[ 58.627338] audit: type=1800 audit(1539234501.661:28): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 60.100321] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 64.956579] random: sshd: uninitialized urandom read (32 bytes read) [ 65.375591] random: sshd: uninitialized urandom read (32 bytes read) [ 68.080125] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.79' (ECDSA) to the list of known hosts. [ 73.839067] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 05:08:38 fuzzer started [ 78.410524] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 05:08:43 dialing manager at 10.128.0.26:39089 2018/10/11 05:08:43 syscalls: 1 2018/10/11 05:08:43 code coverage: enabled 2018/10/11 05:08:43 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 05:08:43 setuid sandbox: enabled 2018/10/11 05:08:43 namespace sandbox: enabled 2018/10/11 05:08:43 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 05:08:43 fault injection: enabled 2018/10/11 05:08:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 05:08:43 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 05:08:43 net device setup: enabled [ 83.328340] random: crng init done 05:10:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x5, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0xf}}) close(r2) close(r1) [ 198.707019] IPVS: ftp: loaded support on port[0] = 21 [ 200.092018] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.098518] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.107486] device bridge_slave_0 entered promiscuous mode [ 200.334635] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.341117] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.349917] device bridge_slave_1 entered promiscuous mode [ 200.515033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.688650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.179669] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.327214] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.475096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.482465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.627393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.634647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:10:45 executing program 1: mknod$loop(&(0x7f0000000140)='./bus\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x8000000000044000) io_setup(0xb, &(0x7f0000000240)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 202.089020] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.097720] team0: Port device team_slave_0 added [ 202.324833] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.333171] team0: Port device team_slave_1 added [ 202.646637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.653900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.663138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.937983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.945352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.954297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.965674] IPVS: ftp: loaded support on port[0] = 21 [ 203.144247] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.152145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.161388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.385919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.393816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.403358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.176082] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.182743] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.191464] device bridge_slave_0 entered promiscuous mode [ 205.340812] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.347503] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.356350] device bridge_slave_1 entered promiscuous mode [ 205.568727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.855372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.901002] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.907568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.914785] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.921284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.930462] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.572239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.611529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.873118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.076798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.084068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.324379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.331562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:10:50 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) [ 208.181728] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.190158] team0: Port device team_slave_0 added [ 208.508095] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.516534] team0: Port device team_slave_1 added [ 208.844247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.851391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.860706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.935016] IPVS: ftp: loaded support on port[0] = 21 [ 209.084533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.091632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.101073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.354618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.362440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.371662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.639996] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.647897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.657608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.643608] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.650124] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.658995] device bridge_slave_0 entered promiscuous mode [ 211.861426] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.868293] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.877172] device bridge_slave_1 entered promiscuous mode [ 212.211091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.458339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.154785] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.161305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.168464] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.175031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.184138] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.358972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.637796] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.830528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.840746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.849046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.198785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.206135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:10:57 