[....] Starting OpenBSD Secure Shell server: sshd[ 50.133091] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 50.463903] audit: type=1800 audit(1538834927.516:29): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 50.483613] audit: type=1800 audit(1538834927.516:30): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 51.293356] random: sshd: uninitialized urandom read (32 bytes read) [ 51.593922] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 53.376816] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. [ 59.105728] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/06 14:08:57 fuzzer started [ 63.193086] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/06 14:09:02 dialing manager at 10.128.0.26:36867 [ 65.435567] ld (5994) used greatest stack depth: 53184 bytes left 2018/10/06 14:09:02 syscalls: 1 2018/10/06 14:09:02 code coverage: enabled 2018/10/06 14:09:02 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/06 14:09:02 setuid sandbox: enabled 2018/10/06 14:09:02 namespace sandbox: enabled 2018/10/06 14:09:02 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/06 14:09:02 fault injection: enabled 2018/10/06 14:09:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/06 14:09:02 net packed injection: enabled 2018/10/06 14:09:02 net device setup: enabled [ 68.048069] random: crng init done 14:10:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@bridge_newneigh={0x30, 0x1c, 0x31, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@NDA_DST_IPV6={0x14, 0x1, @remote}]}, 0x30}}, 0x0) [ 162.527994] IPVS: ftp: loaded support on port[0] = 21 [ 164.629365] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.635921] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.644174] device bridge_slave_0 entered promiscuous mode [ 164.764776] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.771213] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.779387] device bridge_slave_1 entered promiscuous mode [ 164.894576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.009776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.373180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.493062] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:10:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, &(0x7f0000000100)) [ 166.165166] IPVS: ftp: loaded support on port[0] = 21 [ 166.470476] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.478665] team0: Port device team_slave_0 added [ 166.710268] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.718347] team0: Port device team_slave_1 added [ 166.964236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.142447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.149443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.158199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.314006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 167.321497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.330369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.534664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 167.542536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.551090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.665383] ip (6108) used greatest stack depth: 53056 bytes left [ 169.164933] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.171390] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.179741] device bridge_slave_0 entered promiscuous mode [ 169.391872] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.398333] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.406534] device bridge_slave_1 entered promiscuous mode [ 169.601828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 169.781452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.919620] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.926250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.933219] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.939630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.948040] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:10:47 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000fffffffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') connect$l2tp(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x3a) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x35, 0xfa00, {{0x19000000, 0x1, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x4e20, 0x99, @remote}, r1}}, 0x48) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000006c0)={0x0, 0x1000, "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"}, &(0x7f0000000540)=0x1008) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000001700)={r2, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000400)={0x0, 0x58, &(0x7f0000000640)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e20, 0x52ba, @empty, 0x4}, @in6={0xa, 0x4e20, 0xf1a, @dev={0xfe, 0x80, [], 0x10}, 0xb7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}]}, &(0x7f0000000480)=0x10) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x8, 0x4e}, &(0x7f0000000380), 0x1400) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300)="99114950b0fbe20d8f964eab5d327b", 0xf, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340), 0x4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) write$binfmt_misc(r3, &(0x7f0000000440)={'syz1'}, 0x12007) [ 170.272341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.406015] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.612459] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.830695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.837790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.064919] IPVS: ftp: loaded support on port[0] = 21 [ 171.071062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.079534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.913261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.921085] team0: