[ 60.914385] audit: type=1800 audit(1539203719.952:27): pid=6154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 62.480768] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 64.962435] random: sshd: uninitialized urandom read (32 bytes read) [ 65.453349] random: sshd: uninitialized urandom read (32 bytes read) [ 67.472203] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.80' (ECDSA) to the list of known hosts. [ 73.316534] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/10 20:35:34 fuzzer started [ 78.000138] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/10 20:35:39 dialing manager at 10.128.0.26:45337 2018/10/10 20:35:39 syscalls: 1 2018/10/10 20:35:39 code coverage: enabled 2018/10/10 20:35:39 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/10 20:35:39 setuid sandbox: enabled 2018/10/10 20:35:39 namespace sandbox: enabled 2018/10/10 20:35:39 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/10 20:35:39 fault injection: enabled 2018/10/10 20:35:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/10 20:35:39 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/10 20:35:39 net device setup: enabled [ 84.360819] random: crng init done 20:37:49 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) [ 211.780494] IPVS: ftp: loaded support on port[0] = 21 [ 213.165635] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.172288] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.180978] device bridge_slave_0 entered promiscuous mode [ 213.329746] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.336379] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.345214] device bridge_slave_1 entered promiscuous mode [ 213.491774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.638588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.083925] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.239116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.526261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.533467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.980279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.988757] team0: Port device team_slave_0 added 20:37:54 executing program 1: r0 = getpgrp(0x0) r1 = gettid() mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x31, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x16, &(0x7f00003efff0)={0x0, 0x0, 0x3ffff}) rt_sigtimedwait(&(0x7f0000a70000)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000000080)={0x77359400}, 0x8) [ 215.134832] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.143171] team0: Port device team_slave_1 added [ 215.366203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.629127] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.636447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.645722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.958625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.966402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.975791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.105412] IPVS: ftp: loaded support on port[0] = 21 [ 216.312284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 216.319950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.329515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.189786] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.196517] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.205308] device bridge_slave_0 entered promiscuous mode [ 218.524746] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.531228] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.539905] device bridge_slave_1 entered promiscuous mode [ 218.797459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.037903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.054045] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.060520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.067648] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.074196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.083562] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.090659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.771433] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.078532] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.298253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.306096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.586208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.593399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:37:59 executing program 2: ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x101, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, r0, 0xb) [ 221.187439] ip (6459) used greatest stack depth: 53056 bytes left [ 221.426207] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.434590] team0: Port device team_slave_0 added [ 221.732206] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.740609] team0: Port device team_slave_1 added [ 222.067493] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.083652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.092957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.374643] IPVS: ftp: loaded support on port[0] = 21 [ 222.382245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.389283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.398337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.751154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.758851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.768482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.062008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.069645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.078838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.066660] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.073445] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.082173] device bridge_slave_0 entered promiscuous mode [ 225.395507] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.402166] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.410963] device bridge_slave_1 entered promiscuous mode [ 225.705473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.085895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.266713] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.273273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.280240] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.286830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.295909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.782380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.094489] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.329052] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.550495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.557792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.878892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.886137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.599709] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.608299] team0: