[ 54.613326] audit: type=1800 audit(1538989122.646:27): pid=6002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 56.098467] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 56.533961] random: sshd: uninitialized urandom read (32 bytes read) [ 57.197464] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 59.460907] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.0' (ECDSA) to the list of known hosts. [ 65.194724] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 08:58:55 fuzzer started [ 69.847613] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 08:59:00 dialing manager at 10.128.0.26:36867 2018/10/08 08:59:00 syscalls: 1 2018/10/08 08:59:00 code coverage: enabled 2018/10/08 08:59:00 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 08:59:00 setuid sandbox: enabled 2018/10/08 08:59:00 namespace sandbox: enabled 2018/10/08 08:59:00 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 08:59:00 fault injection: enabled 2018/10/08 08:59:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 08:59:00 net packed injection: enabled 2018/10/08 08:59:00 net device setup: enabled [ 74.906197] random: crng init done 09:01:27 executing program 0: [ 220.466817] IPVS: ftp: loaded support on port[0] = 21 [ 222.608817] ip (6195) used greatest stack depth: 53056 bytes left [ 222.893543] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.900017] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.908609] device bridge_slave_0 entered promiscuous mode [ 223.046192] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.052780] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.061115] device bridge_slave_1 entered promiscuous mode [ 223.196745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.333255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.751219] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:01:31 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f000000bfe0)={{}, {0x77359400}}, &(0x7f000002c000)) [ 223.904888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.235163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.242380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.700336] IPVS: ftp: loaded support on port[0] = 21 [ 224.839266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.847442] team0: Port device team_slave_0 added [ 225.085087] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.093279] team0: Port device team_slave_1 added [ 225.246317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.409349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.416590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.425612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.708878] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.716896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.726008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.883027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.890596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.899896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.433203] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.439683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.446719] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.453269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.462355] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.472367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.484670] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.491095] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.499492] device bridge_slave_0 entered promiscuous mode [ 228.724742] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.731248] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.739918] device bridge_slave_1 entered promiscuous mode [ 229.004411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.233881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:01:37 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) accept$unix(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x6e) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r1, 0x800000000008982, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000180)) [ 230.038030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.383537] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.601495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.608668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.635496] IPVS: ftp: loaded support on port[0] = 21 [ 230.904016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.911109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.800737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.808966] team0: Port device team_slave_0 added [ 231.998022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.006095] team0: Port device team_slave_1 added [ 232.285687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.292927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.301740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.544215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.551255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.560069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.899277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.906970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.916058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.168305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.176016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.185130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.547230] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.553833] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.562484] device