[ 59.275605] audit: type=1800 audit(1539267724.307:27): pid=6150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 60.858006] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.855906] random: sshd: uninitialized urandom read (32 bytes read) [ 63.375989] random: sshd: uninitialized urandom read (32 bytes read) [ 66.119677] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.60' (ECDSA) to the list of known hosts. [ 72.064827] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 14:22:19 fuzzer started [ 76.711055] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 14:22:24 dialing manager at 10.128.0.26:39089 2018/10/11 14:22:24 syscalls: 1 2018/10/11 14:22:24 code coverage: enabled 2018/10/11 14:22:24 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 14:22:24 setuid sandbox: enabled 2018/10/11 14:22:24 namespace sandbox: enabled 2018/10/11 14:22:24 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 14:22:24 fault injection: enabled 2018/10/11 14:22:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 14:22:24 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 14:22:24 net device setup: enabled [ 81.327867] random: crng init done 14:24:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xffffffe4}], &(0x7f0000000280)='GPL\x00', 0x1, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) [ 197.008078] IPVS: ftp: loaded support on port[0] = 21 [ 198.421367] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.427928] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.436731] device bridge_slave_0 entered promiscuous mode [ 198.600845] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.607496] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.616656] device bridge_slave_1 entered promiscuous mode [ 198.764481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.909758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.367752] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.587503] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.824051] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 199.831296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.019246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.026697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:24:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000003c0), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="4104", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 200.618583] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 200.627099] team0: Port device team_slave_0 added [ 200.864039] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 200.872502] team0: Port device team_slave_1 added [ 201.083948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.091045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.100437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.199278] IPVS: ftp: loaded support on port[0] = 21 [ 201.334588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.341837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.350890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.585324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.593117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.602736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.836515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.844272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.854189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.179299] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.185915] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.194759] device bridge_slave_0 entered promiscuous mode [ 203.477262] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.483858] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.492739] device bridge_slave_1 entered promiscuous mode [ 203.740524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.995452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.566366] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.572973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.579968] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.586601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.596110] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.626059] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.904160] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.917511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.148301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.155554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.435089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.442477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.990124] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.998614] team0: Port device team_slave_0 added [ 206.175086] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.183475] team0: Port device team_slave_1 added 14:24:31 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, &(0x7f0000000080)) [ 