [ 266.403582] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 266.410881] 09:20:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000000c0)={0x1000, {0x2, 0x4e20, @dev}, {0x2, 0x4e21}, {0x2, 0x0, @multicast1}, 0x4c, 0x0, 0x0, 0xffff, 0x0, &(0x7f0000000040)='ip6gre0\x00'}) [ 266.412512] Local variable description: ----dt@vmx_set_constant_host_state [ 266.419525] Variable was created at: [ 266.423311] vmx_set_constant_host_state+0x2b0/0x1830 [ 266.428520] vmx_create_vcpu+0x3e6f/0x7870 [ 266.432754] ================================================================== [ 266.440117] Disabling lock debugging due to kernel taint [ 266.445597] Kernel panic - not syncing: panic_on_warn set ... [ 266.445597] [ 266.453055] CPU: 1 PID: 7885 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #66 09:20:03 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)=ANY=[@ANYBLOB="2303338408"]) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000200)}, 0x91c, 0x3cc, 0x0, 0x0, 0x6, 0x0, 0x10001}, 0x0, 0x0, r0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000000c0)={0x1000, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e21}, {0x2, 0x0, @multicast1}, 0x4c, 0x6, 0x1, 0x0, 0x0, &(0x7f0000000040)='ip6gre0\x00', 0x800, 0x3, 0x80}) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000002c0)={0x2, 0x0, [{0x9e9, 0x0, 0x7129}, {0xbf7, 0x0, 0x7ff}]}) [ 266.461643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.471006] Call Trace: [ 266.473637] dump_stack+0x306/0x460 [ 266.477355] panic+0x54c/0xafa [ 266.480649] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 266.486130] kmsan_report+0x2d3/0x2e0 [ 266.489958] __msan_warning+0x7c/0xe0 [ 266.493806] vmx_set_constant_host_state+0x1778/0x1830 [ 266.499166] vmx_create_vcpu+0x3e6f/0x7870 [ 266.503469] ? kmsan_set_origin_inline+0x6b/0x120 [ 266.508339] ? __msan_poison_alloca+0x17a/0x210 [ 266.513052] ? vmx_vm_init+0x340/0x340 [ 266.516965] kvm_arch_vcpu_create+0x25d/0x2f0 [ 266.521491] kvm_vm_ioctl+0x13fd/0x33d0 [ 266.525541] ? __msan_poison_alloca+0x17a/0x210 [ 266.530240] ? do_vfs_ioctl+0x18a/0x2810 [ 266.534339] ? __se_sys_ioctl+0x1da/0x270 [ 266.538543] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 266.543417] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 266.548325] do_vfs_ioctl+0xcf3/0x2810 [ 266.552257] ? security_file_ioctl+0x92/0x200 [ 266.556824] __se_sys_ioctl+0x1da/0x270 [ 266.560850] __x64_sys_ioctl+0x4a/0x70 [ 266.564767] do_syscall_64+0xbe/0x100 [ 266.568611] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 266.573814] RIP: 0033:0x457519 [ 266.577023] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.595937] RSP: 002b:00007f50558e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.603661] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 266.610937] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 266.618213] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 266.625498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f50558e36d4 [ 266.632784] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 266.641087] Kernel Offset: disabled [ 266.644725] Rebooting in 86400 seconds..