Port device team_slave_0 added [ 172.249940] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.257834] team0: Port device team_slave_1 added [ 172.513363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 172.520350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.528973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.792154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 172.799177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.807959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.051273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.058909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.067637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.345689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.353373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.362086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.080611] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.087178] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.095474] device bridge_slave_0 entered promiscuous mode [ 175.362539] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.368978] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.377196] device bridge_slave_1 entered promiscuous mode [ 175.621357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.872028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.935148] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.942171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.949016] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.955554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.964055] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 176.392348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.715090] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.958478] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:10:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 177.223628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 177.232283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.480788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.487989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.085391] IPVS: ftp: loaded support on port[0] = 21 [ 178.545909] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.553929] team0: Port device team_slave_0 added [ 178.759564] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.767498] team0: Port device team_slave_1 added [ 179.070992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.078156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.086964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.406267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.413405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.421912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.761093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.768629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.777995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.080175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.087708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.096590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.163068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.150008] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.362465] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.368794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.376697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.044497] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.050957] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.059400] device bridge_slave_0 entered promiscuous mode [ 183.301496] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.308061] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.316455] device bridge_slave_1 entered promiscuous mode [ 183.550987] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.687910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.705619] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.712122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.718973] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.725642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.735602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.985227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.651940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.878284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.286075] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.573137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.580157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.873538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.880572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:11:03 executing program 4: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) clone(0x0, &(0x7f00000006c0), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f0000000a00), &(0x7f00000009c0), &(0x7f0000000000), &(0x7f0000000980)) [ 186.807038] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.815044] team0: Port device team_slave_0 added [ 187.223297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.231108] team0: Port device team_slave_1 added [ 187.630418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.637557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.646125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.937662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.944769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.953336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.953782] IPVS: ftp: loaded support on port[0] = 21 [ 