[ 56.534892] cat (6109) used greatest stack depth: 53168 bytes left [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 57.887390] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 58.356409] random: sshd: uninitialized urandom read (32 bytes read) [ 58.949177] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 60.512313] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. [ 66.365637] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/04 14:02:13 fuzzer started [ 70.975573] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/04 14:02:18 dialing manager at 10.128.0.26:36867 2018/10/04 14:02:18 syscalls: 1 2018/10/04 14:02:18 code coverage: enabled 2018/10/04 14:02:18 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/04 14:02:18 setuid sandbox: enabled 2018/10/04 14:02:18 namespace sandbox: enabled 2018/10/04 14:02:18 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/04 14:02:18 fault injection: enabled 2018/10/04 14:02:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/04 14:02:18 net packed injection: enabled 2018/10/04 14:02:18 net device setup: enabled [ 77.559060] random: crng init done 14:04:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000014c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") fchown(r0, 0x0, 0x0) [ 196.887122] IPVS: ftp: loaded support on port[0] = 21 [ 199.206191] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.212823] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.221265] device bridge_slave_0 entered promiscuous mode [ 199.364905] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.371367] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.379842] device bridge_slave_1 entered promiscuous mode [ 199.516480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.652990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.074177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.217323] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:04:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 201.018621] IPVS: ftp: loaded support on port[0] = 21 [ 201.258614] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.266835] team0: Port device team_slave_0 added [ 201.445181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.453341] team0: Port device team_slave_1 added [ 201.622272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.803575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.810615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.819657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.064925] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.072623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.081818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.299465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.307152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.316348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.915786] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.922368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.929655] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.936819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.946233] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.994115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.145951] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.152560] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.160940] device bridge_slave_0 entered promiscuous mode [ 205.357529] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.364177] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.372838] device bridge_slave_1 entered promiscuous mode [ 205.670903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.933437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:04:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='group_id', 0xffdc, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)=@random={'user.', '/dev/usbmon#\x00'}, &(0x7f0000000740)="256370e9572d9b57747970650019ba78a7e585d3e45297a42af309c7b4b608effd921dfefc9b7e86845ee5af0007bed2da09b31e29453c209549de83a7afafb478351686d918656f036a8c5dc3b739ead136c63e570c2549b22a66e48a515751a79d382e020f30", 0x67, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) [ 206.731415] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.887953] IPVS: ftp: loaded support on port[0] = 21 [ 206.986972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.378562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.385754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.666067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.673301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.047539] ip (6391) used greatest stack depth: 53088 bytes left [ 208.565571] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.573784] team0: Port device team_slave_0 added [ 208.859376] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.867543] team0: Port device team_slave_1 added [ 209.193409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.200575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.210779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.468436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.475601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.484381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.765748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.773536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.782879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.092249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.099925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.109266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.482770] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.489241] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.497839] device