206.365738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.373071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.382242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.687044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.694306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.703525] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.073612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.081283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.090797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.354642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.362534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.371829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.538663] IPVS: ftp: loaded support on port[0] = 21 [ 210.461632] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.468327] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.477285] device bridge_slave_0 entered promiscuous mode [ 210.769043] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.775635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.782753] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.789233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.798162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.856785] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.863435] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.872071] device bridge_slave_1 entered promiscuous mode [ 210.982514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.168289] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.445983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.284632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.589584] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.862365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 212.869587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.056187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.063606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.910829] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.919304] team0: Port device team_slave_0 added [ 214.278424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.287051] team0: Port device team_slave_1 added 14:24:39 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00009b4fd0)={0x4, 0x0, &(0x7f0000009ff0)=[@enter_looper], 0x0, 0x0, &(0x7f0000009000)}) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200), 0x8) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0xfffffffffffffced, 0x0, &(0x7f0000000040)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x0, 0x0, &(0x7f0000000240)}) [ 214.617943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.625160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.634340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.031387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.038608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.047854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.420832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.428695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.437881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.747602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.755627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.765717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.795606] IPVS: ftp: loaded support on port[0] = 21 [ 216.520318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.937399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.088275] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.095029] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.103838] device bridge_slave_0 entered promiscuous mode [ 219.279019] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.285649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.293901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.475328] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.482142] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.490826] device bridge_slave_1 entered promiscuous mode [ 219.862221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.869957] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.876530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.883570] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.890035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.899035] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.209396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.292494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.630496] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.287164] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.618682] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.941584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.949012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.303254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.310427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.418930] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.427315] team0: Port device team_slave_0 added [ 223.795774] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.804109] team0: Port device team_slave_1 added [ 