bridge_slave_0 entered promiscuous mode [ 235.925935] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.932540] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.940876] device bridge_slave_1 entered promiscuous mode [ 236.178530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.451096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.693055] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.699526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.706523] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.713051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.721746] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.103289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.293326] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:01:45 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x4008080, &(0x7f0000000240)={0xa, 0x14e23, 0x0, @remote, 0x7}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4f, 0x0) [ 237.579694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.955715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.962878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.258515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.265685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.759610] IPVS: ftp: loaded support on port[0] = 21 [ 239.261624] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.269756] team0: Port device team_slave_0 added [ 239.607845] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.615962] team0: Port device team_slave_1 added [ 239.724673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.992300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.999387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.008572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.346633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.353863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.363837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.746703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.756009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.765048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.064816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.072533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.081371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.099915] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.339985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 242.346506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.354688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.674580] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.448347] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.455089] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.463789] device bridge_slave_0 entered promiscuous mode [ 244.818934] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.825553] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.834169] device bridge_slave_1 entered promiscuous mode [ 245.014265] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.020730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.027734] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.034262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.043915] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.215220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.452876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.566278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.652970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.033615] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.409655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.416855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.739224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.747817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:01:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000900)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) [ 248.757240] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.765374] team0: Port device team_slave_0 added [ 249.138285] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.146946] team0: Port device team_slave_1 added [ 249.530635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.538058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.546902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.898163] IPVS: ftp: loaded support on port[0] = 21 [ 250.032317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.039368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.048821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.451407] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.459214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.468474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.887542] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.895637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.904588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.268307] 8021q: adding VLAN 0 to HW filter on device bond0 09:02:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_mtu(r0, 0x29, 0x4c, &(0x7f0000000000)=0x3, 0x4) [ 252.836940] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:02:01 