bridge_slave_0 entered promiscuous mode [ 211.764068] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.770545] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.779282] device bridge_slave_1 entered promiscuous mode [ 212.110408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.422755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.309233] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.315796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.322821] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.329285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.338044] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.351910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.653398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.877177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.884452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.073428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.080463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.202519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff69a4f0ff00000000b70600000e0000015d400300000000005406000001ed000071184300000000006c640000000000007b0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 215.058891] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.067379] team0: Port device team_slave_0 added [ 215.501773] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.509824] team0: Port device team_slave_1 added [ 215.517424] IPVS: ftp: loaded support on port[0] = 21 [ 215.862099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.869148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.877986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.236597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.243890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.252859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.566606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 216.574293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.583623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.829977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.837861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.848056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.931053] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.293697] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.598670] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.605263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.613515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.807692] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.814226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.821113] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.827678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.836420] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.509474] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.516184] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.524648] device bridge_slave_0 entered promiscuous mode [ 221.782315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.905349] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.911983] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.920528] device bridge_slave_1 entered promiscuous mode [ 221.948483] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.282281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.612451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.751365] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.150834] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.474752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.481893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.886271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.893437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:04:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) rmdir(&(0x7f0000000040)='./file0\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) close(r0) [ 226.023663] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.031830] team0: Port device team_slave_0 added [ 226.392691] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.400727] team0: Port device team_slave_1 added [ 226.713755] IPVS: ftp: loaded support on port[0] = 21 [ 226.825561] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.832830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.841961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.156292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.163517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.172425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.596277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.604070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.613346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.981289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.989096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.998425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.518947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.149409] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:04:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) rmdir(&(0x7f0000000040)='./file0\x00') close(r0) 14:04:56 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f0000000400), 0x2d6, &(0x7f0000000100)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000680)}, 0x22) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x6, @empty, 0x5}}, 0xffffffff, 0xe60, 0x101, 0x8, 