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=""/251, 0xfb}], 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000180)=0x10000000007f, 0xed) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWSTAT(r1, &(0x7f0000000380)={0x7}, 0x7) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x7, 0x2, &(0x7f00000003c0)}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) [ 215.116211] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.124574] team0: Port device team_slave_0 added [ 215.503164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.511372] team0: Port device team_slave_1 added [ 215.859365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.866684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.875751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.133508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.140629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.149826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.505317] IPVS: ftp: loaded support on port[0] = 21 [ 216.533316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.540907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.550259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.884215] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.892199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.901355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.721623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.954836] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.961337] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.970409] device bridge_slave_0 entered promiscuous mode [ 220.182295] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.377402] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.384054] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.392967] device bridge_slave_1 entered promiscuous mode [ 220.701970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.016828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.056804] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.063396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.070405] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.077032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.086137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.182308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.581731] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.588308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.596574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.164050] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.580220] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.898517] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.966610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.973819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.289421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.296607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.376127] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.384557] team0: Port device team_slave_0 added [ 224.810602] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.819091] team0: Port device team_slave_1 added [ 225.146989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.154204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.163529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.481134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.488424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.497345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 05:11:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) socket$inet6(0xa, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000012c0)}], 0x500, 0x0) [ 225.849304] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.857150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.866685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.224275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.231981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.241087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.639790] IPVS: ftp: loaded support on port[0] = 21 [ 228.603901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.292901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.335428] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.341987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.348947] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.355559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.364678] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.786253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.876342] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.882923] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.891483] device bridge_slave_0 entered promiscuous mode [ 232.022095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.028489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.036854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.458211] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.464975] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.473823] device bridge_slave_1 entered promiscuous mode [ 232.906603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 233.296181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 05:11:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) [ 233.713073] 8021q: adding VLAN 0 to HW filter on device team0 05:11:16 executing program 0: r0 = socket(0xa, 0x80000, 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'veth1_to_team\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff00c07984bd5f54c51bcefa848f4100065e0000000096"]}) setsockopt$inet_int(r0, 0x0, 0x3e, &(0x7f0000000280)=0x2000000000000000, 0xffffffffffffff7b) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r2, 0x7fffffff}, 0x8) 05:11:17 executing program 0: mkdir(&(0x7f0000000000)='./bus\x00', 0x80) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x40) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0x20) open(&(0x7f00000001c0)='./bus\x00', 0xb00, 0x0) llistxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000001000)=""/4096, 0x1000) sendto(r0, &(0x7f0000000100)="b18ee46494899845a1ff5b03f85cbdd4406a31d524d28ecf27dd5cad2a4168fc5fa00457a8d2b6907dfe82d1c01375af57a8a813712888694988d28664f9b00f7d943919432a7a6c3cec17b4d6ce447e592737f54cf864b77fc2addbe147be64d94fabd29277bf2b748e2cd07cca", 0x6e, 0x4, &(0x7f0000000200)=@ethernet={0x6, @broadcast}, 0x80) [ 