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20080, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000000c0)=""/210, &(0x7f00000001c0)=0xd2) r2 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r2, 0x29, 0x1000000036, &(0x7f0000000040)=@dstopts, 0xfffffffffffffd6b) dup2(r0, r2) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000200)={0x10207, 0x0, &(0x7f0000ffa000/0x4000)=nil}) 09:02:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x4, 0xfff, 0x7ff, 0x100000000, 0x8, 0x6, 0x3, 0x6ac, 0x47, 0x29e8}) sendto$inet6(r0, &(0x7f0000000080), 0xfffffffffffffee1, 0x2000000b, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) syz_extract_tcp_res(&(0x7f0000000100), 0x3, 0x6bd) [ 254.487533] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.494993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.502912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:02:03 executing program 0: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x402a00, 0x20) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x275, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) write(r0, &(0x7f0000000ec0)="89f9d765312b4001000000b0967bdae72ee5094371136a6477ba0a51a2969dbc2d4028ac7b5af67f178f9314ea2bb3ac1c442eaf749c21ae2af8e39a40c3dc032e6f8eb738786a79df71302ff3b5d42731597d995bed6103ff63b9a908bcc05e0400000092bdf4d3282f62d6928117f82c2dae48742dac857de846096e82c1a02e1edcadda721a3f8dc9a54da05d467ed35b6f931d8686986960e756048c61c2a2c374c318d21d7a7ef550779190066e82ea3f6724a9f61ff028ec7e8d7a04352e7a78f777a68b823abb646bdc55dbde285ce15bf45820f0ae20e4023f57c71f8b41e08eff14c3441485c6f54a30750c780852dad879d6d4be7243bd07f841f89009000000c23d6b4f70fe48b54577449cfcbc4d5dbefb8b465d45bc2d11afbe7bfbe6ca76ac259e634eebf8db694ff02fe2b4c80783b443ef68287e9cf7cbcc2ee196f10c4ffb3f59e4921e0f9f08cba9a2c56c49fa7465b4836da5b2d9b142763889caa718d8a4fcb2f3ef6dc6185708fb1e0f9081d29fb3defae8c525f07437c7835b4eac8f86e2a22a81eff4120340e4a379446aac45dbff791d147805cd2748d74b8996c9b51ec03b410ef8fe126117fbf106795bc1b25d8dd786b6496bd743b7c75c638b516214ff56ec99a9c0f2919fa781cd8b4f2f2e425a6780c630a05c8e60011bc8e10055a6b6b652e5a13c73fd96f79038a65d6991ac38899ab98486d92bbcffdcf39a08a248ae1045ff8c6123de2f15d9ac360a3497c07001a3a1936ff1c03194ace131d380f515629ff016bd890ff822704c0db8bc68efad2eace5466628e7d6c2f2b3043698c46fdd62588fc54b72a786af0d026353879892c58007f7988a3f2240a43303218cc1df27807bfbde117c505f060396850a82459830a89a6a8601ea2e47f2e41379d110b96576f8f7705bba7ec63d6b44ccf84073cf9bdcf1aee48cb60c2f6dd3e89f3626a5e23339ea99c918d76a43fecf7401f7550e8eaefa4d84f1143320599daf7699858b2bf408e9093aa91d6dd9ae39d8decf3f7a199b0c1918d47be3b7aeff9a8c10efabe787b43141e7abaa4317158864b0361568140ab79cade1223c3ef81da4c4eefdd5b21fcc1b87872fc3b346737105589b84ba9814679b7510ed9b4f290083ee634ae12243ccc63413d7bc35eee0d1a4bc9dd33c37f5130303edddfc2636ffbf1ee0febb953436710c2ed9bd001d2ebe878788ddf7f7ad55b7a8cbcb348e82cd65b59315858086606115d04a3cda0e4af2a703afe09e4afedf00d5fbb2284df9af1d1ec9f15356c58fdcde45fff250568347f3b0b49e11e44c0a4d98a1e3393ce5d76614990f23b2e146842b166fb070894c128f957b0cc7d80a16275efd15659e0f81990062ebfdf9454d12e63d1ce1dad7848fcbab642a0d62ebb17abc824883e4c6e1e81992f28f5bbd7b26e2645c7941b03dd2f27c29baa2412976a05fa13d8fc4d6bd152a8668d986a9cf605b8b4a61600481e01bdd74c96d73390518add968100ac742aaf5dd7eb4ccf0868ee3ef7f12c32298737dea65bd5d7161dd679b4dd6799aa086bf3b8c889780ac102b7b1ebcf2569dd77f201d74d94a61400ced9c613414012b451628a96e6cc8fe738e964940f7b753065677776f3b5398975aeac974fced560667cead03a8976eb4229ff4e1bca5588d5d544cbca8588215a2f5ef7a5fc1a07438d3a3e05d21eb30d46f1688543d4327d36e07635396eaab4e9bc862ee9c7fa24de38c5cbf8fa5afd024116bc84854d01072145ecc4bb415d94a333e0d91e9cf6fda5a2c244a585e3a32c95398f44800c578faf4a2ccc5979664db7a55aa5cc02789f84321ccaeed4f37dd48c8d1484ade0588fc4255ec8780534a693e2bfe88b622034552084492c6757429239bbe8dad8b904e58007639ca773344040a441dc0027a46c22198f3d0b0588e164881a9fc7a85a63c459b0d002e3d890edd250742d363e85250badb91a734759baf773c32b177d36eefb662be70", 0x595) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x3, 0x9, 0x4bdadf02, 0x2, 0x0, 0x1, 0x10000, 0x3, 0xffffffff, 0x5, 0x5c, 0x3, 0xfffffffffffffff8, 0x12d706f, 0x70]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r2, 0xdf, "1cb4b50dcc9d6e7b38c35da081d16fe4ffb7c338e78d20a8ec457ac2df5bf57b9ced69e501c7563c1e11595c439efcaeb1e8ef5d5f6a66937b99ac2722ac54ae9e381bf8269e17885ae3ee0befa42d4db2d13a53eb3e24bf7207d96989494249385a063d27474f7a93be6acb296fb852e431ee6462d7346b62d4266023818f34527e084090b75f9ed8e82e9d45e3b71347792c4c9919db74dcf6d5e694a45292d4f84aeb376eeff5a3a143879d401ea944cd32a39a259543076ab5fb9639fa291a57e3a5c1caafb3ecf1a2e3bbfd99e499500011b27442671b3f74fedb8c65"}, &(0x7f0000000340)=0xe7) sendto$inet(r0, &(0x7f00000003c0), 0xfffffdef, 0x1f4, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) [ 255.568576] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.575117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.582124] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.588597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.597063] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.633004] syz-executor0 (6913) used greatest stack depth: 50448 bytes left 09:02:04 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) r1 = socket(0x925fb531288c05bc, 0x80000, 0x3) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) [ 256.091262] 8021q: adding VLAN 0 to HW filter on device team0 