[ 55.248941] audit: type=1800 audit(1539948318.291:25): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.268390] audit: type=1800 audit(1539948318.311:26): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.288029] audit: type=1800 audit(1539948318.321:27): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 55.307822] audit: type=1800 audit(1539948318.351:28): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/10/19 11:25:31 fuzzer started 2018/10/19 11:25:36 dialing manager at 10.128.0.26:36973 2018/10/19 11:25:36 syscalls: 1 2018/10/19 11:25:36 code coverage: enabled 2018/10/19 11:25:36 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/19 11:25:36 setuid sandbox: enabled 2018/10/19 11:25:36 namespace sandbox: enabled 2018/10/19 11:25:36 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/19 11:25:36 fault injection: enabled 2018/10/19 11:25:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/19 11:25:36 net packed injection: enabled 2018/10/19 11:25:36 net device setup: enabled 11:27:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398416f1d}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) syzkaller login: [ 214.777082] IPVS: ftp: loaded support on port[0] = 21 [ 217.330943] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.337578] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.346356] device bridge_slave_0 entered promiscuous mode [ 217.489928] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.496646] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.505224] device bridge_slave_1 entered promiscuous mode [ 217.645370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.786248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:28:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b707000001000000487000000000e0ff48000000000000009500000000000000"], &(0x7f0000000300)="4f50431c4e4c0000eb0000000000000000"}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xe, 0xf6, &(0x7f00000000c0)="410b8a8046c3a988fbc5f08e8eb0", &(0x7f00000001c0)=""/246, 0xffffffff00000f21}, 0x28) [ 218.328485] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.501748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.706546] IPVS: ftp: loaded support on port[0] = 21 [ 218.891885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.898948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.468516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.476632] team0: Port device team_slave_0 added [ 219.706307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.714807] team0: Port device team_slave_1 added [ 220.017600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.024814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.033705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.196724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.203938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.213015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.508423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.516186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.525145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.750499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.758315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.767693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.544844] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.551316] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.559840] device bridge_slave_0 entered promiscuous mode [ 222.804668] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.811176] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.820359] device bridge_slave_1 entered promiscuous mode 11:28:05 executing program 2: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) fallocate(r0, 0x0, 0x0, 0x6) [ 223.003822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.201525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.770237] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.776848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.783914] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.790367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.799389] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.852001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.955423] IPVS: ftp: loaded support on port[0] = 21 [ 224.091122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.385427] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.679800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.686996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.071413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.078556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.916848] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.925029] team0: Port device team_slave_0 added [ 226.148384] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.156568] team0: Port device team_slave_1 added [ 226.505799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 226.513364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.522389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.817592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.825370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.834228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.119346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.127102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.136629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.469379] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.477135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.486165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.123807] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.130286] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.138798] device