224.194625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.201976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.210819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.686370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.693887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.703154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 14:24:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) [ 225.157248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.165059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.174355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.487223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.578166] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.586183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.595223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.512786] IPVS: ftp: loaded support on port[0] = 21 [ 227.001072] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.695157] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.701575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.709890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.288450] 8021q: adding VLAN 0 to HW filter on device team0 14:24:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./control/file0\x00') [ 230.540577] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.547198] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.555979] device bridge_slave_0 entered promiscuous mode [ 230.635593] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.642160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.649138] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.655768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.664593] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 14:24:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r3]}], 0x18}, 0x0) sendmsg$unix(r4, &(0x7f0000000200)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) close(r2) close(r3) getsockname$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) close(r0) [ 231.106806] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.113555] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.122238] device bridge_slave_1 entered promiscuous mode [ 231.471907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.578790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 14:24:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000040)=@framed={{}, [@initr0, @alu, @jmp]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x68, &(0x7f0000000100)=""/104}, 0x48) r0 = socket$nl_xfrm(0xa, 0x5, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000010c0)=0x1c, 0x800) sendto$inet6(r1, &(0x7f0000001100)="7a0d46443ccc80b209cf73982d1b0b85071e9461ed527d", 0x17, 0x4000001, 0x0, 0x0) [ 232.042363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:24:57 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB="8fe02597b8d7de9fbe9fb96c42fe66a2ea3c37971877195cd0be530175d17bec67a32acd00d26ad89b2b2a", @ANYRESDEC, @ANYPTR64]], @ANYRESOCT], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) 14:24:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x3) 14:24:58 executing program 0: r0 = gettid() timer_create(0xb, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0xf2, 0x4) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000020}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r3, 0x401, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xa4072bed73d5652c}, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}}, &(0x7f00000001c0)) 14:24:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xa) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x408c5333, &(0x7f0000000140)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400300) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) tkill(r1, 0x1000000000013) [ 233.469314] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.906389] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.329699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 234.336939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.709057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 234.716333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:24:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x0, 0x5, 0x6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_WAITACTIVE(r1, 0x5607) unshare(0x40400) getpeername(r0, 0xfffffffffffffffd, &(0x7f0000000000)=0x100000385) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x88}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={r3, 0x4c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0xfffffffffffff27c, @empty, 0x9}, @in={0x2, 0x4e20}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e24, @remote}]}, &(0x7f00000002c0)=0x10) [ 236.016236] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.024778] team0: Port device team_slave_0 added [ 236.352497] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.360721] team0: Port device team_slave_1 added [ 