Port device team_slave_0 added [ 228.836536] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.845007] team0: Port device team_slave_1 added [ 229.087555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.094825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.104027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.351477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.358974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.368285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 20:38:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x200) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x3, 0x4}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) [ 229.655946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.663790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.673330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.036259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.044160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.053746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.951891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.132171] IPVS: ftp: loaded support on port[0] = 21 [ 232.330074] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.681171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.687878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.696322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.623654] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.630143] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.639013] device bridge_slave_0 entered promiscuous mode [ 234.692812] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.699402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.706523] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.713074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.722409] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.901999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.934085] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.066825] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.073480] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.082306] device bridge_slave_1 entered promiscuous mode [ 235.439479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.846510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.894363] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.348715] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.635845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.643188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.010871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.018256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.253672] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.262284] team0: Port device team_slave_0 added [ 239.575950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.584421] team0: Port device team_slave_1 added [ 239.956473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.963861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.973002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.283574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.290739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.300960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 20:38:19 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000100)=ANY=[]], 0x0, 0x0, &(0x7f00004ee64e)}) [ 240.670618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.678552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.687965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.158319] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.166372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.175817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.437699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.298452] IPVS: ftp: loaded support on port[0] = 21 [ 243.208053] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 20:38:23 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:38:24 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) [ 244.919385] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.926024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.934309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:38:24 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:38:24 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) 20:38:25 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) [ 246.178911] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.185541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.192724] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.199343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.209037] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 246.265055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:38:25 executing program 0: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) [ 246.649711] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.699344] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.706084] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.714808] device bridge_slave_0 entered promiscuous mode 20:38:26 executing program 0: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f00000007c0)}, 0x0) [ 247.159453] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.166349] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.175134] device bridge_slave_1 entered promiscuous mode 20:38:26 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000), 0x0, &(0x7f00000007c0)}, 0x0) [ 247.644589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.080577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.157794] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.518351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.942058] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.952996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.351245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.358836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.237661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.549395] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.558150] team0: Port device team_slave_0 added [ 251.956357] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.964922] team0: Port device team_slave_1 added [ 