bridge_slave_0 entered promiscuous mode [ 228.435841] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.442458] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.450794] device bridge_slave_1 entered promiscuous mode [ 228.726419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.049371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.974582] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.271246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.491708] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.498221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.505271] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.511802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.520386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.550124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.557330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.744515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.751578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.992066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 11:28:14 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x6) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 231.804680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.812866] team0: Port device team_slave_0 added [ 232.140906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.149093] team0: Port device team_slave_1 added [ 232.175829] IPVS: ftp: loaded support on port[0] = 21 [ 232.531519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.538794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.547956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.852444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.859581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.868763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.203023] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.210605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.219961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.536355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.544008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.553141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.565890] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.572468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.579381] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.586003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.594988] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.762484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.130674] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.137387] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.145942] device bridge_slave_0 entered promiscuous mode [ 238.412103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.487713] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.494493] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.502950] device bridge_slave_1 entered promiscuous mode [ 238.948371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.056294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.334308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.363491] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.369858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.378170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.501957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.893212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.225317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.232539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 11:28:24 executing program 4: perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x70, 0x5, 0x0, 0x7c6, 0xffff, 0x0, 0x0, 0x4, 0x0, 0x26, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x80000001, 0x80000000, 0x0, 0x0, 0x4, 0x5, 0x0, 0xab, 0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x400, 0x8, 0x8, 0x10001, 0x8000, 0x100000001, 0x7, 0x5, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000300)}, 0x0, 0x9, 0x9, 0x7, 0xfff, 0x0, 0x557}, 0xffffffffffffff9c, 0x7, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x80000201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000004900)={&(0x7f00000048c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800000000000) [ 241.638860] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.663107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.670156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.886738] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.894956] team0: Port device team_slave_0 added [ 243.098207] IPVS: ftp: loaded support on port[0] = 21 [ 243.366656] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.375227] team0: Port device team_slave_1 added [ 243.782381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.789513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.798426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.243485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 