0x2}, &(0x7f0000000040)=0x98) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x4ea7, 0xfffffffc, 0x205, 0x40000000000c8, 0xab, 0x7fff, 0x0, 0x80000, r3}, 0x20) r4 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x223762d6, 0x8400) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x3) r5 = dup2(r2, r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) r6 = dup2(r0, r1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000100)={r3, 0x3}, &(0x7f0000000300)=0x8) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000400)="01", 0x1}], 0xffffffffffffe4e, &(0x7f0000001c80)}, 0x0) [ 231.784932] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.791310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.799400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.634037] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.640517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.647600] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.654118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.662679] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.823118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:04:58 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f0000000400), 0x2d6, &(0x7f0000000100)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000680)}, 0x22) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x6, @empty, 0x5}}, 0xffffffff, 0xe60, 0x101, 0x8, 0x2}, &(0x7f0000000040)=0x98) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x4ea7, 0xfffffffc, 0x205, 0x40000000000c8, 0xab, 0x7fff, 0x0, 0x80000, r3}, 0x20) r4 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x223762d6, 0x8400) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x3) r5 = dup2(r2, r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) r6 = dup2(r0, r1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000100)={r3, 0x3}, &(0x7f0000000300)=0x8) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000400)="01", 0x1}], 0xffffffffffffe4e, &(0x7f0000001c80)}, 0x0) [ 233.268868] 8021q: adding VLAN 0 to HW filter on device team0 14:04:59 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x3) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x57d, 0x337) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x3ff, 0x6d4f, 0x0, 0x4, 0x84}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r2, 0x3, 0x20}, 0xc) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x8000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x8001}, 0x4) socket$inet6(0xa, 0x7, 0xfffffffffffffffc) [ 234.209992] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.216624] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.225130] device bridge_slave_0 entered promiscuous mode [ 234.731283] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.737875] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.746653] device bridge_slave_1 entered promiscuous mode 14:04:59 executing program 0: clone(0x0, &(0x7f0000000440), &(0x7f0000000180), &(0x7f0000000400), &(0x7f0000000380)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) getpriority(0x1, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x5}, 0x10) pread64(r0, &(0x7f0000000080)=""/103, 0x67, 0x0) [ 235.184717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.582161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:05:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x2c, &(0x7f0000000100)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x0, 0x0, @local, 0x1}]}, &(0x7f00000001c0)=0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x401, 0x0, 0x9a54, 0x9}, 0x8) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/225, 0xe1) getresuid(&(0x7f0000000000), &(0x7f0000000300)=0x0, &(0x7f0000000380)) r3 = geteuid() setreuid(r2, r3) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 14:05:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10, 0xa919f9c2be, 0x600000000000000}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=ANY=[@ANYBLOB="f0000000100013070000000000000000000000000000000000000000170000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f000001000000000000000000000000000000006c000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000"], 0xf0}}, 0x0) r1 = socket(0x2, 0x4, 0x7) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_score_adj\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x19, &(0x7f00000000c0)='*mime_type+userbdevproc*\x00'}, 0x30) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000140)=r3) [ 236.955959] bond0: Enslaving bond_slave_0 as an active interface with an up link 14:05:02 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 237.373296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.741328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.748632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.920523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.249285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.256470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.098235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.150929] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.159142] team0: Port device team_slave_0 added [ 239.457189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.465459] team0: Port device team_slave_1 added [ 