236.739890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.747930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.756990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.105927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.137895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.145486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.154385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.496430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.504767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.514107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.819415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.827240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.836381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.174911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.195357] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.201924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.209790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:25:04 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000ffb000/0x3000)=nil], &(0x7f00000002c0), &(0x7f0000000340), 0x0) [ 240.338979] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.852086] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.858584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.865709] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.872619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.881274] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.888082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.076463] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.873290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:25:10 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1040, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x103001, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000200)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast1}, 0x20) [ 245.736196] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.743714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.751791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.400134] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.642339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.186685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.698321] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.704760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.712582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.895249] binder: 7514:7518 Acquire 1 refcount change on invalid ref 0 ret -22 [ 249.903121] binder: 7514:7518 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 249.910756] binder: 7514:7518 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 250.135811] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.674827] binder: 7514:7518 Acquire 1 refcount change on invalid ref 0 ret -22 [ 250.681945] binder: 7514:7537 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 250.689265] binder: 7514:7518 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 250.696651] binder: 7518 RLIMIT_NICE not set 14:25:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0xffffffffffff0e47, 0x0) [ 252.336174] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:25:18 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x3b, @loopback, 0x4e24, 0x2, 'wlc\x00', 0x18, 0x9, 0x5e}, 0x2c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x10c) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000100)={{0x2, 0x10001}, 'port1\x00', 0x0, 0x0, 0x13b, 0x200, 0x3, 0x2, 0x1, 0x0, 0x4, 0x6}) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f00000001c0)={0x20000000, 0x3, 0x31}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000200)=""/85) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000280)) fstatfs(r1, &(0x7f00000002c0)=""/78) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000340)=0x0) ptrace$getregs(0xc, r2, 0x8, &(0x7f0000000380)=""/104) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) setsockopt$inet_int(r1, 0x0, 0x15, &(0x7f0000000400)=0x8, 0x4) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000440)=0x6) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x8, "af0b73f2dd2ed1e266b5e46c383448fab6d4e17f95558cb9e07cdb17e8485e73047847d9d687efb20a8dd8da721dbb756dc3c5898dde5165134a36d0f0bd41cb", "2d3a2538eb4a97b252a3ffbac2578cd0f5bedc15a3d664d552cb94ef0537c8c6", [0x81, 0x1]}) arch_prctl(0x0, &(0x7f0000000540)="7dc0699ba454e3a23dd3f72837291075a1feecfd239da535004f4b6fd2c0184045164c0a7e0ae5f6a06ded68220c1090601e9ac51cb606ab6aff6e6dcb8a88881583ce32a3738300a439a8cab93604b30ea4b53859bdbc1e40795edd02e68cdd5038b745071b27d8643cb57cf527eb6cbf8dd0196d0b08c642e6a8c939e5") clock_gettime(0x3, &(0x7f00000005c0)) timerfd_gettime(r1, &(0x7f0000000600)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000640)='/dev/snd/pcmC#D#p\x00', 0x8, 0x800) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r4 = dup(r1) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000700), &(0x7f0000000740)=0x4) write$FUSE_LSEEK(r3, &(0x7f0000000780)={0x18, 0xfffffffffffffff5, 0x2, {0x7f}}, 0x18) recvmmsg(r3, &(0x7f0000003340)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000007c0)=""/101, 0x65}, {&(0x7f0000000840)=""/241, 0xf1}, {&(0x7f0000000940)=""/179, 0xb3}], 0x3, &(0x7f0000000a40)=""/63, 0x3f, 0x2}, 0x1ff}, {{&(0x7f0000000a80)=@pptp, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/12, 0xc}], 0x2, &(0x7f0000001b80)=""/23, 0x17}, 