244.250533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.260103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.683869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.691454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.700557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.049255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.057428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.066580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.458863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.226532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.869442] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.876059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.884269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.805442] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.811992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.819359] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.825947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.834760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.415094] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.421522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.591867] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.598345] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.606961] device bridge_slave_0 entered promiscuous mode [ 251.125091] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.131574] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.140105] device bridge_slave_1 entered promiscuous mode [ 251.638779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:28:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000140)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x0) [ 252.050493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:28:35 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af05, &(0x7f0000000140)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04032bbd7000fedbdf251b00000004000500"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x4000) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af24, &(0x7f0000000280)) 11:28:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0xffffffffffffffab) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8afb84f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x15) recvmmsg(r1, &(0x7f0000007ec0)=[{{&(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a00)=""/144, 0x90}, {&(0x7f0000000ac0)=""/145, 0x91}], 0x2, &(0x7f0000000cc0)=""/251, 0xfb}}], 0x1, 0x0, &(0x7f0000008040)) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x8001, 0x5}]}, 0xc, 0x1) 11:28:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x880, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x728e, 0xfffffffffffffffc, 0x200, 0x1f, 0xc000000, 0x9, 0x3a, 0xffffffff, r4}, &(0x7f0000000300)=0x20) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000000c0)="01a8f592c54da4c88a9452e0fb1014f0", 0x10) ioctl$TCSETAF(r0, 0x5408, 0xfffffffffffffffe) [ 253.266095] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.682061] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:28:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10048463f7) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x1, 0x7, 0x70ed, 0x8000, 'syz1\x00', 0xffffffff}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x10000000e) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000006, 0x24015, r0, 0x0) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x20, 0x4, 0x6}}, 0x14) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x4a8, 0x401, 0x3ff}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="be000000cfcc1c42d6500d02a8248ee74f945910abd940ff9b7ea9c6a050b264379a68cf1a1e7e63d5f37c884a38942bc6c3e779dea38a998f73e1762a4f394f0b2c717dd8361cb5d8c6b25bb5210fd489de0b39c011232ed7f4078987ca58821f700dc8d73098f81893aee3e3188d9d00542b9e76676b8b07b43bb5ad2fb005e3f699cf8110b0148b98b74621328590448df075fd5becccfa8418b30897b1db893e2451c361452e1dc14d7920501beee6b7b05b284e18849300000000712f186e454be4cb0ea4e429067d4af16f661bfcce"], &(0x7f0000000300)=0xc6) 11:28:37 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x11) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0xab, 0x14, [0x81, 0x3, 0x2, 0x0, 0x7fff]}) r1 = gettid() r2 = fcntl$getown(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r0, r0, 0x3f}) r3 = request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='md5summime_typevmnet0keyringmd5summd5sum-eth0GPL/(vmnet0\x00', 0xffffffffffffffff) r4 = add_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="3a7ed8539985c31309fe994d729f22134229795695e907040842083d5bec472a90dba9f2af3e75524bd829712901d4f976cf5cfddf918bdabfc4dc13690504cbcfa30023a7825623e6c35fa0b1cb1087c927f5ee4896bd9dcecfc70731e89ef73bddd66d86c066c88a256c118061cd050d28d940da39ab6a9e6a9d4a22bca8f6336b5f75f3548aa88962db63eba7cae7097446e397fd27", 0x97, 0xfffffffffffffff8) keyctl$instantiate(0xc, r3, &(0x7f0000000180)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', "", 0x20, 0x3}, 0x28, r4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x101}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000380)={r5, 0x80000000, 0x30, 0x2, 0x4}, &(0x7f00000003c0)=0x18) preadv(r0, &(0x7f0000002700)=[{&(0x7f0000000400)=""/231, 0xe7}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/103, 0x67}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/253, 0xfd}, {&(0x7f00000026c0)}], 0x7, 0x0) keyctl$unlink(0x9, r4, r4) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000002780)) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000027c0)={0x6, 0xc8, 0x4, 0xfffffffffffffffc, 0x7, 0x9}) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002800)='/dev/uinput\x00', 0x0, 0x0) process_vm_readv(r2, &(0x7f0000003940)=[{&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/210, 0xd2}], 0x2, &(0x7f0000003a80)=[{&(0x7f0000003980)=""/32, 0x20}, {&(0x7f00000039c0)=""/172, 0xac}], 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000003ac0)) ptrace(0x18, r1) recvmmsg(r0, &(0x7f0000006240)=[{{&(0x7f0000003b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003b80)=""/241, 