[ 59.238102] audit: type=1800 audit(1539256553.285:27): pid=6004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 60.726404] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 63.647923] random: sshd: uninitialized urandom read (32 bytes read) [ 64.194262] random: sshd: uninitialized urandom read (32 bytes read) [ 66.636636] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. [ 72.393566] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 11:16:08 fuzzer started [ 77.021096] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 11:16:13 dialing manager at 10.128.0.26:39089 2018/10/11 11:16:13 syscalls: 1 2018/10/11 11:16:13 code coverage: enabled 2018/10/11 11:16:13 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 11:16:13 setuid sandbox: enabled 2018/10/11 11:16:13 namespace sandbox: enabled 2018/10/11 11:16:13 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 11:16:13 fault injection: enabled 2018/10/11 11:16:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 11:16:13 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 11:16:13 net device setup: enabled [ 82.326662] random: crng init done 11:18:21 executing program 0: [ 208.397412] IPVS: ftp: loaded support on port[0] = 21 [ 209.870172] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.876853] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.885709] device bridge_slave_0 entered promiscuous mode [ 210.084287] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.090786] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.099773] device bridge_slave_1 entered promiscuous mode [ 210.339631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.488580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.946719] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.101269] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.252661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.259802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.412542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.419659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:18:25 executing program 1: [ 211.886049] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.894451] team0: Port device team_slave_0 added [ 212.040229] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.048608] team0: Port device team_slave_1 added [ 212.266818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.274143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.283575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.483443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.490566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.499852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.649391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.657168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.666243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.815297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.822934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.832357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.150942] IPVS: ftp: loaded support on port[0] = 21 [ 215.485813] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.492405] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.501850] device bridge_slave_0 entered promiscuous mode [ 215.701379] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.707963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.715084] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.721669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.730917] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.826932] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.833644] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.842430] device bridge_slave_1 entered promiscuous mode [ 216.040438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.254021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.280388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.040842] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.333935] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:18:31 executing program 2: [ 217.547746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.555095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.808264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.815768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.823417] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.831994] team0: Port device team_slave_0 added [ 218.886634] IPVS: ftp: loaded support on port[0] = 21 [ 219.184905] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.193416] team0: Port device team_slave_1 added [ 219.471346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.478751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.488261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.829579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.836916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.846292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.095533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.103404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.112805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.488440] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.496385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.505761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.792016] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.798547] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.807480] device bridge_slave_0 entered promiscuous mode [ 222.116450] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.123172] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.132207] device bridge_slave_1 entered promiscuous mode [ 222.528909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.771865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.574694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.923702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.964769] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.971295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.978587] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.985193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.994282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.268833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.276311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.512103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.597188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.604566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.521969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.530459] team0: Port device team_slave_0 added [ 225.812710] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.820943] team0: Port device team_slave_1 added [ 225.968678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.975996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.985265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 11:18:40 executing program 3: [ 226.226754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.234293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.243587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.565732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.573518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.582953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.020352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.028264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.037704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.875000] IPVS: ftp: loaded support on port[0] = 21 [ 229.280524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.731410] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.104046] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.110553] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.119556] device bridge_slave_0 entered promiscuous mode [ 231.283113] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.290144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.297341] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.303906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.313300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.452167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.589344] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.596178] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.604889] device bridge_slave_1 entered promiscuous mode [ 231.993385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.189250] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.196003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.204432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.346059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 233.459414] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.639494] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.828710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.208208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 234.215486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.605999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 234.613268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.873812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.882407] team0: Port device team_slave_0 added [ 236.260576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.269021] team0: Port device team_slave_1 added [ 236.636663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.644020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.653246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.983343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 236.990454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.999651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:18:51 executing program 4: [ 237.298389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.306229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.315358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.776058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.784323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.793590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.993941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.216362] IPVS: ftp: loaded support on port[0] = 21 [ 240.849261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.568743] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 242.575390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.583886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.957810] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.964432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.971441] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.978039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.987361] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.335100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.490951] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.497740] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.506665] device bridge_slave_0 entered promiscuous mode [ 243.950798] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.957485] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.966364] device bridge_slave_1 entered promiscuous mode 11:18:58 executing program 0: 11:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = gettid() r2 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000000)={0x3f, 0x3, 'client1\x00', 0x4, "b1a9ffdda704095f", "6f70238dcd3892a0c9306b88e00165844e764798f38b906353449f8dcced9b66", 0x28c, 0x80000001}) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) [ 244.506460] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.555842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 244.972215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = gettid() r2 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000000)={0x3f, 0x3, 'client1\x00', 0x4, "b1a9ffdda704095f", "6f70238dcd3892a0c9306b88e00165844e764798f38b906353449f8dcced9b66", 0x28c, 0x80000001}) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x20040000) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 11:18:59 executing program 0: r0 = socket(0x10, 0x80000, 0xffff) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @host}, 0x10) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@unspec, 0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000040)={0xa2, 0x80, 0x8, 'queue1\x00', 0x800}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 11:19:00 executing program 0: r0 = socket$inet(0x2, 0x3, 0x4000000004) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x81, 0x400) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/67) setsockopt$inet_opts(r0, 0x0, 0x200000000017, &(0x7f00006cdffb)="89", 0x1) [ 246.344049] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:19:00 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={r1, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr=0x400}, 0xc) setsockopt$inet_int(r0, 0x0, 0x1b, &(0x7f0000000100)=0x5, 0x4) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000001c0)={0x100, {{0x2, 0x4e22, @rand_addr=0x101}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x5, 0x168, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}, 0x26b) [ 246.825978] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 246.847490] kernel msg: ebtables bug: please report to author: Wrong len argument [ 246.892524] kernel msg: ebtables bug: please report to author: Wrong len argument 11:19:01 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x8, 0x5, 0x7fff, 0x9}, 0x8) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1a, 0x1}}) [ 247.325253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 247.332609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 11:19:01 executing program 0: r0 = semget(0x3, 0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r2 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getgroups(0x3, &(0x7f00000002c0)=[0xee01, 0x0, 0xee00]) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) epoll_pwait(r5, &(0x7f00000003c0)=[{}], 0x1, 0xfffffffffffffffd, &(0x7f0000000400)={0x5}, 0x8) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000300)={{0xfffffffffffff3ad, r1, r2, r3, r4, 0x80, 0x3}, 0x1000, 0x1bd, 0x6}) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f00000004c0)=0x54) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendmsg$key(r6, &(0x7f000033efc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0709000902000000489847775b8c2f6c0000000000000000"], 0x10}}, 0x0) [ 247.869528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 247.876802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.966296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.999841] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.008819] team0: Port device team_slave_0 added [ 249.378639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.387125] team0: Port device team_slave_1 added [ 