188.245235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.252839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.261583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.656941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.664761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.673556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.111113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.608751] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:11:08 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7001, &(0x7f0000000100)) 14:11:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0xfffffffffffffffe, 0x1c5) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ipddp0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6, @random="8a0c48dd71c5"}, 0x10) socket$inet6(0xa, 0x80007, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@deltaction={0xa4, 0x31, 0x100, 0x70bd29, 0x25dfdbfe, {0x0, 0x8, 0x7}, [@TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x5, @TCA_ACT_INDEX={0x8, 0x3, 0x80000000}}]}, @TCA_ACT_TAB={0x48, 0x1, [{0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}, {0x14, 0x8, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 14:11:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xa, 0xfffffffffffffc01) clone(0x40100, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000001e80)}}], 0x1, 0x163, &(0x7f0000001fc0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 192.151161] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.157700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.165850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:11:09 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80000, 0x0) getdents64(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) 14:11:09 executing program 0: r0 = socket$packet(0x11, 0x40, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet(0x2, 0x1, 0x14c43823) setsockopt$inet_int(r1, 0x0, 0xe, &(0x7f0000000040)=0xe75, 0x4) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) [ 193.074548] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.080992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.087960] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.094461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.102659] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.212225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:11:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) mknodat(r0, &(0x7f0000001100)='./file0\x00', 0x1e2, 0x7) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001580)="c3401c344654f3c705fe1b4c8c8e399aa4eedc3d6bff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989773fc99412e36880d20c34d91051b22f6c8acc9d082b7bffffffff667da0867d0c00000000000000000000100000000000aa5b93236d5c", 0x82, 0x81, &(0x7f0000001540)={0x2, 0x0, @local}, 0x10) sendto$packet(r0, &(0x7f0000001040)="c2187bd2e3c714142450e928e372ffae548d7ce02564125dd3388d98efd31754d35206f3f036043d870a9999a4aad5d21c4ff7a65134ba25284c5a469c1fa6aa2c722110bbb23ab1f9467f25f16924c1894c244b394e86bc7f57711cd782f07a4f704efbe75ba7560d61aa51a3d6955299307afdc4c92f8d3ac17153d671e9f32c97", 0x82, 0x0, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000001240)={0x0, 0x989680}) recvfrom(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001280)='Y', 0x1, 0x0, &(0x7f0000001380)={0x2, 0x0, @multicast1}, 0x10) [ 193.618667] 8021q: adding VLAN 0 to HW filter on device team0 14:11:11 executing program 0: unshare(0x20400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000a40), 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x2, 0xe, 0x7, 0xb, 0x39, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_lifetime={0x4, 0x2, 0x1, 0x8001, 0x10000, 0x3f}, @sadb_address={0x3, 0x17, 0x6c, 0x80, 0x0, @in={0x2, 0x4e24, @loopback}}, @sadb_x_sec_ctx={0x18, 0x18, 0x1000, 0xffff, 0xb1, "ce173200547417ad0c4b15e6436df217bb88e59a74b2f37b4a104da6db0e5119b7e7bfb7a4743744a0fe9335ba07a3b1c8243dfbd9b973be340d1035389d94d02fb186df1234e2a1fcceb2573a95c55834ef4f0fd56583611d7ed3005015fbb013dd77a44e43ae3647a7db85226f59f7e3efe06f75c471d03950659ed62f9254560c48a12819c4cf89f95e342970b77e5714a7e4b61edccd57189644ebbbd64f97dc10fc237630d2191e17dd3ef678d785"}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d4}, @sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@loopback, 0xb, 0x14, 0x4}, @sadb_key={0x11, 0x9, 0x3f0, 0x0, "e9d368a2f97ef4633388cc90c1ea4a65e3e44ae36353b922ec6e4a5154fcc3ee5aa2e2fdb39f08cc185f5a9b41b049db0a252d19410157794d4954ef15f8d43c1e1f63b1b8c9613b318629342b3b3687d438185706341e176f9c3ac7d527f543e1e9ff18dfacfeb6bc8ce48a8ae4cca359f158c9c7e7467eb1b54e291306"}]}, 0x1c8}}, 0x8000) [ 194.245687] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.252237] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.260311] device bridge_slave_0 entered promiscuous mode 14:11:11 executing program 0: unshare(0x20400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000a40), 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x2, 0xe, 0x7, 0xb, 0x39, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_lifetime={0x4, 0x2, 0x1, 0x8001, 0x10000, 0x3f}, @sadb_address={0x3, 0x17, 0x6c, 0x80, 0x0, @in={0x2, 0x4e24, @loopback}}, @sadb_x_sec_ctx={0x18, 0x18, 0x1000, 0xffff, 0xb1, "ce173200547417ad0c4b15e6436df217bb88e59a74b2f37b4a104da6db0e5119b7e7bfb7a4743744a0fe9335ba07a3b1c8243dfbd9b973be340d1035389d94d02fb186df1234e2a1fcceb2573a95c55834ef4f0fd56583611d7ed3005015fbb013dd77a44e43ae3647a7db85226f59f7e3efe06f75c471d03950659ed62f9254560c48a12819c4cf89f95e342970b77e5714a7e4b61edccd57189644ebbbd64f97dc10fc237630d2191e17dd3ef678d785"}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d4}, @sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@loopback, 0xb, 0x14, 0x4}, @sadb_key={0x11, 0x9, 0x3f0, 