0xf1}], 0x1, &(0x7f0000003cc0)=""/3, 0x3, 0x1}, 0x8}, {{&(0x7f0000003d00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000005e00)=[{&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/2, 0x2}, {&(0x7f0000004dc0)=""/60, 0x3c}, {&(0x7f0000004e00)=""/4096, 0x1000}], 0x4, &(0x7f0000005e40)=""/53, 0x35}, 0x5}, {{0x0, 0x0, &(0x7f00000061c0)=[{&(0x7f0000005e80)=""/208, 0xd0}, {&(0x7f0000005f80)=""/37, 0x25}, {&(0x7f0000005fc0)=""/43, 0x2b}, {&(0x7f0000006000)=""/214, 0xd6}, {&(0x7f0000006100)=""/132, 0x84}], 0x5, 0x0, 0x0, 0x9}, 0x800}], 0x3, 0x1, &(0x7f0000006300)={0x0, 0x989680}) write$uinput_user_dev(r0, &(0x7f0000006340)={'syz1\x00', {0x7, 0x8000, 0x0, 0x10000}, 0x15, [0x1, 0xc5f, 0x2, 0x63c, 0x6, 0x6, 0xfffffffffffffff9, 0x7, 0x8001, 0xfffffffffffffff9, 0x80000000, 0x5, 0x0, 0xfffffffffffffffc, 0x10001, 0x4c, 0x9, 0x81, 0x7, 0x85, 0x9, 0x2, 0x0, 0x4, 0x5, 0x5156, 0x100000000, 0x244c, 0x9, 0x4, 0xe2d, 0x10000, 0x7ff, 0x14, 0x9000000, 0x1, 0x8, 0x6, 0xe9, 0x1, 0x29f8000000000000, 0x2, 0x0, 0x1, 0x9, 0x5, 0x0, 0x5, 0x4, 0x0, 0x6, 0x7, 0x4, 0x6, 0x401, 0x5, 0x1, 0x0, 0x8, 0x1, 0xffff, 0x1, 0x7, 0x5], [0x5, 0x3, 0x9e, 0x80, 0x5, 0x7, 0x2, 0x3, 0xfffffffffffffffb, 0xfffffffffffffffb, 0x1000, 0x68, 0x6, 0x502, 0x80000001, 0x1, 0x4, 0x0, 0xfffffffffffffff7, 0x401, 0x2, 0x4, 0x3f, 0x5, 0x1f, 0x7, 0xff, 0x7f, 0x5, 0x5, 0x2, 0xfffffffffffffff7, 0x1, 0xffff, 0x8, 0x22, 0x1ff, 0x1, 0x7, 0xad3, 0x23, 0x9, 0x1ff, 0x9ea0000000, 0x1, 0x4, 0x3ff, 0x1, 0x0, 0x10000, 0x6, 0x100000000, 0x7, 0x9, 0x3, 0x7, 0x8000, 0x101, 0x6, 0x4, 0x733, 0xffffffffffffff8c, 0x9, 0x7], [0x7, 0x8, 0x0, 0x857c, 0x1000, 0x7fffffff, 0x9, 0x5, 0x0, 0x6, 0x1, 0x9e, 0xf3c0, 0x33, 0x8, 0x2, 0x8, 0x4, 0x9, 0x0, 0x4, 0x0, 0x1, 0x0, 0xa9ef, 0x7fffffff, 0x3, 0x4, 0x5, 0x5f, 0x56, 0x3, 0x7e5, 0x7, 0xff, 0x7f, 0x7, 0x8, 0x6, 0xff, 0x101, 0xffffffffffff8001, 0x400, 0xfffffffffffffff8, 0x7ff, 0x5, 0x4f9a, 0x0, 0x10000, 0x800, 0x6, 0x20, 0x1, 0x5, 0x3d3, 0x4, 0x1, 0x2, 0x7, 0x42, 0x3, 0xe00000000000, 0x0, 0x4], [0x4, 0xff, 0x9, 0xab0c, 0x0, 0x3, 0x5, 0x3, 0x1f, 0x0, 0xfff, 0x7, 0x7, 0x0, 0xffffffff, 0x100000001, 0x1f, 0x5, 0x6, 0x6fe, 0x4, 0x7, 0x3cfccd00, 0xfcd, 0x4e, 0x9, 0x48851f55, 0x4, 0x5, 0xffffffff, 0x800, 0x85, 0x4, 0x3, 0xffffffffffffe2a6, 0x7, 0x5, 0x4, 0x80000000, 0x9, 0x400, 0x874d, 0x8, 0x58f, 0x1, 0x1000, 0x9, 0x800, 0x3, 0x7f, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x81, 0xfffffffffffffff8, 0x1, 0x6, 0x0, 0x1, 0x3, 0x5, 0x3]}, 0x45c) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000067c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0xff, 0x2}}, 0x30) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000006800)={r5, @in6={{0xa, 0x4e23, 0x7, @local, 0xfffffffffffff000}}, 0x71f, 0x7f, 0x6, 0xc2c, 0x40}, &(0x7f00000068c0)=0x98) r9 = getpgid(r1) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000006900)={0x0, r7, 0xffffffffffffff81, 0x6, 0x3, 0xfbe1}) capget(&(0x7f0000006940)={0x20071026, r9}, &(0x7f0000006980)={0x8a, 0x0, 0x5, 0x4e5, 0x1ff}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000006a00)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r7, &(0x7f0000006d00)={&(0x7f00000069c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000006cc0)={&(0x7f0000006a40)={0x248, r10, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x22}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x65}]}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x29}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fff80000000000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x314a}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x19}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x8000}, 0x40) removexattr(&(0x7f0000006d40)='./file0/file0\x00', &(0x7f0000006d80)=@known='trusted.overlay.impure\x00') setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000006dc0)=r8, 0x4) 11:28:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000340)=""/138, 0x8a}, {&(0x7f0000000480)=""/29, 0x1d}, {&(0x7f00000006c0)=""/157, 0x9d}], 0x3, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 254.220043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.227291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.723557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.730601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.768369] 8021q: adding VLAN 0 to HW filter on device bond0 11:28:37 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x911, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 255.627966] IPVS: ftp: loaded support on port[0] = 21 [ 255.862352] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.870389] team0: Port device team_slave_0 added [ 256.246580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.285310] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 256.293662] team0: Port device team_slave_1 added [ 256.648048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.655273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.664034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.097281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 257.104496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.113364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.435528] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.442094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.450046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.534214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.541997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.550832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.939497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 