0x7}, {{&(0x7f0000001bc0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001c40)=""/189, 0xbd}, {&(0x7f0000001d00)=""/179, 0xb3}, {&(0x7f0000001dc0)=""/75, 0x4b}], 0x3, 0x0, 0x0, 0x6}, 0xa0e}, {{&(0x7f0000001e80)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000001f00)=""/251, 0xfb}, {&(0x7f0000002000)=""/26, 0x1a}, {&(0x7f0000002040)=""/145, 0x91}, {&(0x7f0000002100)=""/4096, 0x1000}, {&(0x7f0000003100)=""/84, 0x54}, {&(0x7f0000003180)}], 0x6, &(0x7f0000003240)=""/230, 0xe6, 0x2c3}, 0x1}], 0x4, 0x40010022, &(0x7f0000003440)) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000003480), &(0x7f0000003500)=0x60) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000003540)) socket$packet(0x11, 0x2, 0x300) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000003580)={0x2, "57d2"}, 0x3) 14:25:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) 14:25:18 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000ffb000/0x3000)=nil], &(0x7f00000002c0), &(0x7f0000000340), 0x0) 14:25:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5382, 0x705000) 14:25:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r0, &(0x7f0000000300)=""/182, 0xb6) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0x0, 0x1}, 0x78) 14:25:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x9c, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x800) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000540)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{&(0x7f00000030c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003640)=[{&(0x7f0000003140)=""/1, 0x1}], 0x1, &(0x7f00000036c0)=""/234, 0xea}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="da586b1015d80f02f76232ab208f12970bca8306a80c070989dcbaf56da8e03b2a6d21fe40b3ea2f373092b4b74b131389c59795d86de6fa30d6fdd19fddd2e8e8b5097d360eb911341de3c3109f5f9ba8666b89f91058ff47679ef3b8821170476b5e5ff1c831c4ee3856eeeda014ebc90956ef0431b03ffdb72f618ca86d08bc9113d066f7962f5dca17980bd012939d7a80127a8974c38d98a20df68df4e1b4e8c7ae774f353f144b572823d0e70a30485ef480c77d7d29b533"}, {&(0x7f00000000c0)="f28522a52704ffc580227b0c6af2fdead9445c39"}, {&(0x7f0000000140)="566fd604d6a4537411880c79cca696d07c"}, {&(0x7f00000002c0)="00adc14c85e1e206a05724f1168b8ef3fe54d91a53015467dba5911dfb0842d2ec7cb522ef54f28e2789583c5b79a0aad176fe79a72c78d23a66f023e4057fca898ccf702fadd4af52f23a3fcf2ca4f435da575d6d05ed2a769c514b92565e5c28f1bd4fb09de53c3fa1f799cc39dc38a15b98c1c39a9f65ec253611dcc10a853180d0fb026d869071cdc3f5cbe5d2501e64d3bff38988fbd12e889c985ae22cd760046d239f29bdaa9ec07f4fc3e2773e1f59ecba22a6ca11d1426e8b688e2e88c60e6ac4ed51da41becf879bd233b82844"}], 0x15b, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x4719493cf559a59, 0x0) 14:25:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) 14:25:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) 14:25:18 executing program 0: ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x1010}, {0xffffffffffffffff, 0x401}, {0xffffffffffffffff, 0x204200}, {}], 0x5, &(0x7f0000000100), &(0x7f0000000140)={0xffffffffffffff1b}, 0x8) 14:25:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5382, 0x705000) [ 253.845165] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 253.912891] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:25:19 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 14:25:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5382, 0x705000) [ 255.019315] IPVS: ftp: loaded support on port[0] = 21 [ 255.539773] ip (7657) used greatest stack depth: 53056 bytes left [ 255.764743] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.771207] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.779519] device bridge_slave_0 entered promiscuous mode [ 255.924613] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.931121] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.939929] device bridge_slave_1 entered promiscuous mode [ 256.065043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.143453] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.382538] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.468610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 256.548412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.555527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.636508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.643665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.886591] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 256.894412] team0: Port device team_slave_0 added [ 256.973074] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 256.980878] team0: Port device team_slave_1 added [ 257.060041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.147405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.227725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.235134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.244418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.322055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 