09:02:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x7) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x301802, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ff5000/0xa000)=nil, 0xa000}, 0x1}) fsetxattr$security_smack_entry(r1, &(0x7f0000000180)='security.SMACK64\x00', &(0x7f00000001c0)='/dev/zero\x00', 0xa, 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001340)=0x14) sendmsg$nl_route(r0, &(0x7f00000013c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xffffffffffffffa2, &(0x7f0000000280)={&(0x7f0000001380)=@ipv6_delroute={0x0, 0x19, 0xe13, 0x70bd2a, 0x25dfdbfb, {0xa, 0x94, 0x14, 0x943, 0xff, 0x0, 0x0, 0x0, 0x1000}, [@RTA_OIF={0x0, 0x4, r2}, @RTA_ENCAP_TYPE={0x0, 0x15, 0x5}]}, 0x1c}}, 0x0) r3 = shmget(0x2, 0x1000, 0x80, &(0x7f0000ff9000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000000)=""/246) [ 256.572195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:02:04 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x5, 0x7fffffff, 0x4, r2}) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x80000000000004c, &(0x7f0000b54ffc), 0x4) [ 256.984769] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.991260] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.999671] device bridge_slave_0 entered promiscuous mode [ 257.330770] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.337406] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.345898] device bridge_slave_1 entered promiscuous mode 09:02:05 executing program 0: sysfs$2(0x2, 0x3, &(0x7f00000002c0)=""/135) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') [ 257.788193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 258.198834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 259.270910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 259.584686] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 259.937087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 259.944353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.232013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 260.239053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.798687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.159686] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.167893] team0: Port device team_slave_0 added [ 261.414226] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.422463] team0: Port device team_slave_1 added [ 261.724332] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 261.751258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 261.760011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.797110] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.972561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 261.979591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.988498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.298839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.306609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.315464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.520526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.528229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.537182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.847844] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.854489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.862428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.957382] 8021q: adding VLAN 0 to HW filter on device team0 09:02:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) sendto$inet6(r1, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) [ 265.434527] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.441006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.448055] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.454583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.462913] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.469492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.615490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.354000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.065406] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 269.071752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.079716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.087570] 8021q: VLANs not supported on lo 09:02:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x2}}, 0x0) [ 269.114662] 8021q: VLANs not supported on lo [ 269.708684] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.618814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.972412] Dead loop on virtual device ip6_vti0, fix it urgently! 09:02:21 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x4008080, &(0x7f0000000240)={0xa, 0x14e23, 0x0, @remote, 0x7}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4f, 0x0) [ 273.107168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.173185] Dead loop on virtual device ip6_vti0, fix it urgently! [ 273.529514] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.535803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.543834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.951265] 8021q: adding VLAN 0 to HW filter on device team0 09:02:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x7, 0x20000000008, 0x3}, 0x2c8) 09:02:23 executing program 0: pselect6(0xffffff08, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getcwd(&(0x7f0000000140)=""/184, 0xb8) 09:02:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0x3, 0xffff, {0x57, 0xdcd6, 0x388, {0x7, 0x1}, {0x1, 0xffffffffffffffc1}, @cond=[{0x60, 0x2, 0x8, 0x898, 