0x0, "e9d368a2f97ef4633388cc90c1ea4a65e3e44ae36353b922ec6e4a5154fcc3ee5aa2e2fdb39f08cc185f5a9b41b049db0a252d19410157794d4954ef15f8d43c1e1f63b1b8c9613b318629342b3b3687d438185706341e176f9c3ac7d527f543e1e9ff18dfacfeb6bc8ce48a8ae4cca359f158c9c7e7467eb1b54e291306"}]}, 0x1c8}}, 0x8000) [ 194.647465] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.654109] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.662407] device bridge_slave_1 entered promiscuous mode [ 195.004396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.353233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 196.188796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.443581] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.722087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 196.732090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.049452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.056798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.843759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.968900] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.976826] team0: Port device team_slave_0 added [ 198.202019] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 198.209931] team0: Port device team_slave_1 added [ 198.515201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 198.522354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.530722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.781019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 198.788212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.796844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.811436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 198.961975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.969491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.978130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.222229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.229698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.238433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.854601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.860969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.868711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.906878] 8021q: adding VLAN 0 to HW filter on device team0 14:11:18 executing program 1: [ 201.889719] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.896281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.903209] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.909618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.917691] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.924455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.785364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.560480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.087674] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.094110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.101817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.542535] hrtimer: interrupt took 31097 ns [ 205.880485] 8021q: adding VLAN 0 to HW filter on device team0 14:11:23 executing program 2: [ 208.568696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.010176] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:11:26 executing program 3: [ 209.437864] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 209.444286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.451900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.731376] 8021q: adding VLAN 0 to HW filter on device team0 14:11:28 executing program 4: 14:11:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) sched_getattr(r1, &(0x7f0000000080), 0x30, 0x0) exit(0x0) fstat(r0, &(0x7f0000000280)) 14:11:28 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0x3, 0x81, 0x1}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x1000}, 0xb) ioctl$NBD_DISCONNECT(r0, 0xab08) fstatfs(r0, &(0x7f0000000100)=""/124) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000240)=0x10) r2 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x80800) bind$packet(r0, &(0x7f0000000300)={0x11, 0x18, r3, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000340)="b5d009d8c050a4f293192f695b1b075c11328a17bc34c4c80c46290e79dddaac536db6dfdf2b78fb836bb140afe1ab24718b1b510e2d4004c2e91fc6795185db0210c4f943800cf850f66a565b1ff26e29fb615cd6470ff722ddb3127d4ace778968b8379ab5c0166af685f488cd0d57aa6af6c1d7bed472e5194ca51b726563f79e91f85621c38c3835d3c5e6fb027667d4f9e0bac45b762b40d3c1dffa69bda5ca9ca1", 0xa4) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000400)={0xb7, 0x81, 0x4b07}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x5}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000004c0)={r4, 0x8000, 0x9, 0x4}, 0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000500)={r4, 0x7}, &(0x7f0000000540)=0x8) connect$inet6(r2, &(0x7f0000000580)={0xa, 0x4e23, 0x5, @remote, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000005c0), &(0x7f0000000600)=0x4) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000640)='ip6gretap0\x00') ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000680)={0x3a43, 0x2}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14, r6, 0x332, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x408c4}, 0x20004000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000a80)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000a40)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000ac0)={0x13, 0x10, 0xfa00, {&(0x7f0000000840), r7}}, 0x18) ioctl$KVM_GET_MSRS(r5, 0xc008ae88, &(0x7f0000000b00)={0x5, 0x0, [{}, {}, {}, {}, {}]}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000b80)={0x2, 'team_slave_0\x00', 0x1}, 0x18) r8 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$security_ima(r8, &(0x7f0000000bc0)='security.ima\x00', &(0x7f0000000c00)=@v1={0x2, "217991e8e7d3884a7a79e0e75088c256fa"}, 0x12, 0x3) 