257.947176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.956236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.869388] 8021q: adding VLAN 0 to HW filter on device team0 11:28:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000100)=[0xee01, 0xee00]) setresgid(r1, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x60, 0x0) execve(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000340)) [ 261.478466] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.485112] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.493624] device bridge_slave_0 entered promiscuous mode [ 261.645925] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.652541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.659439] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.666017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.674873] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 261.846376] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.853066] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.861577] device bridge_slave_1 entered promiscuous mode [ 261.869282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.190102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.438206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.293849] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.508086] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.759452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 263.767692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.018858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 264.026309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.837450] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.845535] team0: Port device team_slave_0 added [ 265.100931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.109088] team0: Port device team_slave_1 added [ 265.280818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.364247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.373015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.381877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.728226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.735436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.744464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.978766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.986499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.995419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.253703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.261278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.270189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.391356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 11:28:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/157, 0x9d}], 0x1, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) [ 267.515710] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 267.522183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.529913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.297468] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.077225] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.083797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.090716] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.097307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.105540] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 269.112317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.977849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.775309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 11:28:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000012) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f62344885d25d766070") ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x0) [ 273.517958] ptrace attach of "/root/syz-executor3"[7586] was attempted by "/root/syz-executor3"[7587] [ 273.582564] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.588929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.597159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.257464] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.547033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.082311] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.614536] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 277.620897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.628982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:29:00 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2081f5) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpid() mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 11:29:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x7, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x0, 0x50000000, &(0x7f0000000340), 0x0) 11:29:00 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='0\x00') 11:29:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb57be00a670493c5bd11ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYRES64]) 11:29:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000580)='ip6_vti0\x00') [ 277.790254] ip6_vti0: mtu less than device minimum [ 277.801688] hrtimer: interrupt took 109793 ns [ 277.830906] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:29:01 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1) [ 279.162014] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.047614] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 11:29:04 executing program 5: setxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='/dev/input/mice\x00', 