234.554296] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:11:17 executing program 0: mkdir(&(0x7f0000000000)='./bus\x00', 0x80) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x40) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0x20) open(&(0x7f00000001c0)='./bus\x00', 0xb00, 0x0) llistxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000001000)=""/4096, 0x1000) sendto(r0, &(0x7f0000000100)="b18ee46494899845a1ff5b03f85cbdd4406a31d524d28ecf27dd5cad2a4168fc5fa00457a8d2b6907dfe82d1c01375af57a8a813712888694988d28664f9b00f7d943919432a7a6c3cec17b4d6ce447e592737f54cf864b77fc2addbe147be64d94fabd29277bf2b748e2cd07cca", 0x6e, 0x4, &(0x7f0000000200)=@ethernet={0x6, @broadcast}, 0x80) 05:11:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f0300488dd25d8e6070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 235.083844] bond0: Enslaving bond_slave_1 as an active interface with an up link 05:11:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0105303, &(0x7f0000000400)={0x400000400000}) timer_create(0x800000000, &(0x7f0000000140)={0x0, 0x0, 0x6}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) tkill(0x0, 0x0) [ 235.508641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 235.515928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:11:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x8001, {{0x2, 0x4e21, @broadcast}}, 0x0, 0x2000203}, 0x90) [ 235.998307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 236.005531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:11:19 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x181) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/114) io_setup(0x1000009, &(0x7f00000000c0)=0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000040)={0x77359400}) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x2, 0x2) [ 237.279134] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.287420] team0: Port device team_slave_0 added [ 237.732982] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.741216] team0: Port device team_slave_1 added [ 238.119187] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.126567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.135530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.451157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.458506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.467554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.593177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.703684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.711341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.720814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.942152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.949887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.959035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.677515] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.824966] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.831386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.839728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.011001] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.027148] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.033726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.040725] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.047372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.056446] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.063344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:11:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x80, 0x8000000001}, 0x2c) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') read$eventfd(r0, &(0x7f0000000040), 0x8) [ 245.173647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.083621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.917304] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.923861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.931726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:11:30 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x181) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/114) io_setup(0x1000009, &(0x7f00000000c0)=0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000040)={0x77359400}) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x2, 0x2) [ 247.738956] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.427600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.974897] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.382145] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 251.474117] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.480528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.488746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.886641] 8021q: adding VLAN 0 to HW filter on device team0 05:11:35 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=""/251, 0xfb}], 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000180)=0x10000000007f, 0xed) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWSTAT(r1, &(0x7f0000000380)={0x7}, 0x7) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x7, 0x2, &(0x7f00000003c0)}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) 05:11:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) socket$inet6(0xa, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000012c0)}], 0x500, 0x0) 05:11:38 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x80, 0x8000000001}, 0x2c) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') read$eventfd(r0, &(0x7f0000000040), 0x8) 05:11:38 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='vboxnet1.ppp1-user\x00', &(0x7f00000000c0)='}\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='$]\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='.