252.340013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.347324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.356485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.678405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.731080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.738537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.747771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.990819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.998958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.008262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.279554] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.287551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.297337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.979167] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.985810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.993897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:38:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) accept4(r1, &(0x7f0000000300)=@nl, &(0x7f0000000380)=0x80, 0x0) [ 255.155387] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.255213] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.261789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.268878] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.275644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.284303] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.291398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.600957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.410251] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 20:38:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r0, r1, &(0x7f0000000600), 0x10500) [ 261.222143] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.229118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.237363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.850329] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.987428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.540355] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.076459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.083018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.090894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.381883] hrtimer: interrupt took 43705 ns [ 265.961850] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.017914] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 269.029362] clocksource: 'acpi_pm' wd_now: bbb3f9 wd_last: 1780c8 mask: ffffff [ 269.038864] clocksource: 'tsc' cs_now: 9578621c23 cs_last: 93dc412ae6 mask: ffffffffffffffff [ 269.049528] tsc: Marking TSC unstable due to clocksource watchdog 20:38:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x200) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x3, 0x4}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) [ 269.095086] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 269.104032] sched_clock: Marking unstable (269153568303, -58505832)<-(269219072512, -124009344) [ 269.143670] clocksource: Switched to clocksource acpi_pm [ 272.179672] binder: 7577:7578 unknown command -1 [ 272.184872] binder: 7577:7578 ioctl c0306201 200001c0 returned -22 [ 272.193207] binder: 7577:7578 unknown command -1 [ 272.198117] binder: 7577:7578 ioctl c0306201 200001c0 returned -22 20:38:51 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) lseek(r1, 0x0, 0x3) 20:38:51 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000), 0x0, &(0x7f00000007c0)}, 0x0) 20:38:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) dup3(r0, r1, 0x0) 20:38:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r0, r1, &(0x7f0000000600), 0x10500) 20:38:51 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 20:38:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x200) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x3, 0x4}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 20:38:51 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000), 0x0, &(0x7f00000007c0)}, 0x0) 20:38:51 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)}], 0x1, &(0x7f00000007c0)}, 0x0) 20:38:52 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10a2edee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb96000000000000000579cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") fgetxattr(r1, &(0x7f0000000000)=@known='user.syz\x00', 0x0, 0x0) [ 273.260722] binder: BINDER_SET_CONTEXT_MGR already set [ 273.266653] binder: 7585:7593 ioctl 40046207 0 returned -16 [ 273.381292] binder: release 7585:7593 transaction 2 out, still active [ 273.778958] binder: send failed reply for transaction 2, target dead [ 275.553589] IPVS: ftp: loaded support on port[0] = 21 20:38:52 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)}], 0x1, &(0x7f00000007c0)}, 0x0) 20:38:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_tables_matches\x00') bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r2, r1, &(0x7f0000000240), 0x734) 20:38:53 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x8002) r1 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 20:38:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) 20:38:53 executing program 2: creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x1227d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000100)='./file0\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000540)={0x0, 0x0, @ioapic}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000140), 0x2}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x0, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(r1, &(0x7f0000000180)="2f67726f75702e73746574003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad82ca7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0dfca0d4b1dee483b157624c59c0100e89e6a357c00", 0x2761, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6e0}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000240)=0x100, 0x2) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000640)) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000400)='-selfmime_type\x00', 0xffffffffffffffff}, 0x30) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000003c0)) [ 276.839040] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.845531] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.853826] device bridge_slave_0 entered promiscuous mode [ 276.934627] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.941004] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.949598] device bridge_slave_1 entered promiscuous mode [ 277.027557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 277.104829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 277.345197] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 277.433275] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 277.516751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 277.523978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 277.607066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 