239.678585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.685723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.694448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.061237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.068469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.077306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.197311] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.204140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.212006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.354032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.361824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.370622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.693207] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.700873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.709920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.307202] 8021q: adding VLAN 0 to HW filter on device team0 14:05:06 executing program 5: r0 = eventfd(0x10001) ioctl$void(r0, 0xc0045878) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x30000) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2b, 0x64000) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000140)={0x7, 0x7, 0x3, 0x80000001, 0xffffffffffff8001, 0x1f}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x300, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x20008000) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x40) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000300)=0x8) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000340)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000003c0)={0x0, r3, 0x6}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000400)={0x0, r1, 0x1}) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000440)={0x3, 0x6, 0x1, 0x0, 0x1, 0x6}) getrandom(&(0x7f0000000480)=""/86, 0x56, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000500)={r5, 0x80000, r1}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r1, &(0x7f0000000540)="592960a2574f5537a3a7c9478dca7fcd09072ef25ac4b0450284ebdf2ab7bb9da447a035e67a5f8d74c70ba668e6ab5ef0b7c54d78d5273be837e715df6f1466dcddad"}, 0x10) r6 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x5, 0x2002) r7 = request_key(&(0x7f0000000640)='.dead\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='eth1\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, r7) syz_open_dev$evdev(&(0x7f0000000700)='/dev/input/event#\x00', 0x40, 0x101000) ioctl$KVM_SET_TSC_KHZ(r6, 0xaea2, 0x3) syz_kvm_setup_cpu$x86(r6, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000007c0)=[@textreal={0x8, &(0x7f0000000740)="ddd80f23b7660fad25baf80c66b8e85d7a8766efbafc0c66b88104ff0f66ef6464e929150f01df0f0015baf80c66b812229a8f66efbafc0ced66b9800000c00f326635000100000f300fc7adf6ff", 0x4e}], 0x1, 0x10, &(0x7f0000000800)=[@vmwrite={0x8, 0x0, 0xfffffffffffff353, 0x0, 0x80000001, 0x0, 0x3, 0x0, 0xfffffffffffffff9}], 0x1) openat$cgroup_type(r1, &(0x7f0000000840)='cgroup.type\x00', 0x2, 0x0) keyctl$instantiate_iov(0x14, r7, &(0x7f0000000c00)=[{&(0x7f0000000880)="c0b5055263df3063b1f3200fd8f8e7d6a0ebcc3e2a68e2b6077558436ae1eeca12801d9dd84b7a505dacdbde5a2029e70ed9ff15f964f796", 0x38}, {&(0x7f00000008c0)="6c90b15b26245d09e372825a8cae14009567f2d31f1ed9ba234a974d1e4774d498202b81779be593564cf94fbeb046c27cd75457be98e3990c31ee91a5a20901d50d86d8429c1ed46874a3d4c31219bf7ddb3183aaa1845c9bc1f024a98e6aa0a2e74301", 0x64}, {&(0x7f0000000940)="058a5f6baa854733469dca7615b8ef987a1943", 0x13}, {&(0x7f0000000980)="ece85e87b8fa3dbcf712ee0308f8cf", 0xf}, {&(0x7f00000009c0)="c844279fdb74b2065273ed997b24874020bd9fe6c9a1250a8311d506d1b886af845770b98ffba7413d967b405d12d9fbe67970f95857ad919be85ec4010865f66b27d62ab4d5eba49f8c79daea12427c8615150447cf23e345f69fccbf310c3e19000db16eb949e08924cbcba53f01a3af5fca394be1a3ab7d47b62e4b71f622272c77371a41d1824dc1a9c0fb30b3eafc377d7dd2433385b698d1cfe100", 0x9e}, {&(0x7f0000000a80)="22f221293848ebc119ff9d5a5ffe82ef692d45c3032930554e42ecb4b7df6d4671a9b41d57e77f9410c2e655ee4e224c9d3980a4223be74ab7a77dbc6d4e82ae5cd0eb4fee0dfb4e10700517ce292a5633f5026fa79e363752004d29701a521dd85920f2", 0x64}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)="2dff629b53ef621cae3d9abb9737ef97599a2852e0e29a692c1d44c370408b6c769aff2377af05306e64632e0bf6613b8957e5e05941dd1a0b3e2356b2411bcb129e85e1b91cf855b133f475dd9a8b45a4dd44904faafba9ece30b27fb280f1bb22d4a5d4f237fbd8402eaa8b26207510a5018316b282d25eba4bda25ccbf95a92d7674761e3f1be916fdaf6d7d5b1a0d923ac23d4fad52f6453722f00c4e100b386e9764d7ace03e1eb3cb96689996579edb70cda614a8a562cd1", 0xbb}], 0x8, r7) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) ioctl$KVM_IRQ_LINE_STATUS(r6, 0xc008ae67, &(0x7f0000000d40)={0x6, 0x10001}) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000d80)=0x860b, &(0x7f0000000dc0)=0x2) [ 242.467372] IPVS: ftp: loaded support on port[0] = 21 [ 243.952495] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.958996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.966135] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.972680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.981322] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.988489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.738161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.044008] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.050475] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.059346] device bridge_slave_0 entered promiscuous mode [ 247.447592] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.454291] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.463345] device bridge_slave_1 entered promiscuous mode [ 247.736602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 247.823003] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.051423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.724743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.775968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.782612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.790635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 