0x10, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x2710}}) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44400) io_setup(0x9, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) 11:29:04 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000200), 0x4) 11:29:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) recvmmsg(r1, &(0x7f0000003640)=[{{&(0x7f0000001f00)=@xdp, 0x80, &(0x7f0000003580)=[{&(0x7f00000020c0)=""/181, 0xb5}], 0x1}}], 0x1, 0x0, &(0x7f00000036c0)={0x0, 0x1c9c380}) socket$kcm(0x29, 0x0, 0x0) 11:29:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sched\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:29:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 11:29:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 281.228312] ================================================================== [ 281.235786] BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x471/0x2640 [ 281.242411] CPU: 0 PID: 7803 Comm: syz-executor0 Not tainted 4.19.0-rc8+ #70 [ 281.249620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.258997] Call Trace: [ 281.261626] dump_stack+0x306/0x460 [ 281.265290] ? _raw_spin_lock_irqsave+0x227/0x340 [ 281.270166] ? _copy_to_iter+0x471/0x2640 [ 281.274364] kmsan_report+0x1a2/0x2e0 [ 281.278210] kmsan_internal_check_memory+0x374/0x460 [ 281.283377] kmsan_copy_to_user+0x89/0xe0 [ 281.287566] _copy_to_iter+0x471/0x2640 [ 281.291575] ? task_kmsan_context_state+0x6b/0x120 [ 281.296594] skb_copy_datagram_iter+0x4c3/0x1040 [ 281.301376] ? tipc_sk_anc_data_recv+0x79/0x820 [ 281.306094] tipc_recvmsg+0xd12/0x1c20 [ 281.310057] sock_recvmsg+0x1d6/0x230 [ 281.313894] ? tipc_send_packet+0x1a0/0x1a0 [ 281.318262] ___sys_recvmsg+0x459/0xae0 [ 281.322345] ? __fdget+0x318/0x430 [ 281.326023] __sys_recvmmsg+0x656/0x1120 [ 281.330119] ? kmsan_set_origin+0x83/0x140 [ 281.334424] do_sys_recvmmsg+0x2b5/0x400 [ 281.338531] __se_sys_recvmmsg+0xdd/0x100 [ 281.342739] __x64_sys_recvmmsg+0x62/0x80 [ 281.346925] do_syscall_64+0xbe/0x100 [ 281.350773] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.355987] RIP: 0033:0x457569 [ 281.359200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.378129] RSP: 002b:00007fb58a2c8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 281.385874] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 281.393165] RDX: 0000000000000001 RSI: 0000000020003640 RDI: 0000000000000004 [ 281.400451] RBP: 000000000072bf00 R08: 00000000200036c0 R09: 0000000000000000 [ 281.407759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb58a2c96d4 [ 281.415050] R13: 00000000004c3244 R14: 00000000004d4de8 R15: 00000000ffffffff [ 281.422355] [ 281.423992] Uninit was stored to memory at: 11:29:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 281.428352] kmsan_internal_chain_origin+0x136/0x240 [ 281.433487] kmsan_memcpy_origins+0x13d/0x1b0 [ 281.438007] __msan_memcpy+0xcf/0x150 [ 281.441837] tipc_group_create_event+0x672/0xb90 [ 281.446647] tipc_group_proto_rcv+0x26a5/0x38f0 [ 281.451347] tipc_sk_filter_rcv+0x2953/0x3d20 [ 281.455869] tipc_sk_rcv+0xcbe/0x2b10 [ 281.459693] tipc_node_xmit+0x2f1/0xa00 [ 281.463693] tipc_node_distr_xmit+0x40d/0x680 [ 281.468220] tipc_sk_rcv+0x1e52/0x2b10 [ 281.472128] tipc_conn_send_work+0x82e/0xe20 [ 281.476554] process_one_work+0x19c4/0x24f0 [ 281.480898] worker_thread+0x206d/0x2b30 [ 281.484985] kthread+0x59c/0x5d0 [ 281.488380] ret_from_fork+0x35/0x40 [ 281.492097] [ 281.493758] Local variable description: ----evt.sroa.11@tipc_group_create_event [ 281.501212] Variable was created at: [ 281.504949] tipc_group_create_event+0xbf/0xb90 [ 281.509632] tipc_group_proto_rcv+0x26a5/0x38f0 [ 281.514304] [ 281.515940] Bytes 32-47 of 48 are uninitialized [ 281.520613] Memory access of size 48 starts at ffff88017020dcbc [ 281.526674] ================================================================== [ 281.534041] Disabling lock debugging due to kernel taint [ 281.539502] Kernel panic - not syncing: panic_on_warn set ... [ 281.539502] [ 281.546899] CPU: 0 PID: 7803 Comm: syz-executor0 Tainted: G B 4.19.0-rc8+ #70 [ 281.555490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.564861] Call Trace: [ 281.567486] dump_stack+0x306/0x460 [ 281.571164] panic+0x54c/0xafa [ 281.574431] kmsan_report+0x2d3/0x2e0 [ 281.578263] kmsan_internal_check_memory+0x374/0x460 [ 281.583415] kmsan_copy_to_user+0x89/0xe0 [ 281.587591] _copy_to_iter+0x471/0x2640 [ 281.591583] ? task_kmsan_context_state+0x6b/0x120 [ 281.596587] skb_copy_datagram_iter+0x4c3/0x1040 [ 281.601376] ? tipc_sk_anc_data_recv+0x79/0x820 [ 281.606092] tipc_recvmsg+0xd12/0x1c20 [ 281.610036] sock_recvmsg+0x1d6/0x230 [ 281.613857] ? tipc_send_packet+0x1a0/0x1a0 [ 281.618205] ___sys_recvmsg+0x459/0xae0 [ 281.622251] ? __fdget+0x318/0x430 [ 281.625823] __sys_recvmmsg+0x656/0x1120 [ 281.629938] ? kmsan_set_origin+0x83/0x140 [ 281.634239] do_sys_recvmmsg+0x2b5/0x400 [ 281.638344] __se_sys_recvmmsg+0xdd/0x100 [ 281.642537] __x64_sys_recvmmsg+0x62/0x80 [ 281.646711] do_syscall_64+0xbe/0x100 [ 281.650558] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 281.655776] RIP: 0033:0x457569 [ 281.658983] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.677906] RSP: 002b:00007fb58a2c8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 281.685639] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 281.692923] RDX: 0000000000000001 RSI: 0000000020003640 RDI: 0000000000000004 [ 281.700208] RBP: 000000000072bf00 R08: 00000000200036c0 R09: 0000000000000000 [ 281.707495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb58a2c96d4 [ 281.714778] R13: 00000000004c3244 R14: 00000000004d4de8 R15: 00000000ffffffff [ 281.723050] Kernel Offset: disabled [ 281.726691] Rebooting in 86400 seconds..