277.614253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 277.859871] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 277.867856] team0: Port device team_slave_0 added [ 277.947485] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 277.955362] team0: Port device team_slave_1 added [ 278.035791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.120261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.200822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.208352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.217481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.292694] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 278.300311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.309566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.203604] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.210012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.217135] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.223670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.232089] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.482032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.732048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.032066] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.335565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 283.341906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.349724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.648593] 8021q: adding VLAN 0 to HW filter on device team0 20:39:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) dup3(r0, r1, 0x0) 20:39:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000001280)={0x0, 0xfffffffffffffffc, 0x1}) 20:39:04 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07d", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:39:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 20:39:04 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 20:39:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x200) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x3, 0x4}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) [ 285.885514] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 285.955788] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:39:05 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f00000005c0), 0x0) 20:39:05 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 20:39:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 20:39:06 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000102ff30d7274f9999686e00fddfc7437b22000000000000000000", 0x1f) 20:39:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10a2edee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb96000000000000000579cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") fgetxattr(r0, &(0x7f0000000400)=@known='user.syz\x00', 0x0, 0x216) 20:39:06 executing program 1: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000140)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x10}, &(0x7f0000000080)=0x18) 20:39:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) [ 288.069957] sctp: failed to load transform for md5: -2 20:39:07 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) [ 288.612213] netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. 20:39:08 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07d", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:39:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 20:39:08 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) madvise(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x7) munmap(&(0x7f000000a000/0x3000)=nil, 0x3000) madvise(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x10000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000040)=[{r2, 0x118}], 0x1, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000006c0)={0x2d, 0x1b, 0x17, 0xe, 0x3, 0x3, 0x3, 0x105}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x2, 0x6, 0x7fffffff, 0x5ae2}, &(0x7f0000000740)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000780)={r3, 0x6, 0x6}, &(0x7f00000007c0)=0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) futex(&(0x7f0000000400), 0xb, 0x2, &(0x7f0000000440)={0x77359400}, &(0x7f00000005c0), 0x1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="7f8e6b2d4263cd8c8d60dfc48d5b2118", 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) r4 = socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="c1000000936a675c26e0fe1b6c2c9ef76ad8d487b34096af3ace30b841989532fe54a2d5ffc2495af45cdd42cb32fdb87f453c9d0393453a98fd9ceb41484acade31801a514bb50c890abb5aecfb3ca7fe8dd1d4cce6a24abcf6784ac82c4352c95c9766cedecdbe0f60564124c51b31569d0cc8a2d7933d684060dcc022cc60b248fb88fb76b2015fba30d7effde57d12adffa8632b17a05a7d6e292aa90c329e31560929e72fa49fa715c62e1ca302c6aadd7061bb9a40900effbea5efe38a9e92b2370d"], &(0x7f0000000580)=0x1) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000800)=@assoc_value={r3, 0x3}, 0xfffffffffffffde0) syz_open_procfs(0x0, &(0x7f0000000640)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02a4c7edbcd7a071fb35331ce39c5a11fc10c4908e69eeae12cd3975eec59b29cb622b79dbc41f4e0101") setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x9}, 0x100) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000180)={0x1}, 0xc) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[], 0xa37cf698) [ 289.240081] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:39:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x100000000032, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @loopback}, 0x8) 20:39:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000002c0)={'syz'}, &(0x7f0000000300)='B', 0x1, r0) 20:39:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="bf16000000000000b707000001000000407000000000e01650000000000000009500000000000000"], &(0x7f00000000c0)="47504c02"}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 20:39:08 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07d", 0x2b}], 0x1, &(0x7f00000007c0)}, 0x0) 20:39:08 executing program 1: r0 = inotify_init() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x9, &(0x7f0000000080)=0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x48204) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r3, 0x1, &(0x7f0000000980)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000280), 0x0, 0x800}]) io_submit(r3, 0x19c, &(0x7f0000000740)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x6}]) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000140)) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x40001ff) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) close(r0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 20:39:08 