14:05:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='group_id', 0xffdc, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)=@random={'user.', '/dev/usbmon#\x00'}, &(0x7f0000000740)="256370e9572d9b57747970650019ba78a7e585d3e45297a42af309c7b4b608effd921dfefc9b7e86845ee5af0007bed2da09b31e29453c209549de83a7afafb478351686d918656f036a8c5dc3b739ead136c63e570c2549b22a66e48a515751a79d382e020f30", 0x67, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) [ 249.012378] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.235150] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.242493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.457377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 249.464852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.842704] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.296634] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.304928] team0: Port device team_slave_0 added [ 250.494995] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.503127] team0: Port device team_slave_1 added [ 250.748388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 250.755592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.764369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.962429] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.969526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.978417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.210975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.218914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.228339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.391381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.399317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.408402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.817918] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.824478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.831413] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.837996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.846516] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.853234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.930608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.641073] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:05:20 executing program 3: [ 255.649558] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.656093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.664272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.207425] 8021q: adding VLAN 0 to HW filter on device team0 14:05:24 executing program 4: 14:05:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="0300000000000000000000000000000002000000f1f2ffff08000000000000000500000000000000810000000000dd657400484c91e1ffff000000000000000000000000000000100002000000000000000000f5ffffffff07000000000000000300000000000000b9030000000000000000000000000000000000000000000080280000000000000000000000000000000000000000f8ff060000000000000006000000000000000000000000000000000008000000000001010000000000000000000000000000f9ffffffffffffff230d000000000000800000000000000000000000000000000000000000000000002000000000000000000000000000000101000000000000800000000000e7005f0000000000000000000000000003000000000000000000802000000000000000000000000000000500000000000000020000000000000007000000000000000000000000000000000000000000000009370000000000000000000000000000000000000000000006000000000000000100000000000000000000000000000000000000000000000300000000000000000000000000000004000000000000001f0000000000000005000000000000000000000000000000000000000000000000200000000000000000000000000000e3dd0c1506f2b5508cbbcb7211a7e4a25577ec9362a2a45bb37f3584d1fd3decc9beb259469d3a8621c377475a690b8c602086afb6ec4d18ed985397f7d4de60c28ec5544958bae30be92ee9e5253c6db4af698fcec8dea00a131c552fb16eaf29f9c16f878cd0abde852a8154358388e308dd89d3ea73d916197c151c8b12bb2c4bab2f7a1aeaadc218b477a2c69934d4ea68976d9dc3"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:05:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='group_id', 0xffdc, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)=@random={'user.', '/dev/usbmon#\x00'}, &(0x7f0000000740)="256370e9572d9b57747970650019ba78a7e585d3e45297a42af309c7b4b608effd921dfefc9b7e86845ee5af0007bed2da09b31e29453c209549de83a7afafb478351686d918656f036a8c5dc3b739ead136c63e570c2549b22a66e48a515751a79d382e020f30", 0x67, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) 14:05:24 executing program 0: 14:05:24 executing program 3: 14:05:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:05:25 executing program 0: 14:05:25 executing program 3: 14:05:25 executing program 4: [ 260.917430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.237838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.529193] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.535526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.543550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.839208] 8021q: adding VLAN 0 to HW filter on device team0 14:05:28 executing program 5: 14:05:28 executing program 0: 14:05:28 executing program 3: 14:05:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:05:28 executing program 4: 14:05:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='group_id', 0xffdc, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)=@random={'user.', '/dev/usbmon#\x00'}, &(0x7f0000000740)="256370e9572d9b57747970650019ba78a7e585d3e45297a42af309c7b4b608effd921dfefc9b7e86845ee5af0007bed2da09b31e29453c209549de83a7afafb478351686d918656f036a8c5dc3b739ead136c63e570c2549b22a66e48a515751a79d382e020f30", 0x67, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) 