\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='vboxnet1md5sum\x00', &(0x7f0000000280)='\x00']) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x101000) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xba2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000340)=0x100000001, &(0x7f0000000380)=0x2) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x1cf, 0x1c09, 0x2, 0x304, 0x286, 0x100000001, 0xff, 0x20}, "a8e1183c7d277fe9eb1afd9ea9ca1f273b1fd9837f65ebda381f3c5fb02351355ca1789774a73571999aeec197c4da7e08100ec9748d36bccb80fa18f9034ef7e26e62ade8320925abaf63eb4fd0e8be91e03b5a3b98262f93b2a6402ce332b2e6cb97e7dafef9c2dd14d6042c34b25e81d1e016789924c87f2504714af5d2190fe8f530fae5e96a5befcbcc799b3a05b4432a9a3327e6115f896b882bbf0530131cf4e20d165b592823d69425f4373bbcb75ca1c612521687aedf4abea9797fd83d199f0f0a3d7a86b7b18324af3faa2b49f1356bfd93bd2435245c8e850d9154c29808957a7a675e66fb23bd70f2a3e704acc61a5eb96be66e364fcaa500cb4eec72a1170ea895cab5de305b33373fabad206aab070baf1b28cf1df6eda622f999cfead5af73b952b00c5753d9e4b7688e0fbb63d0b39008a4972cabe1dcbe3eb250b85f8a9ea8eba41dd791503871b72c1b300949584af8c873b313ca84df02cd3fa34e05f374bdc2cc204954c1b15fdbb44bf961bac04ca071b4bd9fc52ca008332240f39bc451ca2e6020fa10b3c06300aaa070d50f7c59830610f73eae75fa39b2ada9e547d3ea1e92d1d712635c15ac1800add6cdef08dc31ed89b6e2c9f98a5a1f0b5f1c66e5952c0886de29bd12fff3c06d666e16033e775ebd7849bc17e8c8714c0d0a62fb059384925bd5fcf89e040e71368d8efa945cb3460d08dffc99d955d499b3015c259ef9896fde877f60301fce8dfb192272a711e316eec29a7d15df35d6b25a6601bdff98b967385b98d437c57acb2fb0bf075d5287dc4e24cb07f48f84cab6f4d5c506792ab063b60dbb878cdb0664c68900ac36c5e153d068985888334364f6661c7d33f1bfffdc50bf083adf2b93f9217c439a8a1e53d77228f22ed3545a3a620978971dcd3cafd1a8af77b066444ce228646ef2f2212311e8dcaa9681bfdf44d2d6f9b6cf8eb154744bd3d879f97a2b4a75038af92ef3fc8617f96fb3e2c50c08669fe738b3a91003f343d3de426a57df21da9fee12b342fad9a9d7c15ee1cfb71398c22c8ce6b11bf0585d6c94ce83305289c36ff2f1daab1a69ca5eb0658fba50ea81c9c03c9e5feba7eb2061e1a7e3487308471ca01e703a5d4914b3caa69756508d4138b3cfe91272f2fbe77fc290420d290d2ad1632d4fb12cd8322bd37c784ff66fe0fbebe665aefa6a39ec44a06b0644789cd55825c92f22a5bb42f6e433e376708f733b14a063384e6b33145d0a2456ea59cfc6266e7cf331dc9f5175562852f2ac6392d5f9a6bfdcf8f1660eea55565b7f8d6730324d1f9b0b622474799ce0a91f3c541b3235f48e4a3292589c5bd9b89dcd54a3793e47953bc59a749e37b5e9d4e23ef6e8d1b9bb545479caa82bcb8841e7cb51f78e0825a971cb77da328d6051125de36aaeb8531ae1e8e0af51463826c5995fc4d69f3157b260550865ec1f849e0ada58f037b9678c977c4307cd4ac34b96be6a4ac45206f60db069269cc65a1c94dedda0cb5f17f1420454ce994a59207c4135207d55f7ed1246229ee22506c8d5719f853ebbd3c68787c38558d66c7ad440baff61fbc75e8a3d29dae5cbf7fc0577f3572a3bc72ee908c74ad2380a0c881a4a761692b46df113f5c38c8f45f1a4fdebe84723e29ba7aec8de04a117786a87657d7075d0ceb66d871406b9128d48eebd0d5484629462d0ab3e7e337a88d5aca465785884b04e108c8d1bd894ed8c5cdd596adb8f5d42de0f285509c1460b3125bb2513f6b65df261c5f90737128f7ac8a7f54d718c992fe6cc25af8463fb3a8d002f77335fb4bed96521d4e97b39e4339c4f99ab82fcd559925f1b13812521d3c8a41a7f7395fe1b2b4080f4d44f8a013e2906bc5ed62f8a0914ae799c166d87b4622940e7a8559c17fb26300b3b6c99928c11237a1d65d0e50ed517e074f0db6ae4ee216281d872454f19120bdabfe8a61fc3dd6f42d3b03222026b166d40d53c6bdd056ec54058558b0aecdaf59b8c3d72fe1177fd34201ed1b660a91ff3ae18c1794eb5181ffebf4de59c025ecf355fe8a961146f2173cb8da28e6bb2121ddfb30fc7597996b321ae0da6b59c7510dcb4e48c990d5934e27874a85b14fad8d18a467be0d29906621b016c531c04d7e4971e055cc54847b82179959e43c2c8e84300af950012ccc77644ecd87e2d6f828e79a9c6b8511ab21ebea23d1eb2237b328a5f45f79b0c0f7c33fe52780df28d83f86ff93d3e2ae6b38167bf2546180963d27788d6b161186a66c1d780801c40087d0b28c758a6e34f22ebca6bff4239c3e4c383d025cabd05937321bacde013234b7bb9dec4df3f8f1264a9c9440aacf826baea1facf94df97c1e00f54ae0a19b83cf48721a0ff29fe52a681b2abb0a9269eb24bd1fd30344d77f351abe79edd49440d63ddba55795b95f704319cf975bb008ec5298fc5897849f94e3a669481b7b3eb16141e0865ab81a2fcfe7ec266f69527dac031cc071bd664c58ffe320f46ce2228f9b770a033279d6db8182485a68edbcca4c5d4d713406de8d01cf1c6da5941266ab504afbf1cdc1852293e8db132af8d644df358bb3ac2f9afb0b8d56c2e7a22306c462183d7a09849dc918a179afcceb9f0323eeeb94f73aeeee0d56d55f10b7bd7e87c7eec9bc120d814bb73cdcc0e7a0bec7b8399d25ae9e9c92d26e66c05929b829d8191499428e95852da3bf11b7faef20c084e7b433ca8333b2b585911aaab50dfc7319356d7dff42cbdc6a789d0f310a18d0f166d5b4bd481bb6e408898e05e1d85bb7f326f6295ddcf5f6c1aeaf20f470a8c539302cbfee5a381f4abf03cb1f5b039b0cd4b8e3d52621e904f1ba966c9046920fcb5c245e2481e04fb2cd22ee77d16686400718a49a4322fa428d5ac4f0a035d8a611e16af2bc7c5cdd3d18eaf0009fb9f0aae0832c34ff0ea91acdff58a2a6693795ff47cd67ac38510b2657aa330ec02a73cd96d3d1a3ba3b2968e0638591970d5c826137a6d674153258259c848ad7b903d7310e066b5f238384f5ccb4c747ea82900fc5610295110153dc865a76bcd8d11acf1c32b45d5c6638355dd66b8ca6351c197d9c9cfd4fe1e0a3a128430dfa4cd4e6062a3d5b427cc22073bd4a9ab689bd08bfd60532d044f3802d049a5c6518ee802cdf3ab52e544b0b744c7d72c106094ca958aed5868eefb007d5518e7e3bd8b71514233ff7b950c49c7a039057b5597e59f5695c1e01ac3652baafae3a8766b7c80fa59e6f85d066c5f6078145b9f4ec39da1960d6e8e4ef7e4f1179f175a83c1bfba8cef5da96af6f9095825f5af3fcfe6ae6604f89a027b772d2765023bb6fb01fe5593c6ecc9714118067bf0d94c103b5f43255b2346c12dd5c6d198fa4dcc92462a0c17280c95aa36217d8891f44d7a319d10b74cd80e699764c6a7d6b6b23f05ad9d9f037de8f328a11b7e45e719204d4d76421c85172d8dfef2a704dbd932d69879d5304cf8e351f7efbe95a2bbc653bf418c1038a0e3d7a5da837d575449c97ecd38e0cabb9cb2a49fb02aac1ef939f94dee67e242488e5c001568c36ef696965cf75afaf34ee898558016f8b6c9aa63de9acc74d37b6af700d56f8245bc46d066c4f0cc50743208563f8cf826dad182f2c7466a9c27dea2d776e17d1e1309cc80ff7dc5598438941a5b06403753b4668d2c0f9f1b30a9d693a4230191de76fd81ae6f6306e4a829dd37582dff0916f97265e5c44687b98c06ed8b22e0526b037bfaf77240c48b5037efafa9798468140ded95d70caf95c53c2b90c4c78d6b1c2ebd87325228d03ade169c439d2cf29ace40047e2119ef2b484857b324235be1001cd012cd7046fed4cacd2856369a17ebaf579a153180dd981d21a683127c55e779db7cf3fd58464df38479bd74731a8ee266b92063087021b16d2c6f3a3f1fbfa171bdbfb90158cf51d6f09d38c66b947b01950d778fb84d12de875b5a9f5e8b9accc3b0b825066faca5fb8fb60f63e4a5fd039caa1a0869d5179fc61a76346837880daf53ff0ab3481bbc12990052257ffa7e32aead2087c7e677a18987a3d222285966bb69bf41f94c1890e86438dd9c71d48eb1ef9bd243a2c4bef962fde1cf6c4223a6ffcdd7a63c4eb091f86861fa49ff6741dc1a678273616924115761b7489cc015f7cbcaeb5b50ab65f36004b8b002b98f50454d19cd87558b829651bb1975cf39205b2c119467fe8376714c33639140a3371897cf1899ca9c60a63f13abfd344b630e562a117f10b4af9d0d3451e9e69b522efe24aa36a8b31200b992604fbc490423fe6798764cbc87b551cc3698eb4da803ffd43db02373c13040c4c7fa886f7f6f76d2b58a4dbf19d0eaabd36db7885dff89dd040a354924dcacc560b8a04f4eb9c894712688f013b412d019ca463dbfff102c0b7ab2a92f5d59806aedcd2b46f2b0aeb09d314bed664eae96fbc4c1b27a84b17b81d4e7c8cafdde58c248c0ca35cb5f4bc9af907c55c5283a0879f259d744c9234a51ba5e8967dfbf9373afd5e6657dd2aac51d8aae73715663cd79ec9b7ffdeced2f2253751e742bc6f761a92d7c9537cc906c7504fc377f500d88b52738a73474ca5986e27c33a5b455cbf36f083778821e22b07e93c4eab89cda109f29f6fed90c7bc0de4a9466b412b6c620358a783763ab4de050be1081699b745c7c462acca9a8ad87d221ef0409324c8cceccfc83f6cd9bbcef985edd3c093d077ca88948acca15015ac618d75b1fceabf30e56b17ea863b3cf038e911bb8bf606b25c0e050c81fd365949dd97357967f50f72ca8b37914b3d85b1578654ce384158f261bf7c0aa79010b7247a3e9c812173aacfb47d45bad70fad1f56c62c9340ad2ef11e415c4e48d4d35e95c790d0d1f507535d3520c83f9525df24220c06dbe4be574345cc15cc0abcabd2f37293e84bc168dd5936b31018048aa78d6fd7b711f69f6b6036a56c4688993070d469cdd74e5e516b2c1e8ecc6331cf621d66af17ba8d1b63f7a1225ec61bace8495db7a7547aa4effebd5870a972033630c034a0311cdc2e631af9b6a33dfca89e6906e00be19401029e9bb45c32fa7305ad45bd756b7205773cac08b8583289f0793319e179a0d4c571235aca00f62ad3ebcc09d34ff7490b92d462f533aea2fdcbdd8039c0d9ce88d71afac3d79172b5b96438ea7501c74b9558890559de7e4bc6a66cb0973db01a18524d46929c001e941ff1b34e2447cb0f872e1a37244bb1c91c88bf97811f7d9e7b4a7177c170c782d291adb37ef02bf560464401b2d8913710c7ee926b011c3000b67a79f7ed1a1bde0004deb659e6e590f6a52816b331cb8cacce9098732592f8f0e60f39550d49b55f0bf47af653c39c8ac59b6bcdc184bd8c4266dff30edfd937c403f24bb2015d9576276cca2650a49b2c19e81ec8078a881cfb23a47eb2dd70aca41587fb12f47a2757872c702a62d60fa18ebaaaf530bc45974d9d0c6178fbb44226d392e318a30672415ce1aa1b6ac60b2b628dd644748d4a89ac27109eb56a0bcc65e7c48f3f2c035b63a606f938ea036bb53b82a5340129e1da83198fde76d81a714fc3902e013a63de012fc5b3dabc4499ebddc5045dca39ab820700bf182bf3b041b77b7897c5a3021db3f8c52709ad3bd8bc91445b38ea0f3c687b129ecb568111d2900229ae0e76a9ac40b7dbf5b7936e3b8e89d0b95bfc14bdf43e15fcee43467278bb9dedd2f4c16e67cb4e7bd6c926de3fbdb3692a9abf9359c16aeabd78d3", [[], [], [], [], [], [], [], [], [], []]}, 