14:11:28 executing program 2: 14:11:28 executing program 1: 14:11:28 executing program 3: 14:11:28 executing program 1: 14:11:28 executing program 3: 14:11:28 executing program 2: 14:11:28 executing program 4: 14:11:29 executing program 1: 14:11:29 executing program 3: 14:11:29 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x4028700f) 14:11:29 executing program 0: [ 212.680053] IPVS: ftp: loaded support on port[0] = 21 [ 213.842289] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.848673] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.856567] device bridge_slave_0 entered promiscuous mode [ 213.925608] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.932064] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.939362] device bridge_slave_1 entered promiscuous mode [ 214.007198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.074488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.282570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.355880] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.689015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.696572] team0: Port device team_slave_0 added [ 214.766613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.774018] team0: Port device team_slave_1 added [ 214.843862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.918559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.990103] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.997401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.006336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.073233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.080529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.089298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.873004] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.879490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.886323] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.892751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.900247] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.571968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.717473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.991862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.257425] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.263935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.271570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.532162] 8021q: adding VLAN 0 to HW filter on device team0 14:11:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffe1f, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') sendfile(r1, r2, &(0x7f0000000000), 0x7ffff000) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) 14:11:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6367326f75702e65cb3204cc3232b36b7818a276656e747300fbf44d16312571984531712080f045c7cf33a15a3ee505900df446ce3704c0a9f14b0d71319af7a031a8eb0dec7b8863a20d1a009f9cc2c673ea4ba966d637eae3a5fab259e9444e5b7bf01eb54c79e5f7d94dccec8a85eab318e52cb3a8442088d0704049da7a22fa6ca9cbb1209f2b6ab824b0067ebfc6e4801e6d2222613fb300bc0cbb168bb1616306b4a2e46d60e7ed02a845cc1dced720554f207bfb7519234c4422c66d418d9e0e0fcb04bff61c63141d7a0cf5", 0xea02ffe0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x0, 0x0, @local, 0x800}, @in6={0xa, 0x0, 0x0, @mcast2, 0x7f}, @in6={0xa, 0x4e20, 0x5, @loopback, 0x7f}, @in={0x2, 0x4e21}], 0x74) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0x1013, r0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:11:38 executing program 3: 14:11:38 executing program 1: 14:11:38 executing program 2: 14:11:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ed}) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r1, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000001e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f00)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000002300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002400)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002800)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002840)={0x0, @local, @broadcast}, &(0x7f0000002880)=0xc) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) syslog(0x0, &(0x7f0000000580)=""/4096, 0x1000) 14:11:38 executing program 2: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)="0100000201439f6f2648ba3ae3c3dc0000000000", 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)) 14:11:38 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @rand_addr}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000080)) 14:11:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x4, &(0x7f0000000380)=[{}, {}, {}, {}]}) getpid() perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x50d, 0x5, 0x0, 0x20}, &(0x7f0000000180)=0x98) 14:11:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r0, 0x4, 0x443fc) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 14:11:38 executing program 4: 14:11:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_score_adj\x00') socket$inet(0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000004c0), 0x12) 14:11:39 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x100, {"09bf942dd5df586591c19f16146848cc"}, 0x0, 0x8}, @ib={0x1b, 0x0, 0x0, {"d1f064b7dac843ff92e4af1e727720bc"}}}}, 0x118) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000100)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 14:11:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000001740)={@void, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 14:11:39 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000000)='syz', 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000040)={0x0, @rand_addr, 0x4e21, 0x0, 'rr\x00', 0x20}, 0x2c) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\x00', 0xffffffffffffffff) 14:11:39 