0x7fffffff, 0x2}, {0x3, 0x1, 0x1, 0x0, 0x44289d6c, 0x7fff}]}, {0x53, 0x800, 0x6, {0x1ff, 0x1000}, {0x8, 0x7}, @period={0x5f, 0x7, 0x3, 0x8001, 0x51f, {0x9, 0x9, 0x1, 0x401}, 0x3, &(0x7f0000000040)=[0x3, 0x101, 0x1]}}}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e24, 0x101, @mcast2, 0x3f800000000}, {0xa, 0x4e20, 0xfff, @loopback, 0x3f}, 0xff, [0xff, 0xffffffffffffffff, 0x6, 0x9, 0x9, 0x0, 0x40, 0x100000000]}, 0x5c) r1 = accept$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x8}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x200, 0x8001, 0x4, 0x101, r3}, 0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000300)=0x7, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$can_raw(r2, &(0x7f0000000480)={0x1d, r4}, 0x10) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000004c0)={0x4, 0x91}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000500)={0x9, 0xf, 0x5, 0x5, r3}, &(0x7f0000000540)=0x10) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000580)={0x1, 0x4, 0x9, 0x0, 0xffff}) bind$inet(r1, &(0x7f00000005c0)={0x2, 0x4e23}, 0x10) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e23, 0x6055, @dev={0xfe, 0x80, [], 0x10}, 0x7}, 0x1c) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000640)={@empty, @rand_addr=0x8}, 0xc) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000680)="1e30a133fbe2a7ea14c1c0d91014d959c7c78f46df682766dd25f651bf95e10515d12bc4bdaa3c06fc57b74258782b74dc64300709aed9c9914064b6eb097190385eeb6edeed99b18fb50ad4c257389aa1e940ee0d62e2550f9273d578fedeb7e4f16f1cf0abf3e67eac950b2f4c5f73d2643b4073ed5dac221f93917a4099b6be54b23bc4a26229", 0x88) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000007c0)={0x6, 0x0, 0x7ff, 0x0, r6}, &(0x7f0000000800)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000840)={r7, 0x1ff}, &(0x7f0000000880)=0x8) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000008c0)=0x8000) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000900)='trusted.overlay.upper\x00', &(0x7f0000000940)={0x0, 0xfb, 0x1015, 0x1, 0x6, "bc0a559a9f380d8f7675a65f03c76247", "8b3909b8c1433052c2e00680321d6e969936ae7a6e00e1a9f3ba060314fdf02709a26e291398d54db2e57ee0e76f343d2c35d6de5bed7efb3987015c86998e577909750de1136414710b19cb9cf549b86a9c93f2d46a57924ff5dbef60c7d86323f13fcdf445c3ec7d0badf50cd9334663f15021b01a4548876fe882930b8526ddc0411d886bca599dbea7668c56724003046b4743f057f4cc9ea60db20c80a6f5d5d750750cf115a6b33ce6bd6065cf26964909eead7a13ca8580d90405e517306a70e77e745d947610fc2e4cc9dcb69b721f971acfaf958e9fdb594d53c992405c7966294d9446ec439c044605fad33c1d89111b400c2b3099a4059bb692c6a7aec4f6bcbaf409e84bb50546cf04aab00ee3f65a2568b1a9f6f586083116deb14a2cbd8766b8a22e09ec03c0833566b126774eb4e3fff5ceb87c79938d15b4322d14aca7fb40e3e5e7330287fd69401238761804b79915c88bacd6e51e7e67e80bcf8fd47b546b540fceeb043920a02ab2381f361baba111745c6c8beddf48188fb50dcbec21429f3fb241fbbf80618b0dc84acc61345c9a0275926ffde7ab9eef724a35dda2e7a9d7726964eaa7229035c4e5b2576201a81a89b4e59b1749c096b239b4e194f8bf6090b0266479b77b6babe3d5db2180b40aa2776ee5809b0a4eaee33a7df8d5d0d4829a1ef9c5d2b1ee8cdf434c110ee192ad4b8c13f49b8a7c9b4bedbe0c16762413f2ad5309c17669227e5bcd3cd1ffeb78eaae34b26eae711c79394141aa34cfd56193112d96fe02f61060e96398fe3336612f59f03efc77f72aafd31ad8b0598da5e34f986b4ed266213c1e70e743e8ae954aecdcf5791bf1385c340a5bf5ce0bdff354b4179d97863e90b62548255a12e3e9f5602a4299db4bb80c695d878f5444dcc02b0c7eee6d10fa49e85ac9a19b38da8a16f96b001aa95e3076a668b4cd1188b9b5514831e247b58c6ff1dc84c7d2303d4eca14d003b82a7643e00d550f958e18e27b3a10b76353f9291c67a8e324bcab8b5678bd88344ea034bf3f5c702ecde126839f7595f2d49171c57477e135a79ea0bba8883e01ec3462b8c21d786babf2e21b32d38589f968d1d79bf6fd17f8926a3a2ce651a0f3b962b3e1fb19c5b48aeb4ee1cd093749e9d7d04a0f2923b55ca46ef27868205ef42f4fdc9b387c662a2c2c5c8688126bbcfe4b71555e285c76163f1912c923dc31285832f8eef5654e968c035d124b5dc4e6b351ea5414100a336561ca550da448595351125ed3671e5b1251bae8902fb70237160409e7d1f2745d3a929b150c3b2dcd42fca4233544cb2932e2191f61f8453e31148ab33006209e5d17c1b6c20af8c300ab70cb0c51de797c4cef3ad4d518545469c29b836e60fb0af01d8350743cc85b19e9dee33c0d16634008559683fccfc1b5efe02cb48cc47312c0cbcf76791a9de6e0461f4ec130f06c6df1594e360bd24bd25e06c33ba2b1e40c396a8d6190372ca7237c724ae6a5d7c9267b153916bd837288aa3426f59d8fb143b441bfa8a4cca9471d7a2f555c7f58ab6d700211e189e7c58f5bc5b6a8f8d176d078d2757084480b7b66378ca93b9124f018022744abe39c2a18bd44fe1fd64b8d9e6f1a83274be7263ea1316858dbb5f607e1588788738e2c575d588948e597634a8fb391a3a9ec376a5dc32fa0b4d7347c2270b6f192ee0f11394445231a75546b533b0c3df37e08e41dbe36e455516de8521d1e138f59c06c7b21135898a7463e339fe4a9ae9f5cae7adfe9780118cc38cf0569f652c369fa3578177eea67850c2965838fc77799e206d4f6555975573e67569f64b910846e18d501f42597689c2e4361e2e06176e93e76b36847603393a9c8381a5063cf07c8c2a32e0b18c6b0d479732eb2406ad0b8c56b328185d52507331f860150e6bd36d7dd9b8145e0cf28c42f5af493b77276f7892d81cadea2506d6b6d9c419ee6a06372fadc85dd53cce4225e70972715669e1208571f35656fb929ac4a0044caac94aad07839a92657bef4bf04dab85984bade125b505462950108efcc06624eaa76d6f8c390085dd55568a5e6f83da69e3ca1576f773a3a1fa525615104883b4a7f888bf1fa9ac73ba4307ce7f6781c7fcddbfbe8c75f497649a4ed918091d10cb471848d0d53fa0612020d1987073423675a309e4b5fcb4a5b790d42f77dba8064ecb70c1c7f4f0268010f30c56262e79421f12ffa6d80f183ad247e64cfd7e44966d0eb97d56f5c04e221f9339fdc1d2c03ac83a19bc380952e620fdff4f6952cd72bfe51fc4f40a51affcc219fa7ee27444a8dda9316dbfb1001b8fb57f21427dc9567eb573f328799139118b3e8cd453a3c21589a176a8a6895e71bcc4d0