0x1a20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001e00)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000001e40)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001e80)={r2, 0x57, "f580198027885b594aebf9650add14eaf1c9e943d978c2b44bfef6c507df03ac21590dea4a61fb453f2fbf3f16612b6f314a8a6d1daa61401a3a1ac4dcc9415c23c27676906a79edc620c741f367b46bceeea49a21c005"}, &(0x7f0000001f00)=0x5f) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000001f40), &(0x7f0000001f80)=0x4) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001fc0), &(0x7f0000002000)=0x8) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000002040)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000002080)='/dev/vhci\x00', 0x6600, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000020c0), 0x4) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000002100)=""/55) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000002180)={0x0, 0x10001, 0xd8, &(0x7f0000002140)=0x5}) r4 = syz_open_dev$midi(&(0x7f00000021c0)='/dev/midi#\x00', 0x512, 0x200000) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000002200)=0x1) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000002240)) add_key$keyring(&(0x7f0000002280)='keyring\x00', &(0x7f00000022c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000002300)) write$uinput_user_dev(r4, &(0x7f0000002340)={'syz1\x00', {0xde01, 0x0, 0x0, 0xffffffffffffff2c}, 0x16, [0x0, 0x800, 0xb9, 0x8001, 0x20, 0x8, 0x4, 0x0, 0x1, 0x9, 0x0, 0x10001, 0x9000000000000, 0xff, 0x3, 0x1ff, 0x7, 0xac73, 0x3, 0x2, 0x2, 0xa1, 0xfff, 0x23, 0x5, 0xffffffff00000000, 0x101, 0x8001, 0x7, 0x9, 0x0, 0x101, 0x1, 0x0, 0x2, 0x9, 0x40, 0x3ff, 0x4, 0x4, 0xff, 0x5, 0x4, 0x7, 0x8, 0x4, 0x0, 0xfff, 0x4, 0x8, 0x9, 0x3, 0x401, 0xb, 0x0, 0x81, 0x6, 0x7, 0x1000, 0x204000000000, 0xfffffffffffffeff, 0x3, 0x0, 0x3f], [0x1, 0x5, 0x6cc, 0x8, 0x7, 0xfffffffffffffffd, 0x10001, 0xffff, 0x3, 0x3, 0x7, 0x380, 0x7, 0x3, 0xfffffffffffffffc, 0x8, 0x20000, 0x9, 0x5, 0x9, 0x2, 0x9, 0x596e, 0x4, 0x9, 0x9, 0x7f, 0x7fffffff, 0x0, 0x10000, 0x20, 0x1, 0x6, 0x5, 0x8, 0x0, 0xfffffffffffffffa, 0xfffffffffffffff9, 0x3, 0x7, 0x1, 0x3, 0x7, 0x9, 0x5, 0x7, 0x8, 0x4, 0x8, 0x3, 0x84, 0x1ff, 0x1, 0xfffffffffffffffb, 0xe0b3, 0x7000000, 0xc1, 0x4, 0x100000000, 0x3dc00000000, 0x7, 0x30, 0x5, 0xffffffff], [0xffffffffe2a6ea7d, 0x1, 0x9, 0x100, 0x6, 0x8, 0xff, 0x0, 0x10000, 0xfffffffffffeffff, 0x6, 0xff, 0x5, 0x5, 0x9eba, 0x8, 0x1, 0x7, 0xfffffffffffffe00, 0x2, 0x101, 0x6, 0x7fff, 0x0, 0x20, 0x9, 0x6, 0x3, 0x87, 0x5, 0x4, 0xffffffffffffffb2, 0x6, 0x7, 0x6, 0xffff, 0x8, 0x5, 0x1, 0x7fffffff, 0x1000, 0xfffffffffffffffa, 0x20, 0x1, 0x0, 0x1ff, 0x8, 0x0, 0x5, 0xffffffffffffffea, 0xff4, 0x0, 0x4, 0x1000, 0x1f, 0x7fff, 0xff, 0x5, 0x360, 0x1, 0x3ff, 0x4, 0x10001, 0x9], [0x5, 0x3ff, 0x3ff, 0x1, 0x7fff, 0x4, 0x81, 0x100000000, 0x81, 0x6, 0x4, 0x800, 0x7b, 0x10000, 0x8, 0x4, 0x6, 0x100, 0xf2, 0xb57, 0x2, 0x20, 0x3f, 0x4, 0x6, 0x1, 0x1, 0x100000001, 0x3ff, 0x2, 0x4, 0x2, 0x7, 0x10001, 0x1, 0x3, 0x4, 0x1, 0x8, 0x4, 0x5, 0x80000000, 0x3f00, 0xfffffffffffffffb, 0x4, 0x8, 0x9, 0x80000001, 0x2, 0x0, 0x100000001, 0x1, 0x80, 0x51311562, 0x9, 0x9, 0x8, 0x9, 0x5, 0x7, 0x4, 0x5, 0x7, 0x4d]}, 0x45c) r5 = creat(&(0x7f00000027c0)='./file0\x00', 0x40) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000002800)={0x99, 0xa8c, 0x7, 0x4, 0x4f}, 0x14) ioctl$EXT4_IOC_RESIZE_FS(r3, 0x40086610, &(0x7f0000002840)=0x9) write$uinput_user_dev(r4, &(0x7f0000002880)={'syz0\x00', {0xc2f, 0x0, 0x7, 0x8}, 0x15, [0x2, 0x4, 0x5, 0x3f, 0x0, 0x9, 0x7ff, 0x3, 0x1000, 0x400, 0x1, 0x2, 0x80000001, 0xffffffffffffff84, 0x2eb, 0x9, 0x4800000000, 0xd695, 0xec, 0x204, 0x4, 0xdd, 0x652, 0x25f, 0x46de, 0x4b6, 0x5, 0x4, 0x2, 0x1, 0x5, 0x2, 0x0, 0x3, 0x2b2, 0x6, 0xffffffffffff0ab2, 0x5, 0x4, 0x9, 0x5, 0x3, 0x2, 0x4, 0x100000000000, 0x0, 0x1, 0x4, 0x6, 0x100000001, 0xed15, 0x5, 0x4, 0x9, 0xfff, 0x200, 0x6, 0x1, 0x0, 0x5, 0x3, 0x2, 0xea, 0x1], [0x3, 0x800, 0x4, 0x80000001, 0xfffffffffffffffa, 0x9, 0x101, 0x4, 0x2, 0x112, 0x7, 0x0, 0x8, 0x100000001, 0x1ff, 0x8, 0x42, 0x4, 0xf71, 0x1, 0xfff, 0x4, 0xffffffffffffff80, 0x4, 0x4, 0x5, 0x3ff, 0x1, 0x100, 0x1, 0x7, 0x9, 0x21a, 0x9, 0x4, 0x5, 0x5, 0x5, 0x7, 0xaea, 0x7f, 0x2, 0x6, 0x6, 0x7, 0xaf, 0xd1e, 0xfff, 0x8, 0x40, 0xff, 0x6, 0x6, 0x8, 0x5, 0x2, 0x4, 0x41, 0x7, 0xfffffffffffffffb, 0x4, 0x80000000, 0xffffffffffff79e9, 0x1998], [0x1000, 0x8, 0xbf06, 0xfff, 0x8, 0x7ff, 0x8, 0x8, 0xc1, 0x4, 0x81, 0x7, 0x800, 0x5, 0x5, 0x1f, 0x100, 0x5, 0x8, 0x2, 0xfffffffffffffeff, 0x4, 0x37, 0x9, 0x9, 0x8, 0xdb56, 0xb4, 0x6, 0x7, 0x0, 0x3, 0x248b34d7, 0x100000001, 0x3, 0x2, 0xff, 0xc86, 0x8, 0x6, 0x5, 0x3ff, 0x0, 0x9, 0x0, 0x3, 0x6, 0x80000001, 0x0, 0x8000, 0x3, 0xfc, 0x8b5, 0x3ff, 0x5, 0x8, 0x8, 0x8a7b, 0x401, 0x8000, 0x2, 0x8, 0x3f, 0x5], [0x2b0, 0x8, 0x6, 0x4, 0x8, 0x10001, 0xa434, 0x1, 0xffffffff, 0x2, 0x0, 0x800, 0x2, 0x9, 0x7, 0x1ff, 0x9, 0x4390, 0x6, 0x100, 0x0, 0x8, 0x7, 0x100000000, 0x8, 0xffffffff, 0x101, 0x8, 0x9, 0x0, 0x41, 0x5, 0x2, 0x3, 0x400, 0x800, 0x4, 0x3ff, 0x100000000, 0xffff, 0x7aed, 0x975, 0x6f3e, 0x4, 0x8, 0xe3, 0x101, 0x0, 0x8, 0x7, 0x5, 0x8001, 0x80, 0x1, 0x7, 0x40, 0x5, 0xffffffffffffffff, 0x2, 0x7e00000000, 0x2, 0xe87, 0x1, 0x40]}, 0x45c) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000002d00)={0x5, 0x80000000, 0x3}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002e40)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000002e00)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002e80)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000002d80)=[{0xc, 0x0, [0x1f, 0x9, 0x3, 0x4, 0xd9, 0x7f, 0x6, 0x1e4aacbb, 0x9, 0x16, 0x800, 0x7ff, 0x7, 0x4, 0xab5, 0x3]}], r6, 0x1, 0x1, 0x48}}, 0x20) 05:11:38 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000640)={'#! ', './file0', [], 