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a31a24b6c8c40990ab76bb517d33dff7f4ddf70e7a464ee1614fe5db29f699b45e3a5cf5afd06008b2c4569afb6a84587904212345e3ec1015661322a1c790254"], 0x43) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') memfd_create(&(0x7f00000006c0)='-trusted\x00', 0x2) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000000000e2ddff4cffff0d1e0000e19fcb11d9099ab9105f1e0ecee66ea58a62dfdb966e79a7342a4407080fe38719a4c7d8d2"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') msgget(0x3, 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='security.SMACK64IPOUT\x00', &(0x7f0000000700)='ramfs\x00', 0x6, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)) getitimer(0x3, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)) r2 = getpid() setpgid(r2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r4, 0x4}, &(0x7f0000000540)=0x8) [ 222.832841] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.839601] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:11:39 executing program 2: 14:11:40 executing program 1: 14:11:40 executing program 0: 14:11:40 executing program 4: [ 223.097033] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:11:40 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x100, {"09bf942dd5df586591c19f16146848cc"}, 0x0, 0x8}, @ib={0x1b, 0x0, 0x0, {"d1f064b7dac843ff92e4af1e727720bc"}}}}, 0x118) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000100)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 14:11:40 executing program 1: 14:11:40 executing program 2: 14:11:40 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000440)=0x57e, 0x4) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) 14:11:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) 14:11:40 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/189) 14:11:40 executing program 1: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000500, 0x0, 0x3}, 0x20) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x1f1) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001880)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 14:11:40 executing program 3: 14:11:40 executing program 2: 14:11:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{&(0x7f00000026c0)=@pppol2tpv3in6, 0x80, &(0x7f00000029c0), 0x0, &(0x7f0000002a00)=""/43, 0x2b}}], 0x1, 0x0, &(0x7f0000002d00)={0x77359400}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="04000000000000009843000008000000"], 0x10}}, 0x0) 14:11:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000006c0)={0x7, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}}}, 0x88) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e80)={0x0, @dev, @loopback}, &(0x7f00000007c0)=0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x100, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000540)) 14:11:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000100)={0x100000001}) write$tun(r1, &(0x7f0000001740)={@void, @val={0x11}, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2}, @udp={0x0, 0x0, 0x8}}}, 0x26) 14:11:41 executing program 2: r0 = socket(0x1e, 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x142, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 14:11:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newaddr={0x3c, 0x14, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @dev}, @IFA_LABEL={0x14, 0x3, 'sit0\x00'}, @IFA_ADDRESS={0x8, 0x1, @loopback}]}, 0x3c}}, 0x0) 14:11:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000380)={0x30}, 0x30) fallocate(r1, 0x10, 0x0, 0xcd55) [ 224.205552] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 224.212559] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:11:41 executing program 5: [ 224.476326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:11:41 executing program 0: 14:11:41 executing program 4: 14:11:41 executing program 1: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) symlinkat(&(0x7f0000000300)='./control\x00', r0, &(0x7f0000000340)='./file0\x00') name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000180), 0x0) 14:11:41 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) read(r0, &(0x7f00000001c0)=""/109, 0x22) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:11:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000004440)=[{&(0x7f0000000040)=@in={0x2, 0x0, @rand_addr=0xfffffffffffffc00}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000080)='!', 0x1}], 0x1, &(0x7f0000000780), 0x0, 0x40004}], 0x1, 0x40041) 14:11:41 executing program 0: 14:11:42 executing program 4: 14:11:43 executing program 3: 14:11:43 executing program 1: 14:11:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) read(r0, &(0x7f00000001c0)=""/109, 0x22) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:11:43 executing program 0: 14:11:43 executing program 5: 14:11:43 executing program 4: 14:11:43 executing program 1: 14:11:43 executing program 0: 14:11:43 executing program 3: 14:11:43 executing program 5: 14:11:43 executing program 4: 14:11:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) read(r0, &(0x7f00000001c0)=""/109, 0x22) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:11:43 executing program 3: 14:11:43 executing program 5: 14:11:43 executing program 0: 14:11:43 executing program 1: 14:11:43 executing program 5: 14:11:43 executing program 1: 14:11:44 executing program 3: 14:11:44 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) read(r0, &(0x7f00000001c0)=""/109, 0x22) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:11:44 executing program 4: 14:11:44 executing program 0: 14:11:44 executing program 1: 14:11:44 executing program 5: 14:11:44 executing program 3: 14:11:44 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 14:11:44 executing program 5: 14:11:44 executing program 4: r0 = msgget(0x3, 0x201) msgctl$IPC_RMID(r0, 