a032dc44c0b61f40d1486d2f4687b731f0913027ce5a9ac373847db8594357d0f2cb2af882bc926d7058651fb476c99db53b2671db4a90b841a014b411110fbea9d5c78a3fd16aa54a2cd714977432a6db2d76341e8027c20c32ca40a144dd5740815c0934c11eefc07ed4ddac9eaef953b55255cc28a766abc0395fc29984179688b74a6f2b6b20657986d8c4bdc9a78b74842097a04d26d207c9069f032de84faecba987638a020d52c5bc3db124ab6cec167e8b8d0a475c6fb34e5632dd55534aaee1309adc4280324f5d9a8c1fbcb8b8131a0558f64a5e00ad3105090b77cef1b69e2f576c2593cdef1632fe59569c79024f59b7f01086ba2ea76611f7bab71744654e7096e90ddb81ad551ec85127636af49213169282c9a8823da25b24bfca494475cb5d27166933c6e3c06ab75985a337a66ce199443732292992e0cfd4d4e8eecfb0775efa77872e369267799fda5b398d86285637e4f18728d41efbe1783509dea0e593a1483317ec26dd18f521a7011e7aea7ef05f7b9543c1794656b3419b5641f5fcbd361ea8d3acf377e1bbffbece12cd5582cb8ea721587261901423a3da34140769e9c6387e10db1ab5ff6d581f8bfaeeac4c3bddb55ac1eff27524f753bb3d6b678d415bced98513daf65483972d5f820a21167ec56624160b8438e4d20a592cca6ef3a9973b3784c9ee04a645076674506605c553206c9decf987cbcca0bdc06eb8d9c1d163d3da7ae1df8e7efab8904be3fc7f9ca4881b1eaa134004670710e422c67aac38214d98f47316edb7391cd81684c37c52f1bd2512ec21fd2a601a12e56053b4682fc52388a6fe7871371ff573d5f8db0b6317ac7c1f1bff9cd6f99ea504480ee0160f9d21aff364797469282ef08c5b3407cfe4201a29cda0d86ad7556f201c0d6f2e717d352cd5f70a479cd1fa3fb9e35bad4db9462f8028b8178259d0162b53ff4d8f1658322401f6103a342a777d4b681bac120892193e6bbb5d8129d86c644415a544dae11ffb21e93ba0dd03f542e12b9c8240b3bf024dc50b8109db2c8f0dbf9a8fa4c0851f212b24837592bcb513772395879c19cf0963d72622437687dbc98a03781358c6f80a2022072004beb9372529c300295b4d48c28b41870bac5130d331c428a90aa165118163db73a7aff03f4f92927e59ecdcdab72cb7b1d5b98e36375235d9fd3af6c4318cd665bc12d6dc67ede57f0f6a34fb77212b17a35c9a7b1770b13f063f59c3472741ea5a04c5d9d66625cec1909ad26be5e45cc5eb51459757c096bf4a2c92198e98c30cdd44036a6c04dd5d45f4bf23f030c2115cfb77a8f2c3b5b88efffc83d108fa3a5fd0c5b42026e319a5a7687d4c069e5a646d3d4323270d03ad5c0ac9266da9e5aa9ad8f6d0313315f7ef1f5a49b0b0e8cad2d79c311ed68c67d0809a382b23aef0adc3be338f04a9269b04facbe3a387dfd97690eda71804adb5b00303d79e4867ce4eaefadbde86226f87617dc60989d2843d79bd6a2d78ed4769e8fa06ed3fc26cb51c269632f2277bd4153b0b06bb2c79de43f5d7a9d4de4d42d08c8fe82e63a677cdf31ee687bda9af9e036e3a49869db8abf66ce027afa628e7f6cddf9fbe7b449e5775184627238c99b1d37a1b979dca4cfd53ed07de78b1672f62474e83106421b954eb06c95d02026d32f0f2c1f0ccba58e476047d3b78852cdb3c3529097796c4e2509cb21d9500cbdfe90049ed0275b784906772cdc65909a74aa61a488d577cf0c7e56e84b179f9427b19142c180e13b6284d5d84b11989f3940c86088c2dcbc1378e93fa3a60a0537f22ec7fb42bf05780fac960cf2f62493f1b937beb8f2306e583c00b46e9db604bd26e1d1319900ac6f06f5e0054756318eab57f168e3d6c7c7b4de8d863b42695faef6cec69dcabb5641d5c0f49a7e7c02a32500f65e00fa6a348a56365140307c3f7fda9ffd14be5ee91edcba6be082cf380abc78bac1fc83d6062216a6ef27a30d091ad08c6f08fb9ab48b4f065357b2a0bd6ed6cef6bbdc9d4a93fde2ed13800ccb957c667934225fd8d8e9ee8d2ef03c99e68aaafd7e3d04968b2a9b0347e88cfa410e847f3f89ff68564cc52b639edc623c368ab865630f25529ac4d566d35f76fefe51813a00212009e3002cc4f485d17868402f1136e321cb8a14a5c14e1080db17ee18189b68e907e0b69aa9dcf03b233d442d37126a221de0b3600939378d0cf0ea6300a92efcad46d478555e67d4703e35ad320bedf8ea84a15265bd3cd9d0b579d03f8d44bce73008ee7c58698b31b1ff8d154dbff2246cb3d5b7f9ff3a8e0fd1d08145468f8b8674cb25b7f8236ac94cbafd2084e294f497cb791ff77be2584f5c998a574da5b2b715c224c9d85adc39ef9e2a7257f6deffb7be0a793ea2ae34489408c171789bc6e16ffaba744774ae55e2b0fcf9d1b91fd132c75a1824a5f07800f83767250a9778fc42d040432786d604a1fb3731f169fdcc1d18b9070c0cc888e24a9a3bc590e9494e0466b91994a031a696f14030b72f3bf114919c1ef6888f58099baa1d57c86814dfa7fa47651421e3bd4239139eb52aad7bc0627fb68e34af3f4688ad7b270a6bdec06283c0f7e2569179144ddafc29e6a02954527a973108e4380a8324da932e1ec49bad718c4928cce763f23540e0ab2065cdf1b7779dc1e4cbe41a9146c67131bdf3813f3f29bd45fafd283d78884b98c95503caf929031664e8dc4ac85a2476e8e3c52f16244d69e5d3e0f52174711a989ff7a7f545e000324c915d7cb962307a3501ae2eb3c89317a8cadcf65dae79951344896cb3cbced8b43d9aa2a06ad11790de67ecfbd6ff5a7dcbfabe1b0a4cea10cf968ed19e5686873844c1af6dda868fd503c8a5262ddd981eb2a469551a99e22092c9c2917e6fdb2ebee620788bfa1c461b75c694ef95c646209eb1f40e20b67fc7a59d204b148fff3e01530710b7f7ed371bf144d492e04d83e2fa6ae1dcbfb405faf803769a5d14799ff1aeb8199195818bcd152aafc31e28e629a3aff9db89c58928b212d3c81a8dde1dd0e644a3121fee8a07e401ac987b9a80fefe3daedde540e857baf341d2a192d6f01f09088ab1fd0416fc01e9892fb08596fe469e5c956ea3680a5115dccf727adefd4c499e85bd4304d2249fff661476b89dbf8906d23073fa581e9e1c9501ad55d2e35f60fe868d38ad63cc4b0914c198e6b36fdf3b00775324a40c35e1bde3e4e3a6c74abf35b944f64c6487ef03cc29ab7d34c31e97d06797a5795fff229e24c9620e91757579be8b5028fb00f0ad7b90afa00cbf1b6efdfb149f5dbe1de1813552473c55cb4698587d05f9fc0a1e6bc017c304b6c0fe3cdf10587136cc30ffd09bf653"}, 0x1015, 0x2) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000001980)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000019c0)={r6, 0x7ff, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001a00)={r7, 0x100000001}, &(0x7f0000001a40)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000001a80)={r7, 0x0, 0x2, [0xfffffffffffffffb, 0xa6]}, &(0x7f0000001ac0)=0xc) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000001b00), 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) memfd_create(&(0x7f0000001b40)='cgroup\x00', 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000001b80)={'tunl0\x00', 0xfffffffffffffe01}) 