0xa, "0965bd3f0218ef317aeb068dffa4a8cdc2bfc7fb67e332c8aac391d5ce2f8d78f746ed57cb6b707b4521ac163fe4fc7cbcda290f2827882713f42e34804b495d732e312872dd90268e489244eb3b09d7ee164ba57b1e537b7d1a74318a5463fa04d2b765f1bf472937074ed22ec85d389f6e1ecd1bad8440194cba980990bd7a01ad63e091cb3d96a4352585766e3544072f19459ad3f058f49c298071d5caa01698ad7f0afc047592aa648a989318c420758b19b2dfd47d6dcc1a81a5c5de087aa7a6a97686a6f97d175c05852d9cba74d81cb84f76c2732b461f4a20042061761c86f884b707caffeddf3c70b8dbfa3d705e67e2"}, 0x100) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/116, 0x200002f4}], 0x2}, 0x0) 05:11:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x8000000000002eb, 0x8000) 05:11:38 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:38 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:38 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000080)='stat\x00') 05:11:39 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:39 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702e637075002a508f7202071613637ace8933066c294bb15e7e1a203dfd5893698f1ace33f72a3f2c7f5f5cca9324913053f73693537781e18477f9b1a223127b6c43f374e465f506ae88ff4091256188a1ce8bf2d2e738a1fbc7620db08e972cc1ebb3e4a8a566e4576f5eb174399be3cba55013960112d03559fdf8645eabbea015221705d0c00d581f626457121ebcb90cbbfde2cc1038b2b8f128c9e502e30b547a8e17d731e512276118c7b74609d46a5a9fa601a41a388348bf289093cdd39400fba1a5eebbd2c91d", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x2000006100) ftruncate(r1, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000080)) chroot(&(0x7f0000000280)='./file0\x00') timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000040)) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) fsync(0xffffffffffffffff) faccessat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000300), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f0000000340)=""/62) tkill(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, &(0x7f0000000300)) unshare(0x40000000) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000380)={0x7fffffff800}) [ 256.710505] IPVS: ftp: loaded support on port[0] = 21 05:11:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) socket$inet6(0xa, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000012c0)}], 0x500, 0x0) 05:11:40 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:40 executing program 1: move_pages(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)=[0x9, 0x0], &(0x7f0000000400), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 257.139402] IPVS: ftp: loaded support on port[0] = 21 [ 257.203518] IPVS: ftp: loaded support on port[0] = 21 [ 259.203682] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.210173] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.218903] device bridge_slave_0 entered promiscuous mode [ 259.364853] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.371362] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.380106] device bridge_slave_1 entered promiscuous mode [ 259.523709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 259.708095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 260.177321] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 260.290065] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 260.371225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 260.378431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.457803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 260.465363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.710562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 260.718453] team0: Port device team_slave_0 added [ 260.799038] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.806815] team0: Port device team_slave_1 added [ 260.887606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.969404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.050312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.057729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.066772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.146944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.154518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.163545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.040193] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.046715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.053754] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.060187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.068661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.282141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.297107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.598554] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.900226] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.906739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.915060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.216624] 8021q: adding VLAN 0 to HW filter on device team0 05:11:51 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000380), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 05:11:51 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:51 executing program 1: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf4010000, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x4000000086}, 0x98) 05:11:51 executing program 0: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) 05:11:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) socket$inet6(0xa, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000012c0)}], 0x500, 0x0) 05:11:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @ipv4=@broadcast}]}]}, 0x20}}, 0x0) 05:11:51 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:51 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x102) creat(&(0x7f0000000400)='./file0\x00', 0x0) 05:11:51 executing program 1: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf4010000, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}}, 0x0, 0x0, 0x0, 0x0, 0x4000000086}, 0x98) 05:11:52 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) close(r0) 05:11:52 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:52 executing program 0: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000380), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 05:11:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 05:11:52 executing program 2: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x0, 0x0) 05:11:53 executing program 1: 05:11:53 executing program 4: 05:11:53 executing program 0: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040), 0x0, 0x0) 05:11:53 executing program 3: 05:11:53 executing program 5: 05:11:53 executing program 2: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/71}, 