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x80000003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00008df000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write(r1, &(0x7f00004abf1b)="ae", 0x1) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x80000000001, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) vmsplice(r1, &(0x7f00000005c0)=[{&(0x7f0000000540)="17", 0x1}], 0x1, 0x0) readv(r0, &(0x7f0000c9e000)=[{&(0x7f0000c25f19)=""/231, 0xe7}], 0x1) 20:39:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x100000000032, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @loopback}, 0x8) 20:39:09 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d2500080008000c00080000de72f07dc728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1, &(0x7f00000007c0)}, 0x0) 20:39:09 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000280)={[], 0x0, 0x6, 0x48000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10100, 0x0) 20:39:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b70000000000ecffbfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000015d400300000000006506000001ed00001c040000000000007d460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:39:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x100000000032, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @loopback}, 0x8) [ 290.516333] ================================================================== [ 290.521600] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 290.521600] CPU: 0 PID: 7992 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #66 [ 290.521600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.521600] Call Trace: [ 290.521600] dump_stack+0x306/0x460 [ 290.521600] ? vmap_page_range_noflush+0x975/0xed0 [ 290.521600] kmsan_report+0x1a2/0x2e0 [ 290.521600] __msan_warning+0x7c/0xe0 [ 290.521600] vmap_page_range_noflush+0x975/0xed0 [ 290.521600] map_vm_area+0x17d/0x1f0 [ 290.521600] kmsan_vmap+0xf2/0x180 [ 290.521600] vmap+0x3a1/0x510 [ 290.521600] ? relay_open_buf+0x81e/0x19d0 [ 290.521600] relay_open_buf+0x81e/0x19d0 [ 290.521600] relay_open+0xabb/0x1370 [ 290.521600] do_blk_trace_setup+0xaf7/0x1780 [ 290.521600] __blk_trace_setup+0x20b/0x380 [ 290.521600] blk_trace_ioctl+0x274/0x970 [ 290.521600] ? kmsan_set_origin_inline+0x6b/0x120 [ 290.521600] ? __msan_poison_alloca+0x17a/0x210 [ 290.521600] ? blkdev_ioctl+0x327/0x55e0 [ 290.521600] ? block_ioctl+0x16f/0x1d0 [ 290.521600] blkdev_ioctl+0x1aaa/0x55e0 [ 290.521600] ? do_futex+0xada/0x59c0 [ 290.521600] ? task_kmsan_context_state+0x6b/0x120 [ 290.521600] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 290.521600] ? vmalloc_to_page+0x57d/0x6b0 [ 290.521600] ? kmsan_set_origin_inline+0x6b/0x120 [ 290.521600] block_ioctl+0x16f/0x1d0 [ 290.521600] ? block_llseek+0x190/0x190 [ 290.521600] do_vfs_ioctl+0xcf3/0x2810 [ 290.521600] ? security_file_ioctl+0x92/0x200 [ 290.521600] __se_sys_ioctl+0x1da/0x270 [ 290.521600] __x64_sys_ioctl+0x4a/0x70 [ 290.521600] do_syscall_64+0xbe/0x100 [ 290.521600] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.521600] RIP: 0033:0x457579 [ 290.521600] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.521600] RSP: 002b:00007fe6ea116c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.521600] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 290.521600] RDX: 0000000020000280 RSI: 00000000c0481273 RDI: 0000000000000003 [ 290.521600] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.521600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe6ea1176d4 [ 290.521600] R13: 00000000004be9e3 R14: 00000000004ce6e0 R15: 00000000ffffffff [ 290.521600] [ 290.521600] Uninit was created at: [ 290.521600] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 290.521600] kmsan_kmalloc+0xa4/0x120 [ 290.521600] __kmalloc+0x14b/0x440 [ 290.521600] kmsan_vmap+0x9b/0x180 [ 290.521600] vmap+0x3a1/0x510 [ 290.521600] relay_open_buf+0x81e/0x19d0 [ 290.521600] relay_open+0xabb/0x1370 [ 290.521600] do_blk_trace_setup+0xaf7/0x1780 [ 290.521600] __blk_trace_setup+0x20b/0x380 [ 290.521600] blk_trace_ioctl+0x274/0x970 [ 290.521600] blkdev_ioctl+0x1aaa/0x55e0 [ 290.521600] block_ioctl+0x16f/0x1d0 [ 290.521600] do_vfs_ioctl+0xcf3/0x2810 [ 290.521600] __se_sys_ioctl+0x1da/0x270 [ 290.521600] __x64_sys_ioctl+0x4a/0x70 [ 290.521600] do_syscall_64+0xbe/0x100 [ 290.521600] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.521600] ================================================================== [ 290.521600] Disabling lock debugging due to kernel taint [ 290.521600] Kernel panic - not syncing: panic_on_warn set ... [ 290.521600] [ 290.521600] CPU: 0 PID: 7992 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #66 [ 290.521600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.521600] Call Trace: [ 290.521600] dump_stack+0x306/0x460 [ 290.521600] panic+0x54c/0xafa [ 290.521600] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 290.521600] kmsan_report+0x2d3/0x2e0 [ 290.521600] __msan_warning+0x7c/0xe0 [ 290.521600] vmap_page_range_noflush+0x975/0xed0 [ 290.521600] map_vm_area+0x17d/0x1f0 [ 290.521600] kmsan_vmap+0xf2/0x180 [ 290.521600] vmap+0x3a1/0x510 [ 290.521600] ? relay_open_buf+0x81e/0x19d0 [ 290.521600] relay_open_buf+0x81e/0x19d0 [ 290.521600] relay_open+0xabb/0x1370 [ 290.521600] do_blk_trace_setup+0xaf7/0x1780 [ 290.521600] __blk_trace_setup+0x20b/0x380 [ 290.521600] blk_trace_ioctl+0x274/0x970 [ 290.521600] ? kmsan_set_origin_inline+0x6b/0x120 [ 290.521600] ? __msan_poison_alloca+0x17a/0x210 [ 290.521600] ? blkdev_ioctl+0x327/0x55e0 [ 290.521600] ? block_ioctl+0x16f/0x1d0 [ 290.521600] blkdev_ioctl+0x1aaa/0x55e0 [ 290.521600] ? do_futex+0xada/0x59c0 [ 290.521600] ? task_kmsan_context_state+0x6b/0x120 [ 290.521600] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 290.521600] ? vmalloc_to_page+0x57d/0x6b0 [ 290.521600] ? kmsan_set_origin_inline+0x6b/0x120 [ 290.521600] block_ioctl+0x16f/0x1d0 [ 290.521600] ? block_llseek+0x190/0x190 [ 290.521600] do_vfs_ioctl+0xcf3/0x2810 [ 290.521600] ? security_file_ioctl+0x92/0x200 [ 290.521600] __se_sys_ioctl+0x1da/0x270 [ 290.521600] __x64_sys_ioctl+0x4a/0x70 [ 290.521600] do_syscall_64+0xbe/0x100 [ 290.521600] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.521600] RIP: 0033:0x457579 [ 290.521600] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.521600] RSP: 002b:00007fe6ea116c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.521600] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 290.521600] RDX: 0000000020000280 RSI: 00000000c0481273 RDI: 0000000000000003 [ 290.521600] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.521600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe6ea1176d4 [ 290.521600] R13: 00000000004be9e3 R14: 00000000004ce6e0 R15: 00000000ffffffff [ 290.521600] Kernel Offset: disabled [ 290.521600] Rebooting in 86400 seconds..