09:02:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) dup3(r0, r1, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 09:02:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) sendto$inet6(r1, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) 09:02:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 09:02:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 09:02:24 executing program 0: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000840), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) syslog(0x4, &(0x7f0000000880)=""/217, 0xd9) perf_event_open(&(0x7f0000000640)={0x4, 0x70, 0x8f9, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x84004, 0x2, 0x2008000000000000, 0x1218, 0x4, 0x0, 0x0, 0x2, 0x0, 0x3, 0x5, 0x0, 0x100000000, 0xe000000, 0xdee7, 0x68, 0x3, 0xbe1b, 0x4, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100000001, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000600)}, 0x400, 0xf0, 0x2000000000000000, 0x0, 0x8, 0x3}, r1, 0x4, 0xffffffffffffffff, 0x9) prctl$setname(0xf, &(0x7f0000000280)='cpuset{\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 276.373659] hrtimer: interrupt took 272804 ns 09:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) sendto$inet6(r1, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) 09:02:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) 09:02:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) sendto$inet6(r1, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) 09:02:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x0, &(0x7f0000000180), 0x0) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 278.078150] IPVS: ftp: loaded support on port[0] = 21 09:02:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) close(r1) [ 279.176325] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 279.511026] clocksource: timekeeping watchdog on CPU1: Marking clocksource 'tsc' as unstable because the skew is too large: [ 279.522434] clocksource: 'acpi_pm' wd_now: 88c212 wd_last: e46877 mask: ffffff [ 279.531784] clocksource: 'tsc' cs_now: 9b0eed87b2 cs_last: 99726c1e70 mask: ffffffffffffffff [ 279.542444] tsc: Marking TSC unstable due to clocksource watchdog [ 279.557979] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 279.566853] sched_clock: Marking unstable (279616123481, -58191608)<-(279683646311, -125713496) [ 279.612108] clocksource: Switched to clocksource acpi_pm [ 280.807802] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.814488] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.822266] device bridge_slave_0 entered promiscuous mode [ 280.897260] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.903821] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.911265] device bridge_slave_1 entered promiscuous mode [ 280.987401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 281.063560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 281.288615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 281.367387] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.512806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.519801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.745122] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 281.752898] team0: Port device team_slave_0 added [ 281.826966] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 281.834591] team0: Port device team_slave_1 added [ 281.909311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.986906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.080524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.087867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.096919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.168387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 282.175852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.184925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.040161] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.046663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.053637] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.060032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.068692] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 283.472236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.255298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.545701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 286.833123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 286.839347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.847433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.139376] 8021q: adding VLAN 0 to HW filter on device team0 09:02:37 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) 09:02:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x10000000001, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xb8c9}, 0x10) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(r2, &(0x7f0000000080)={0x0, 0xd0daffff, &(0x7f0000000100)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80) mq_open(&(0x7f0000000040)='\x00', 0xc2, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x101001) r1 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x2, 0x100000001, 0x3, 0x7fff, 0x0, 0x6, 0x10000, 0x0, 0x1dff0bd4, 0x7, 0xfff, 0xffffffffffffff7f, 0x7, 0x8001, 0x0, 0x6, 0x100000001, 0x330, 0x7f, 0x8, 0x4, 0x4b005c59, 0x4fd, 0xfffffffffffffeff, 0x1, 0x0, 0x6, 0x5, 0x6, 0xcd2, 0x2, 0x6, 0x2, 0x1000, 0x7, 0xe4, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000640)}, 