0x0) 14:11:44 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x509000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4048ae9b, &(0x7f0000000080)=ANY=[@ANYBLOB="fdfdff"]) 14:11:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) 14:11:44 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400000000000000, 0x0) r1 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) [ 227.719765] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 14:11:44 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000200)=0x1000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300), &(0x7f0000000380)=0x8) sigaltstack(&(0x7f0000000000/0x400000)=nil, &(0x7f0000000240)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0), 0x0) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) 14:11:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000001c0), 0x4) sendmsg$kcm(r1, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="f4001100002b2c25e994efd1000a00000009110000040500003a00000000f68ab928abffb7a8d4f32ebdbed828847bba", 0x30}], 0x1}, 0x0) sync_file_range(r1, 0x78, 0x0, 0x4) gettid() openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r0) close(0xffffffffffffffff) socketpair(0x19, 0x0, 0x0, &(0x7f0000000580)) socket$kcm(0x29, 0x5, 0x0) [ 227.863690] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:11:44 executing program 4: [ 227.904046] ================================================================== [ 227.911449] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 227.917950] CPU: 0 PID: 7852 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #63 [ 227.925135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.934906] Call Trace: [ 227.937500] dump_stack+0x306/0x460 [ 227.941136] ? loaded_vmcs_init+0x343/0x590 [ 227.945474] kmsan_report+0x1a3/0x2d0 [ 227.949292] __msan_warning+0x7c/0xe0 [ 227.953122] loaded_vmcs_init+0x343/0x590 [ 227.957291] __loaded_vmcs_clear+0x2fb/0x3c0 [ 227.961710] generic_exec_single+0x17b/0x500 [ 227.966147] ? vmx_get_msr_feature+0x180/0x180 [ 227.970749] smp_call_function_single+0x290/0x500 [ 227.975609] ? vmx_get_msr_feature+0x180/0x180 [ 227.980203] vmx_free_vcpu+0x582/0x8a0 [ 227.984094] ? vmx_create_vcpu+0x7920/0x7920 [ 227.988511] kvm_arch_destroy_vm+0x727/0xcd0 [ 227.992934] kvm_put_kvm+0x100b/0x1cf0 [ 227.996848] kvm_vcpu_release+0xad/0x100 [ 228.000938] ? kvm_vcpu_mmap+0x80/0x80 [ 228.004833] __fput+0x4e8/0xda0 [ 228.008137] ____fput+0x37/0x40 [ 228.011422] ? fput+0x3e0/0x3e0 [ 228.014709] task_work_run+0x467/0x500 [ 228.018623] prepare_exit_to_usermode+0x364/0x470 [ 228.023485] syscall_return_slowpath+0x112/0x880 [ 228.028251] ? __close_fd+0x465/0x4c0 [ 228.032070] ? __se_sys_close+0x72/0x140 [ 228.036144] do_syscall_64+0xe4/0x100 [ 228.039963] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 228.045148] RIP: 0033:0x411051 14:11:45 executing program 4: [ 228.048344] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 228.067335] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 228.075051] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000411051 [ 228.082336] RDX: 0000000000000000 RSI: 00000000007302e8 RDI: 0000000000000007 [ 228.089608] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 228.096880] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 228.104155] R13: 0000000000000001 R14: 0000000000000011 R15: 0000000000000001 [ 228.111454] [ 228.113081] Local variable description: ----error.i@loaded_vmcs_init [ 228.119565] Variable was created at: [ 228.123284] loaded_vmcs_init+0x8a/0x590 [ 228.127359] __loaded_vmcs_clear+0x2fb/0x3c0 [ 228.131778] ================================================================== [ 228.139135] Disabling lock debugging due to kernel taint [ 228.144586] Kernel panic - not syncing: panic_on_warn set ... [ 228.144586] [ 228.151961] CPU: 0 PID: 7852 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #63 [ 228.160538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.169892] Call Trace: [ 228.172492] dump_stack+0x306/0x460 [ 228.176138] panic+0x54c/0xafa [ 228.179365] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 228.184826] kmsan_report+0x2cd/0x2d0 [ 228.188639] __msan_warning+0x7c/0xe0 [ 228.192456] loaded_vmcs_init+0x343/0x590 [ 228.196628] __loaded_vmcs_clear+0x2fb/0x3c0 [ 228.201051] generic_exec_single+0x17b/0x500 14:11:45 executing program 4: [ 228.205470] ? vmx_get_msr_feature+0x180/0x180 [ 228.210065] smp_call_function_single+0x290/0x500 [ 228.214918] ? vmx_get_msr_feature+0x180/0x180 [ 228.219522] vmx_free_vcpu+0x582/0x8a0 [ 228.223436] ? vmx_create_vcpu+0x7920/0x7920 [ 228.227855] kvm_arch_destroy_vm+0x727/0xcd0 [ 228.232282] kvm_put_kvm+0x100b/0x1cf0 [ 228.236192] kvm_vcpu_release+0xad/0x100 [ 228.240263] ? kvm_vcpu_mmap+0x80/0x80 [ 228.244161] __fput+0x4e8/0xda0 [ 228.247473] ____fput+0x37/0x40 [ 228.250774] ? fput+0x3e0/0x3e0 [ 228.254074] task_work_run+0x467/0x500 [ 228.257986] prepare_exit_to_usermode+0x364/0x470 [ 228.262862] syscall_return_slowpath+0x112/0x880 [ 228.267630] ? __close_fd+0x465/0x4c0 [ 228.271456] ? __se_sys_close+0x72/0x140 [ 228.275534] do_syscall_64+0xe4/0x100 [ 228.279348] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 228.284544] RIP: 0033:0x411051 [ 228.287758] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 228.306671] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 228.314386] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000411051 [ 228.321667] RDX: 0000000000000000 RSI: 00000000007302e8 RDI: 0000000000000007 [ 228.328940] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 228.336211] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 228.343485] R13: 0000000000000001 R14: 0000000000000011 R15: 0000000000000001 [ 228.351885] Kernel Offset: disabled [ 228.355507] Rebooting in 86400 seconds..