257.329392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.338686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.213027] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.219471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.226558] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.233103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.242202] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.442020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.450163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.753778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.054574] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.060879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.069165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.372624] 8021q: adding VLAN 0 to HW filter on device team0 14:25:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x2, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000480)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 14:25:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='veth0_to_team\x00', 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000015000700000000000000000002ff0006667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42d276cca7d111cd3682a9447015739d53d5000000"], 0x1}}, 0x0) 14:25:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000200), 0x0, 0x4008000, 0x0, 0x0) 14:25:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) 14:25:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40816b}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 14:25:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5382, 0x705000) 14:25:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x5382, 0x705000) 14:25:29 executing program 0: creat(&(0x7f0000000240)='./file0\x00', 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}]) 14:25:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000300)=0xe, 0xfffffe8c) 14:25:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 14:25:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x5382, 0x705000) [ 265.278909] netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. [ 265.317964] netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. 14:25:30 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x1c4}, 0xfffffea1) ioctl$int_in(r1, 0x80000000005001, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) close(r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) tkill(r0, 0x15) 14:25:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0xb, &(0x7f0000000000)={0x0, @multicast1, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x17}, 0x2c) signalfd4(0xffffffffffffffff, &(0x7f0000000800), 0x8, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) 14:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) write$P9_RSTATFS(r3, &(0x7f0000000280)={0x43}, 0x43) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 14:25:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) pipe(&(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0xffffffffffffff3e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000240)=""/254, 0x0, 0xfe}, 0x20) read(r0, &(0x7f0000000380)=""/172, 0xffffffc7) socket(0x0, 0x8000e, 0x0) 14:25:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x5382, 0x705000) 14:25:31 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000640)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00'}, 0x2c) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000700)}, 0x78) [ 266.091920] hrtimer: interrupt took 308903 ns 14:25:31 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x5382, 0x705000) 14:25:31 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="87df3ca3", 0x4) 14:25:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x3, 0xab0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000040), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x11, 'veth0_to_bond\x00', 'vlan0\x00', 'team_slave_0\x00', 'syzkaller0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @dev={[], 0x1a}, [0x0, 0x0, 0xff, 0xff], 0x898, 0x918, 0x960, [@devgroup={'devgroup\x00', 0x18, {{0x8, 0x7, 0x5d2b, 0x95b4, 0x3ff}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x1}, {0x4}, {0x9a4, 0x3}, {0xf9c, 0x3}, {0x21, 0x3}, {0x1, 0x3}, {0x3, 0x2}, {0x100000000, 0x1}, {0x401, 0x3}, {0x20, 0x3}, {0x5, 0xf2c6b8241c850443}], [{0x8001, 0xbe}, {0x7, 0xd1c}, {0x3, 0xfe1d}, {0x9, 0x200}, {0x8, 0x1f}, {0xb28, 0x21bb}, {0xfffffffffffffff8, 0x1000}, {0x3f, 0x3}, {0xffffffffffffffc1, 0x1ff}, {0x1, 0x5}, {0x100000001, 0x7}], 0x0, 0x7}, {[{0x800, 0x1}, {0x86, 0x3}, {0x6}, {0x1, 0x1}, {0x86, 0x2}, {0x3, 0x2}, {0x67e, 0x1}, {0x4, 0x2}, {0x80000000, 0x1}, {0x1, 0x3}, {0x9, 0x3}], [{0x40, 0x1f}, {0x9, 0x9be}, {0x3, 0x9}, {0x100, 0xd71}, {0x1f, 0x1}, {0x475, 0x9}, {0x0, 0x5}, {0xffff, 0x800}, {0x100000000, 0x7ff}, {0xfffffffffffffff7, 0x10001}, {0x6, 0x10000}], 0x7, 0x3}, {[{0x1f}, {0x1ff}, {0xe5, 0x3}, {0x7, 0x3}, {0x3}, {0x2}, {0x1000, 0x3}, {0x9, 0x2}, {0x2}, {0xffffffff82dd8714, 0x3}], [{0x9, 0x2}, {0x4, 0x5}, {0x3, 0x4}, {0x51e4, 0x1ff}, {0x1, 0x5}, {0xfffffffffffffa7b, 0x400}, {0x6, 0x3ff}, {0xbdb, 0xffffffffffffff8b}, {0xc250, 0x7}, {0x5, 0xffff}, {0x6, 0x1}], 0x6, 0x3}, {[{0x8}, {0x6, 0x3}, {0x400, 0x3}, {0x1000, 0x3}, {0x9, 0x1}, {0x1, 0x3}, {0x3}, {0x0, 0x3}, {0x401, 0x3}, {0xa5}, {0x9}], [{0x5, 0x3}, {0x80000001, 0x270c}, {0x3, 