0x4000, 0x2, 0x1, 0x5, 0x6, 0xffffffffffff0000, 0xfffffffffffffffe}, r1, 0xe, 0xffffffffffffff9c, 0x9) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000400)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000004c0)=""/215) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000005c0)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) fstatfs(r2, &(0x7f0000000480)=""/60) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r7, 0x4138ae84, &(0x7f00000001c0)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00'}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000380)={'team_slave_0\x00', 0x57}) ioctl$KVM_SET_SREGS(r7, 0x4138ae84, &(0x7f0000000040)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8e1e028da5e9db55131d4c238e9d00901f91ec02a25e5781dd592126eabd44982800000000eaffffffffffffff000059fa698d43132d1da8ea9e784c", @ANYRESDEC=0x0]) fcntl$addseals(0xffffffffffffffff, 0x409, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4200, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e106558", &(0x7f0000000140)=""/41, 0x69}, 0x28) fallocate(r2, 0x58, 0x0, 0x8001) 09:02:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) 09:02:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) 09:02:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x3, 0x6, @dev}, 0x10) [ 289.169464] ================================================================== [ 289.171859] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 289.180953] CPU: 1 PID: 7840 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #63 [ 289.183616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.192115] Call Trace: [ 289.192115] dump_stack+0x306/0x460 [ 289.192115] ? _raw_spin_lock_irqsave+0x227/0x340 [ 289.192115] ? vmx_create_vcpu+0x10df/0x7920 [ 289.192115] kmsan_report+0x1a3/0x2d0 [ 289.192115] __msan_warning+0x7c/0xe0 [ 289.192115] vmx_create_vcpu+0x10df/0x7920 [ 289.192115] ? vmx_vm_init+0x340/0x340 [ 289.192115] kvm_arch_vcpu_create+0x25d/0x2f0 [ 289.192115] kvm_vm_ioctl+0x13fd/0x33d0 [ 289.192115] ? __msan_poison_alloca+0x17a/0x210 [ 289.192115] ? do_vfs_ioctl+0x18a/0x2810 [ 289.192115] ? __se_sys_ioctl+0x1da/0x270 [ 289.192115] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 289.192115] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 289.192115] do_vfs_ioctl+0xcf3/0x2810 [ 289.192115] ? security_file_ioctl+0x92/0x200 [ 289.192115] __se_sys_ioctl+0x1da/0x270 [ 289.192115] __x64_sys_ioctl+0x4a/0x70 [ 289.276784] do_syscall_64+0xbe/0x100 [ 289.276784] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.276784] RIP: 0033:0x457579 [ 289.276784] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.276784] RSP: 002b:00007fc6fe7e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:02:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140), 0x14) close(r1) [ 289.276784] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 289.276784] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 289.330561] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.330561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6fe7e26d4 [ 289.330561] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 289.330561] [ 289.330561] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 289.330561] Variable was created at: 09:02:37 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x802) readv(r0, &(0x7f0000005640)=[{&(0x7f0000004300)=""/198, 0xc6}], 0x1) [ 289.330561] vmx_create_vcpu+0xd5/0x7920 [ 289.330561] kvm_arch_vcpu_create+0x25d/0x2f0 [ 289.330561] ================================================================== [ 289.330561] Disabling lock debugging due to kernel taint [ 289.330561] Kernel panic - not syncing: panic_on_warn set ... [ 289.330561] [ 289.392008] CPU: 1 PID: 7840 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #63 [ 289.392008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.411034] Call Trace: [ 289.411034] dump_stack+0x306/0x460 [ 289.411034] panic+0x54c/0xafa [ 289.411034] kmsan_report+0x2cd/0x2d0 [ 289.411034] __msan_warning+0x7c/0xe0 [ 289.411034] vmx_create_vcpu+0x10df/0x7920 [ 289.411034] ? vmx_vm_init+0x340/0x340 [ 289.411034] kvm_arch_vcpu_create+0x25d/0x2f0 [ 289.411034] kvm_vm_ioctl+0x13fd/0x33d0 [ 289.411034] ? __msan_poison_alloca+0x17a/0x210 [ 289.411034] ? do_vfs_ioctl+0x18a/0x2810 [ 289.411034] ? __se_sys_ioctl+0x1da/0x270 [ 289.411034] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 289.411034] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 289.411034] do_vfs_ioctl+0xcf3/0x2810 [ 289.411034] ? security_file_ioctl+0x92/0x200 [ 289.411034] __se_sys_ioctl+0x1da/0x270 [ 289.411034] __x64_sys_ioctl+0x4a/0x70 [ 289.411034] do_syscall_64+0xbe/0x100 [ 289.411034] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.411034] RIP: 0033:0x457579 [ 289.411034] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:02:37 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt(r0, 0x1000000114, 0x2721, &(0x7f0000000140)=""/13, &(0x7f00000000c0)=0x32) [ 289.411034] RSP: 002b:00007fc6fe7e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.411034] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 289.411034] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 289.411034] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.411034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6fe7e26d4 [ 289.411034] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 289.411034] Kernel Offset: disabled [ 289.411034] Rebooting in 86400 seconds..