0x4f, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040), 0x0, 0x0) 05:11:53 executing program 4: 05:11:53 executing program 1: 05:11:53 executing program 3: 05:11:53 executing program 5: 05:11:53 executing program 4: 05:11:54 executing program 3: 05:11:54 executing program 1: 05:11:54 executing program 3: 05:11:54 executing program 4: 05:11:54 executing program 0: 05:11:54 executing program 1: 05:11:54 executing program 3: 05:11:54 executing program 5: 05:11:54 executing program 4: 05:11:54 executing program 2: 05:11:54 executing program 0: 05:11:54 executing program 1: 05:11:55 executing program 3: 05:11:55 executing program 2: 05:11:55 executing program 4: 05:11:55 executing program 5: 05:11:55 executing program 3: 05:11:55 executing program 0: 05:11:55 executing program 1: 05:11:55 executing program 4: 05:11:55 executing program 2: 05:11:55 executing program 0: 05:11:55 executing program 5: 05:11:55 executing program 3: 05:11:56 executing program 1: 05:11:56 executing program 4: 05:11:56 executing program 2: 05:11:56 executing program 5: 05:11:56 executing program 0: 05:11:56 executing program 1: 05:11:56 executing program 3: 05:11:56 executing program 4: 05:11:56 executing program 2: 05:11:56 executing program 5: 05:11:56 executing program 0: 05:11:56 executing program 3: 05:11:57 executing program 1: 05:11:57 executing program 5: 05:11:57 executing program 4: 05:11:57 executing program 0: 05:11:57 executing program 3: 05:11:57 executing program 2: 05:11:57 executing program 1: 05:11:57 executing program 4: 05:11:57 executing program 0: 05:11:57 executing program 5: 05:11:57 executing program 3: 05:11:57 executing program 1: 05:11:58 executing program 2: 05:11:58 executing program 0: 05:11:58 executing program 4: 05:11:58 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0x5, 0x4, 0x200, 0x8, 0x0, 0x0}, 0x2c) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000180)=""/30) 05:11:58 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000000)=0x50e37a4526ea772e) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) close(0xffffffffffffffff) 05:11:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="3b00000002"]}) 05:11:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000001c0), 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000240)=@in6, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="2d93f889b8cdb3ebf45e20e91125c74d46ac68974957bcb3b7c5942258cb3645b5", 0x21}], 0x1}, 0x0) 05:11:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f00000011c0)="16", 0x1) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x4) 05:11:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffb) 05:11:58 executing program 1: socket$inet6(0xa, 0x1, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000500)='security.evm\x00', 0xd, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000003c0)=@sha1={0x1, "0940a368fe8e76a2221dad2adc37d8ee597bc878"}, 0x15, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000340)={{0x2, 0x0, @dev}, {0x0, @random="5d982d051370"}, 0x0, {0x2, 0x0, @multicast1}, 'veth0_to_bridge\x00'}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x3f8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) 05:11:58 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c301a8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f00060000030000000000000000010100000000000000000000001000000000000100895fc5d400000012a85f001a4b00feffffffffff04000000aaaaaa51ecbfe72f58954c0000007000000087000000a0000000415544495400000006000000f9ffff7e0000000000000100008000000000000008000000000000000000000000040000"]}, 0x1a8) 05:11:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=[{0x34, 0x10e, 0x2, "25e9d6877fa6b75eb9399b165ea6b957bc4185fefe91d8b76152c823a8300751855b128943c2"}], 0x34, 0x1}, 0x800) 05:11:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffb) [ 276.068565] kernel msg: ebtables bug: please report to author: target size too small 05:11:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000080)=ANY=[], 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:11:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x0) sendmsg(r1, &(0x7f0000000540)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=[{0x34, 0x10e, 0x2, "25e9d6877fa6b75eb9399b165ea6b957bc4185fefe91d8b76152c823a8300751855b128943c2"}], 0x34, 0x1}, 0x800) 05:11:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000001c0), 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000240)=@in6, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="2d93f889b8cdb3ebf45e20e91125c74d46ac68974957bcb3b7c5942258cb3645b5", 0x21}], 0x1}, 0x0) 05:11:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f00000011c0)="16", 0x1) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x0, 0x4) 05:11:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") fgetxattr(r0, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000000), 0x0) 05:11:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x65ba64e4) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) 05:11:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000080)=ANY=[], 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 277.032201] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:12:00 executing program 1: [ 277.086911] hrtimer: interrupt took 32219 ns 05:12:00 executing program 2: 05:12:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x65ba64e4) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) 05:12:00 executing program 3: 05:12:00 executing program 5: 05:12:00 executing program 1: 05:12:00 executing program 2: 05:12:00 executing program 3: 05:12:01 executing program 0: 05:12:01 executing program 4: 05:12:01 executing program 5: 05:12:01 executing program 1: 05:12:01 executing program 2: 05:12:01 executing program 3: 05:12:01 executing program 4: 05:12:01 executing program 5: 05:12:01 executing program 4: 05:12:01 executing program 2: 05:12:01 executing program 1: 05:12:01 executing program 3: 05:12:02 executing program 0: 05:12:02 executing program 5: 05:12:02 executing program 2: 05:12:02 executing program 1: 05:12:02 executing program 4: 05:12:02 executing program 3: 05:12:02 executing program 0: 05:12:02 executing program 5: 05:12:02 executing program 2: 05:12:02 executing program 4: 05:12:02 executing program 5: 05:12:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x1b4, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2}, 0x1c) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000280)) recvmmsg(r0, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=""/18, 0xf}}], 0xba496d, 0x12000, &(0x7f00000009c0)={0x77359400}) 05:12:03 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) dup3(r0, r1, 0x0) 05:12:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab55bb0a065ce1ade97447360e37038b", 