0x696}, {0x5, 0x5}, {0x1, 0xfff}, {0x3, 0x2}, {0x7, 0xfffffffffffffffc}, {0xd747, 0x2}, {0x5, 0xbc}, {0x7, 0x4}, {0x1, 0xfffffffffffffff8}], 0x5, 0x3}, {[{0x401, 0x3}, {0x1f, 0x2}, {0x2835, 0x3}, {0xfff, 0x3}, {0x8, 0x3}, {0x6, 0x3}, {0xa02, 0x3}, {0x3, 0x3}, {0xffff, 0x3}, {0x7fff}, {0x8, 0x1}], [{0x6, 0x401}, {0x0, 0x9}, {0xff, 0x40}, {0xfff, 0x1785}, {0x5, 0x3}, {0xff, 0x7}, {0x20, 0x100000000}, {0xffffffffffff8001, 0x2}, {0x4, 0x9}, {0x5498041, 0x5}, {0x7, 0x400}], 0x7, 0x4}, {[{0x7f}, {0xbd, 0x3}, {0xd1ed, 0x3}, {0xffffffff, 0x3}, {0x0, 0x3}, {0xffffffffffffffc0, 0x3}, {0x8, 0x2}, {0x2000, 0x1}, {0x8, 0x2}, {0xfffffffffffffffe, 0x3}, {0x8, 0x3}], [{0x0, 0x9}, {0x101, 0x9}, {0x3}, {0x3, 0x7ff}, {0x200, 0x3b3f}, {0x2f, 0x5}, {0x100, 0x5}, {0xfffffffffffffffd, 0xdd27}, {0x2, 0x5}, {0x9, 0x10000}, {0x7f, 0x7f}], 0x9, 0x1}, {[{0x3}, {0x800, 0x3}, {0x4c7, 0x2}, {0x3, 0x1}, {0x2, 0x3}, {0x7ed, 0x2}, {0x9, 0x3}, {0x86a, 0x2}, {0x7f, 0x2}, {0xffffffffffffffff, 0x1}, {0x4, 0x2}], [{0xeda0, 0x2}, {0x4, 0x9}, {0xb5ce, 0x7}, {0x25, 0x4bce}, {0x2, 0x8}, {0x1, 0x9}, {0x2, 0xff}, {0x4, 0x610}, {0xfff}, {0x94ef, 0x6}, {0x5, 0x5}], 0x0, 0xb}, {[{0x7, 0x3}, {0x2, 0x2}, {0x7, 0x3}, {0x20, 0x3}, {0x8, 0x3}, {0x7}, {0x4, 0x3}, {0x4, 0x2}, {0x8f, 0x2}, {0x4}, {0x5074}], [{0x9, 0x20}, {0xbde, 0x20}, {0x0, 0x1}, {0x6, 0x401}, {0x2, 0x100000001}, {0xc8, 0xfffffffffffffffc}, {0x3f800000000000, 0x80000001}, {0x7f, 0x4}, {0x6, 0xe7}, {0x2e3c, 0x4}, {0x7fff, 0x1}], 0x3, 0x4}, {[{0xa97}, {0x1, 0x3}, {0x4, 0x3}, {0x100000000, 0x3}, {0x10000, 0x3}, {0x7f, 0x2}, {0x4134, 0x3}, {0x400}, {0x200, 0x3}, {0x80000000, 0x3}, {0xb00}], [{0x400, 0x3}, {0x1735, 0xb2a0}, {0x8, 0x4}, {0x4}, {0x8, 0x2}, {0x2, 0x5e}, {0x9, 0x7f}, {0x6, 0x81}, {0x1, 0x100000000}, {0xe0000000000, 0x4}, {0x6, 0x7}], 0x4, 0x4}, {[{0xac, 0x3}, {0x8}, {0xfffffffffffffffc, 0x994b826cd8b7bfe}, {0x524, 0x3}, {0x200, 0x3}, {0x400, 0x2}, {0x6}, {}, {0xbe, 0x2}, {0x6, 0x3}, {0xef0, 0x3}], [{0x8, 0x100000001}, {0x8, 0x551}, {0x4, 0x78b}, {0x1, 0x4}, {0x6, 0x6}, {0x6f, 0x5}, {0x2, 0x1000}, {0x1, 0x81}, {0x1353}, {0x84, 0x800}, {0x3, 0xfffffffffffffffb}], 0x4}, {[{0x80000001, 0x3}, {0x9, 0x3}, {0x7, 0x3}, {0x10001}, {0x1ff}, {0x39d6eb29, 0x1}, {0x8000, 0x3}, {0x2, 0x3}, {0xffffffff, 0x1}, {0x1f, 0x2}, {0x1, 0x1}], [{0x9, 0x8001}, {0x39, 0x2f9}, {0x8, 0x4}, {0x4, 0x6}, {0x2}, {0x1, 0x1}, {0x3, 0x2}, {0xfffffffffffffc01}, {0xfff, 0xff}, {0x8001, 0x3}, {0x3, 0x2}], 0x2, 0xa}], 0xa}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"6a4c8d10e07e5b557993e4ee4e2d38afb0599cd52e5c76a45d3f9c29d656"}}, @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"022d3c961ff3d98d8b72d37a9684d84ca6557d352b97a7fbd9f1b04d658a"}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x1d, 0x0, 0x0, 'veth0\x00', 'yam0\x00', 'ip6tnl0\x00', 'eql\x00', @link_local, [], @random="d83f290449f9", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0xb28) 14:25:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5385, 0x705000) [ 266.590831] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 14:25:31 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x5382, 0x705000) 14:25:31 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$MAP_CREATE(0x6, &(0x7f0000000000), 0x2c3578d78ef0e284) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000)=r0, 0x36) 14:25:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, &(0x7f0000000180), 0x100000001) 14:25:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x5386, 0x705000) 14:25:32 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="87df3ca3", 0x4) 14:25:32 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0x14) 14:25:32 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$MAP_CREATE(0x6, &(0x7f0000000000), 0x2c3578d78ef0e284) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000)=r0, 0x36) 14:25:32 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x5382, 0x705000) 14:25:32 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) quotactl(0x0, &(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000340)) 14:25:32 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) getpid() mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendto$inet(r1, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0xc) close(r1) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2c) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 14:25:32 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x5382, 0x705000) 14:25:32 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200), 0x8) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0xfffffffffffffced, 0x0, &(0x7f0000000040)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x1, 0x0, &(0x7f0000000240)='W'}) 14:25:32 executing program 1: read(0xffffffffffffffff, &(0x7f0000000380)=""/245, 0xfffffffffffffdff) r0 = syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000040)) 14:25:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20000, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x5386, 0x705000) r3 = fcntl$getown(r2, 0x9) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x5, 0x100, 0x2, 0x101, 0x3ab, r3}) 14:25:33 executing program 5: ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f00000004c0)) r0 = syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x8, 0x0, 0xffff]}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000740)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000700)}, 0x50) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3ff}) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105517, &(0x7f0000001000)) dup2(r1, r0) [ 266.601342] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 268.205713] ================================================================== [ 268.221483] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 268.228618] CPU: 1 PID: 8022 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #66 [ 268.235817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.245182] Call Trace: [ 268.247810] dump_stack+0x306/0x460 14:25:33 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x5382, 0x705000) [ 268.251462] ? vmap_page_range_noflush+0x975/0xed0 [ 268.256454] kmsan_report+0x1a2/0x2e0 [ 268.260291] __msan_warning+0x7c/0xe0 [ 268.264145] vmap_page_range_noflush+0x975/0xed0 [ 268.268977] map_vm_area+0x17d/0x1f0 [ 268.272730] kmsan_vmap+0xf2/0x180 [ 268.276319] vmap+0x3a1/0x510 [ 268.279460] ? relay_open_buf+0x81e/0x19d0 [ 268.283744] relay_open_buf+0x81e/0x19d0 [ 268.287878] relay_open+0xabb/0x1370 [ 268.291642] do_blk_trace_setup+0xaf7/0x1780 [ 268.296118] __blk_trace_setup+0x20b/0x380 [ 268.300413] blk_trace_setup+0xfb/0x140 [ 268.304433] sg_ioctl+0x10ff/0x58b0 [ 268.308095] ? do_vfs_ioctl+0x18a/0x2810 [ 268.312172] ? __se_sys_ioctl+0x1da/0x270 [ 268.316370] ? sg_poll+0x870/0x870 [ 268.319947] do_vfs_ioctl+0xcf3/0x2810 [ 268.323873] ? security_file_ioctl+0x92/0x200 [ 268.328397] __se_sys_ioctl+0x1da/0x270 [ 268.332382] __x64_sys_ioctl+0x4a/0x70 [ 268.336272] do_syscall_64+0xbe/0x100 [ 268.340094] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.345300] RIP: 0033:0x457519 [ 268.348487] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.367404] RSP: 002b:00007f48cdce4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.375138] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 268.382404] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000005 [ 268.389684] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.396981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cdce56d4 [ 268.404262] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 268.411543] [ 268.413166] Uninit was created at: [ 268.416727] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 268.421937] kmsan_kmalloc+0xa4/0x120 [ 268.425775] __kmalloc+0x14b/0x440 [ 268.429353] kmsan_vmap+0x9b/0x180 [ 268.432910] vmap+0x3a1/0x510 [ 268.436010] relay_open_buf+0x81e/0x19d0 [ 268.440085] relay_open+0xabb/0x1370 [ 268.443797] do_blk_trace_setup+0xaf7/0x1780 [ 268.448217] __blk_trace_setup+0x20b/0x380 [ 268.452481] blk_trace_setup+0xfb/0x140 [ 268.456453] sg_ioctl+0x10ff/0x58b0 [ 268.460077] do_vfs_ioctl+0xcf3/0x2810 [ 268.463960] __se_sys_ioctl+0x1da/0x270 [ 268.467928] __x64_sys_ioctl+0x4a/0x70 [ 268.471836] do_syscall_64+0xbe/0x100 [ 268.475675] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.480850] ================================================================== [ 268.488198] Disabling lock debugging due to kernel taint [ 268.493659] Kernel panic - not syncing: panic_on_warn set ... [ 268.493659] [ 268.501064] CPU: 1 PID: 8022 Comm: syz-executor3 Tainted: G B 4.19.0-rc4+ #66 [ 268.509654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.519020] Call Trace: [ 268.521622] dump_stack+0x306/0x460 [ 268.525278] panic+0x54c/0xafa [ 268.528508] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 268.533958] kmsan_report+0x2d3/0x2e0 [ 268.537774] __msan_warning+0x7c/0xe0 [ 268.541579] vmap_page_range_noflush+0x975/0xed0 [ 268.546378] map_vm_area+0x17d/0x1f0 [ 268.550104] kmsan_vmap+0xf2/0x180 [ 268.553651] vmap+0x3a1/0x510 [ 268.556770] ? relay_open_buf+0x81e/0x19d0 [ 268.561015] relay_open_buf+0x81e/0x19d0 [ 268.565094] relay_open+0xabb/0x1370 [ 268.568829] do_blk_trace_setup+0xaf7/0x1780 [ 268.573294] __blk_trace_setup+0x20b/0x380 [ 268.577566] blk_trace_setup+0xfb/0x140 [ 268.581550] sg_ioctl+0x10ff/0x58b0 [ 268.585234] ? do_vfs_ioctl+0x18a/0x2810 [ 268.589309] ? __se_sys_ioctl+0x1da/0x270 [ 268.593457] ? sg_poll+0x870/0x870 [ 268.596995] do_vfs_ioctl+0xcf3/0x2810 [ 268.600894] ? security_file_ioctl+0x92/0x200 [ 268.605441] __se_sys_ioctl+0x1da/0x270 [ 268.609439] __x64_sys_ioctl+0x4a/0x70 [ 268.613335] do_syscall_64+0xbe/0x100 [ 268.617142] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.622326] RIP: 0033:0x457519 [ 268.625533] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.644465] RSP: 002b:00007f48cdce4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.652196] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 268.659466] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000005 [ 268.666738] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.674027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cdce56d4 [ 268.681290] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 268.689606] Kernel Offset: disabled [ 268.693268] Rebooting in 86400 seconds..