14:05:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="0300000000000000000000000000000002000000f1f2ffff08000000000000000500000000000000810000000000dd657400484c91e1ffff000000000000000000000000000000100002000000000000000000f5ffffffff07000000000000000300000000000000b9030000000000000000000000000000000000000000000080280000000000000000000000000000000000000000f8ff060000000000000006000000000000000000000000000000000008000000000001010000000000000000000000000000f9ffffffffffffff230d000000000000800000000000000000000000000000000000000000000000002000000000000000000000000000000101000000000000800000000000e7005f0000000000000000000000000003000000000000000000802000000000000000000000000000000500000000000000020000000000000007000000000000000000000000000000000000000000000009370000000000000000000000000000000000000000000006000000000000000100000000000000000000000000000000000000000000000300000000000000000000000000000004000000000000001f0000000000000005000000000000000000000000000000000000000000000000200000000000000000000000000000e3dd0c1506f2b5508cbbcb7211a7e4a25577ec9362a2a45bb37f3584d1fd3decc9beb259469d3a8621c377475a690b8c602086afb6ec4d18ed985397f7d4de60c28ec5544958bae30be92ee9e5253c6db4af698fcec8dea00a131c552fb16eaf29f9c16f878cd0abde852a8154358388e308dd89d3ea73d916197c151c8b12bb2c4bab2f7a1aeaadc218b477a2c69934d4ea68976d9dc3"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) 14:05:29 executing program 5: 14:05:29 executing program 4: 14:05:29 executing program 3: epoll_create1(0x0) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/229, 0xe5}, {&(0x7f0000000500)=""/201, 0xc9}], 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x200000000003, &(0x7f0000000040)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 14:05:29 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xffff) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) lseek(0xffffffffffffffff, 0x0, 0x0) 14:05:29 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$setptracer(0x59616d61, r0) 14:05:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) prctl$getname(0x10, &(0x7f0000000040)=""/30) 14:05:29 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb7020000040034167b110000000000008500000005000000b70500000000ea9a9500000600000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002540)={r1, 0x0, 0xe, 0x19, &(0x7f0000002480)="e4691a18d261eda75c328ec11b1a", &(0x7f0000002500)=""/25, 0x105c}, 0x28) 14:05:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="ffff9e000a000200f7aa4dedaffeaaaaa16e01fc00fda4e36230f77a40737edb8618c0d15110f9adf1d8f64864d8bfcd45d8b89b31f6bcfeea8db9bbf4f2213e887e486b0b15b9ead79d12049f7937d28e861dbaade91f1f2df012ff6cff523c473d88a673f93c6e881a67b43d16ef6a6124774799441c66fc19c595a0b84f126a3697c4f102b225b611997abc22bf557e45ecaba122a7b466e3f4c41c755498da15f84de1ce4614e1fd8d7a60b29f03c3f14c42a3fe4cd835e8915a93aea2221a9465b8d5432446211a3e8636f9f311a119a12649db5f6de8"], 0x1}}, 0x0) 14:05:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0xe135) read(r1, &(0x7f0000000100)=""/103, 0x67) 14:05:29 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)) 14:05:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='group_id', 0xffdc, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)=@random={'user.', '/dev/usbmon#\x00'}, &(0x7f0000000740)="256370e9572d9b57747970650019ba78a7e585d3e45297a42af309c7b4b608effd921dfefc9b7e86845ee5af0007bed2da09b31e29453c209549de83a7afafb478351686d918656f036a8c5dc3b739ead136c63e570c2549b22a66e48a515751a79d382e020f30", 0x67, 0x0) 14:05:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000001140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x200, 0x400) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f000000cfe0)={{&(0x7f000000b000/0x1000)=nil, 0x1000}}) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000011ffc), &(0x7f0000001240)=0x4) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000011c0)={{&(0x7f000000a000/0x3000)=nil, 0x3000}}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'\x00', {0x2, 0x0, @remote}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000004ffc)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001180)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010000)={@multicast2, @dev={0xac, 0x14, 0x0}}, 0x8) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000008fe0), 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[], 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000001100)={&(0x7f0000013000/0x1000)=nil}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000013c0)={'broute\x00', 0x0, 0x0, 0xf8, [], 0x0, &(0x7f0000001280), &(0x7f00000012c0)=""/248}, &(0x7f0000001440)=0x78) read(0xffffffffffffffff, &(0x7f0000003580)=""/4096, 0x10d7) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000001200)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) 14:05:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:05:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000300)=""/148, 0x94}], 0xffffffffffffe77, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_flowlabel\x00') socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:05:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000002c0)) [ 265.151723] hrtimer: interrupt took 274174 ns 14:05:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100), &(0x7f0000000140)=0x8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) madvise(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 14:05:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffd86, &(0x7f0000000000)='/dev/autofs\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={"626f6e645f736c610600", {0x2, 