0x10) r1 = accept4(r0, 0x0, &(0x7f00000001c0), 0x0) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000240)=@in6, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="2d93f889b8cdb3ebf45e20e91125c74d46ac68974957bcb3b7c5942258cb3645b5", 0x21}], 0x1}, 0x0) 05:12:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f000000ac80)=[{{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="100000002900000004000000"], 0xc}}], 0x1, 0x0) 05:12:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000400)) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000007c0)=""/4096, &(0x7f0000000200)=0x1000) 05:12:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz'}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffb) r0 = socket(0x1000100000010, 0x20000000000003, 0x0) write(r0, &(0x7f0000000000)="1f0000001e0007f1fff57f02000200000000010053d6445f89390836be381b", 0x1f) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ddff8), 0x0) 05:12:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x1b4, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2}, 0x1c) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000280)) recvmmsg(r0, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=""/18, 0xf}}], 0xba496d, 0x12000, &(0x7f00000009c0)={0x77359400}) 05:12:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='limits\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000027, 0x0) 05:12:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x1fffffc, 0x100000010a0801fe) 05:12:03 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd'}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000580)='proc\x00', 0x0, &(0x7f00000005c0)='/proc/self/net/pfkey\x00') 05:12:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="f54dce2fa36004ca8cc0ba561694437109a574bb5d317de18239d7dc3eac7975b697889abe7a96f659bc770fed733a00f0e1d06b654bf8a7f6231c5b88a158fad7ba89b3e25b0921f466359e73c5de0f4a48681535a324048274cac25a799f2f79da2038464ba625bcdd9ac5d105e4830c03c4cc0758e0737500c95fdbb93dbff967dc38438f30d1fa3964fcbdb1e5379d7d792fb823c29da5f61df2fc8eb5cf2903609f42ca659497f95f2a15328339c835f788948f38e5acc1344a833f795a620e0d1a", 0xc4}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}], 0x1}, 0x0) 05:12:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r0, r2, &(0x7f0000000000), 0x800000bf) 05:12:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:12:04 executing program 0: 05:12:04 executing program 4: [ 281.367977] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:12:04 executing program 2: [ 281.609508] ================================================================== [ 281.616958] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 281.624606] CPU: 0 PID: 8218 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #66 [ 281.631807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.641179] Call Trace: [ 281.643804] dump_stack+0x306/0x460 [ 281.647470] ? vmx_set_constant_host_state+0x1778/0x1830 [ 281.652961] kmsan_report+0x1a2/0x2e0 [ 281.656818] __msan_warning+0x7c/0xe0 [ 281.660663] vmx_set_constant_host_state+0x1778/0x1830 [ 281.665989] vmx_create_vcpu+0x3e6f/0x7870 [ 281.670272] ? kmsan_set_origin_inline+0x6b/0x120 [ 281.675155] ? __msan_poison_alloca+0x17a/0x210 [ 281.679875] ? vmx_vm_init+0x340/0x340 [ 281.683792] kvm_arch_vcpu_create+0x25d/0x2f0 [ 281.688333] kvm_vm_ioctl+0x13fd/0x33d0 [ 281.692365] ? __msan_poison_alloca+0x17a/0x210 [ 281.697092] ? do_vfs_ioctl+0x18a/0x2810 [ 281.701188] ? __se_sys_ioctl+0x1da/0x270 [ 281.705369] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 281.710239] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 281.715121] do_vfs_ioctl+0xcf3/0x2810 [ 281.719055] ? security_file_ioctl+0x92/0x200 [ 281.723588] __se_sys_ioctl+0x1da/0x270 [ 281.727609] __x64_sys_ioctl+0x4a/0x70 [ 281.731535] do_syscall_64+0xbe/0x100 [ 281.735373] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.740582] RIP: 0033:0x457519 [ 281.743801] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.762812] RSP: 002b:00007f8345d45c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.770558] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 281.777845] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 281.785141] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 281.792429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8345d466d4 [ 281.799722] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 281.807036] [ 281.808678] Local variable description: ----dt@vmx_set_constant_host_state [ 281.815702] Variable was created at: [ 281.819449] vmx_set_constant_host_state+0x2b0/0x1830 [ 281.824680] vmx_create_vcpu+0x3e6f/0x7870 [ 281.828926] ================================================================== [ 281.836307] Disabling lock debugging due to kernel taint [ 281.841773] Kernel panic - not syncing: panic_on_warn set ... [ 281.841773] [ 281.849177] CPU: 0 PID: 8218 Comm: syz-executor5 Tainted: G B 4.19.0-rc4+ #66 [ 281.857767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.867145] Call Trace: [ 281.869769] dump_stack+0x306/0x460 [ 281.873462] panic+0x54c/0xafa [ 281.876724] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 281.882209] kmsan_report+0x2d3/0x2e0 [ 281.886052] __msan_warning+0x7c/0xe0 [ 281.889899] vmx_set_constant_host_state+0x1778/0x1830 [ 281.895218] vmx_create_vcpu+0x3e6f/0x7870 [ 281.899494] ? kmsan_set_origin_inline+0x6b/0x120 [ 281.904370] ? __msan_poison_alloca+0x17a/0x210 [ 281.909087] ? vmx_vm_init+0x340/0x340 [ 281.913101] kvm_arch_vcpu_create+0x25d/0x2f0 [ 281.917634] kvm_vm_ioctl+0x13fd/0x33d0 [ 281.921655] ? __msan_poison_alloca+0x17a/0x210 [ 281.926360] ? do_vfs_ioctl+0x18a/0x2810 [ 281.930450] ? __se_sys_ioctl+0x1da/0x270 [ 281.934633] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 281.939512] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 281.944386] do_vfs_ioctl+0xcf3/0x2810 [ 281.948338] ? security_file_ioctl+0x92/0x200 [ 281.952885] __se_sys_ioctl+0x1da/0x270 [ 281.956899] __x64_sys_ioctl+0x4a/0x70 [ 281.960816] do_syscall_64+0xbe/0x100 [ 281.964648] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.969863] RIP: 0033:0x457519 [ 281.973094] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.992033] RSP: 002b:00007f8345d45c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.999781] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 282.007073] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 282.014361] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 282.021646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8345d466d4 [ 282.028931] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 282.037230] Kernel Offset: disabled [ 282.040878] Rebooting in 86400 seconds..