0x0, @remote}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x47ff) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fanotify_init(0x20, 0x109000) flistxattr(r3, &(0x7f00000047c0)=""/13, 0xffffffffffffffa5) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) epoll_create(0xfffffffffffffffa) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000), &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000700)=0xfffffec1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) getpgid(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x7, 0x0, 0x0, 0x100000001, 0x2000, 0x0, 0x1, 0x48, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x10000, 0x8, 0xffff, 0x6930f3f, 0x0, 0x6ce, 0x380000000000, 0x4, 0x48, 0x7fff, 0x7, 0x9, 0x1, 0x2, 0x8, 0x0, 0x0, 0x4, 0x1, 0x1000, 0x0, 0xff, 0x2, @perf_config_ext, 0x10000, 0x4, 0x9, 0x0, 0x400, 0x0, 0xafa}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40046607, &(0x7f00000001c0)=0x1f) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000280), 0x2df) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 265.440498] snd_virmidi snd_virmidi.0: control 112:0:0:Î:0 is already present [ 265.484162] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 265.606504] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 265.672447] ================================================================== [ 265.679863] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 265.686387] CPU: 1 PID: 7917 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #63 [ 265.693584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.702954] Call Trace: [ 265.705573] dump_stack+0x306/0x460 [ 265.709237] ? loaded_vmcs_init+0x343/0x590 [ 265.713611] kmsan_report+0x1a3/0x2d0 [ 265.717456] __msan_warning+0x7c/0xe0 [ 265.721293] loaded_vmcs_init+0x343/0x590 [ 265.725485] __loaded_vmcs_clear+0x2fb/0x3c0 [ 265.729935] generic_exec_single+0x17b/0x500 [ 265.734376] ? vmx_get_msr_feature+0x180/0x180 [ 265.738991] smp_call_function_single+0x290/0x500 [ 265.743863] ? vmx_get_msr_feature+0x180/0x180 [ 265.748501] vmx_free_vcpu+0x582/0x8a0 [ 265.752423] ? vmx_create_vcpu+0x7920/0x7920 [ 265.756867] kvm_arch_destroy_vm+0x727/0xcd0 [ 265.761334] kvm_put_kvm+0x100b/0x1cf0 [ 265.765290] kvm_vcpu_release+0xad/0x100 [ 265.769381] ? kvm_vcpu_mmap+0x80/0x80 [ 265.773295] __fput+0x4e8/0xda0 [ 265.776622] ____fput+0x37/0x40 [ 265.779925] ? fput+0x3e0/0x3e0 [ 265.783242] task_work_run+0x467/0x500 [ 265.787181] prepare_exit_to_usermode+0x364/0x470 [ 265.792077] syscall_return_slowpath+0x112/0x880 [ 265.796970] ? __close_fd+0x465/0x4c0 [ 265.800826] ? __se_sys_close+0x72/0x140 [ 265.804926] do_syscall_64+0xe4/0x100 [ 265.808781] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 265.814013] RIP: 0033:0x411051 [ 265.817238] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 265.836172] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 265.843927] RAX: 0000000000000000 RBX: 000000000000000a RCX: 0000000000411051 [ 265.851218] RDX: 0000000000000000 RSI: 0000000000730aa0 RDI: 0000000000000009 [ 265.858525] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 265.865810] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 265.873096] R13: 0000000000000001 R14: 0000000000000006 R15: 0000000000000004 [ 265.880407] [ 265.882046] Local variable description: ----error.i@loaded_vmcs_init [ 265.888539] Variable was created at: [ 265.892278] loaded_vmcs_init+0x8a/0x590 [ 265.896362] __loaded_vmcs_clear+0x2fb/0x3c0 [ 265.900780] ================================================================== [ 265.908149] Disabling lock debugging due to kernel taint [ 265.913636] Kernel panic - not syncing: panic_on_warn set ... [ 265.913636] [ 265.921041] CPU: 1 PID: 7917 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #63 [ 265.929641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.939047] Call Trace: [ 265.941687] dump_stack+0x306/0x460 [ 265.945369] panic+0x54c/0xafa [ 265.948646] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 265.954415] kmsan_report+0x2cd/0x2d0 [ 265.958255] __msan_warning+0x7c/0xe0 [ 265.962092] loaded_vmcs_init+0x343/0x590 [ 265.966311] __loaded_vmcs_clear+0x2fb/0x3c0 [ 265.970760] generic_exec_single+0x17b/0x500 [ 265.975200] ? vmx_get_msr_feature+0x180/0x180 [ 265.979818] smp_call_function_single+0x290/0x500 [ 265.984703] ? vmx_get_msr_feature+0x180/0x180 [ 265.989370] vmx_free_vcpu+0x582/0x8a0 [ 265.993293] ? vmx_create_vcpu+0x7920/0x7920 [ 265.997736] kvm_arch_destroy_vm+0x727/0xcd0 [ 266.002210] kvm_put_kvm+0x100b/0x1cf0 [ 266.006182] kvm_vcpu_release+0xad/0x100 [ 266.010269] ? kvm_vcpu_mmap+0x80/0x80 [ 266.014192] __fput+0x4e8/0xda0 [ 266.017531] ____fput+0x37/0x40 [ 266.020850] ? fput+0x3e0/0x3e0 [ 266.024167] task_work_run+0x467/0x500 [ 266.028108] prepare_exit_to_usermode+0x364/0x470 [ 266.033007] syscall_return_slowpath+0x112/0x880 [ 266.037812] ? __close_fd+0x465/0x4c0 [ 266.041661] ? __se_sys_close+0x72/0x140 [ 266.045787] do_syscall_64+0xe4/0x100 [ 266.049622] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 266.054837] RIP: 0033:0x411051 [ 266.058059] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 266.077323] RSP: 002b:0000000000a3fd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 266.085072] RAX: 0000000000000000 RBX: 000000000000000a RCX: 0000000000411051 [ 266.092715] RDX: 0000000000000000 RSI: 0000000000730aa0 RDI: 0000000000000009 [ 266.100023] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 266.107312] R10: 0000000000a3fcc0 R11: 0000000000000293 R12: 0000000000000000 [ 266.114611] R13: 0000000000000001 R14: 0000000000000006 R15: 0000000000000004 [ 266.122859] Kernel Offset: disabled [ 266.126496] Rebooting in 86400 seconds..