249.712130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.719253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.728258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.081208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.088485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.097540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.124935] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.324514] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.332410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.341463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.636993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.645767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.655381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.437297] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.443969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.452036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.707184] 8021q: adding VLAN 0 to HW filter on device team0 11:19:07 executing program 1: mq_open(&(0x7f0000000040)='.:\x00', 0x0, 0x0, &(0x7f0000000080)) socket$inet6(0xa, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 254.111539] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.118140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.125281] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.131853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.140559] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.147419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.303191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.256968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.060646] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.067194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.075275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:19:12 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, "73797a31000000000000000000000000000000040000000800"}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) [ 258.835376] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.023255] 8021q: adding VLAN 0 to HW filter on device bond0 11:19:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a00)=@broute={'broute\x00', 0x20, 0x3, 0xb8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f0000000340), &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000100000000000000000000000000000000000000000000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000300000000000000000000000000000000be7c21697bd484403952c82a1e858173ad980700000000003a9c3d295be1a7b9b008b6d7b0ebc6c3ef4612a74208d500cf311796fc00000000000000000000000000"]}, 0x130) [ 262.544504] kernel msg: ebtables bug: please report to author: entries_size too small [ 262.595701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.939543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.945987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.954021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.252722] 8021q: adding VLAN 0 to HW filter on device team0 11:19:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f623448ace75d766070") setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000000c0)=0x40000000000003, 0x4) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000809000)={0x2, 0x1000000000004e20, 0x0, @local}, 0x1c) 11:19:19 executing program 0: r0 = socket(0x10, 0x802, 0x0) connect(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80) write(r0, &(0x7f0000000000)="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", 0xfc) 11:19:19 executing program 5: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xa8, 0x1, 0x7fffffff, "0a53cd2ba31d2be351a80409e95c9692", "dffb86c71859e69d2e42d4227bdb983781e387b45866d24d0e9d6fabf0e6dc9ff984e9719ca71737a9683c86e93613921ef1440e637884d3881d2523db9520b8048756dba974a7606c97b02b0b74b44db2d6877a3942dc83153bf5f319e38fa9543eba55a55e247042306348cd6c9c3cab7a460b7466e9d14c7aefb1cdb87efa9ec79085737e98e88e956ee0e6d9ff356e5d8f"}, 0xa8, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200000, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x80, 0xb39d) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) renameat2(r0, &(0x7f00000001c0)='./file1\x00', r0, &(0x7f0000000200)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000005c0)=0xe8) r4 = getegid() r5 = getegid() lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}], {0x4, 0x5}, [{0x8, 0x2, r4}, {0x8, 0x1, r5}], {0x10, 0x3}}, 0x4c, 0x3) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000680)={0x8000, 0x4, 0x6, 0x6, 0xfff, 0x5}) lsetxattr$trusted_overlay_upper(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x1015, 0x3, 0x101, "35cbb951cdbab6cd5b56fed78593db80", "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"}, 0x1015, 0x3) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000001780)={0x8, 0x7c1a, 0x8d, 0x4, 0x0, 0x74ed}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000017c0)={0xfffffffffffffffc, 0x1f, 0x3, 0x7, 0x7, [{0x4, 0x100000001, 0x3, 0x0, 0x0, 0x3400}, {0x3ff, 0x80, 0x8}, {0x266, 0x73965a69, 0x7f, 0x0, 0x0, 0x1}, {0x0, 0x9, 0xae1, 0x0, 0x0, 0x300}, {0x9, 0x2, 0xc8, 0x0, 0x0, 0x80}, {0xffffffffffffffff, 0x3, 0x8, 0x0, 0x0, 0x100}, {0x9, 0xce, 0x9, 0x0, 0x0, 0x500}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001a80)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-generic)\x00'}, {&(0x7f0000001980)=""/133, 0x85}, &(0x7f0000001a40), 0x40}, 0xa0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) r6 = accept4$inet(r0, &(0x7f0000001bc0)={0x2, 0x0, @multicast1}, &(0x7f0000001c00)=0x10, 0x80000) execve(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001f00)=[&(0x7f0000001c80)='aead\x00', &(0x7f0000001cc0)='^],vboxnet0\x00', &(0x7f0000001d00)='systemem1G(eth0\x00', &(0x7f0000001d40)='/dev/autofs\x00', &(0x7f0000001d80)='self\x00', &(0x7f0000001dc0)='system.posix_acl_default\x00', &(0x7f0000001e00)='/dev/autofs\x00', &(0x7f0000001e40)='trusted.overlay.upper\x00', &(0x7f0000001e80)='system.posix_acl_default\x00', &(0x7f0000001ec0)='trusted.overlay.upper\x00'], &(0x7f0000002000)=[&(0x7f0000001f80)="1700", &(0x7f0000001fc0)='rfc4309(morus1280-generic)\x00']) sendmsg(r6, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002040)="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", 0xfb}, {&(0x7f0000002140)="0a7c9b4b1b66e79e64cfea7bbcaea4f069073b2297842ec7a661353f455358d7213bbdfc792229b068d3eeac93adc1b17c", 0x31}, {&(0x7f0000002180)="9831811edba634f67aac4f313d4ef07b4a7a3609c843b9ee086231da3969931bc777135365fd0cabac7a10068902204f94609fd59ae5cd083a3cc809cecec4cc9fa5a7279c5e06443d63795a545b5e1df43b904642023578c9c32f513c68db2b21a6d481dfae090fb7a0d0107a1f5dee2cc62dafafb3c5488fb17edf78", 0x7d}], 0x3, &(0x7f0000002240)=[{0x50, 0x115, 0x40, "a0b17cd3ad5019088c97a23cb21d4ad2c3bfc00aebc42ec460c2519e0cb2724ae4184daa23637729a354cb00e6e7e5c27e1ab9cf8c3561170c"}], 0x50, 0x24048040}, 0x4000) getsockopt$ARPT_SO_GET_ENTRIES(r6, 0x0, 0x61, &(0x7f0000002300)={'filter\x00', 0x9c, "6aeea79cb16ef638b78f868277904e36b844fa26325ca597723d25f3c36dc5d32c71236e326ae8b4945a0219c59db1dac0fa1dce35def0d90e215912e54e7bd71b062db2c2ce346f07444fd2d5a8517dbd5ea9dd4e2567c222f1b66cdd639be85fff38f817e056e39979e5f0289a4d628971665a59835d534f7b992329f8d70a14bf782fe66588392b7c4d9554d5f00e7cf871c54cb9421f701b8f54"}, &(0x7f00000023c0)=0xc0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000002400)={0x0, 0x1ff, 0x80000001}) add_key$user(&(0x7f0000002440)='user\x00', &(0x7f0000002480)={'syz', 0x0}, &(0x7f00000024c0)="769a15c439860aa9a2a0e35f95e1feedf86ada0283ae9a15cdcd7018fb825a665d57405954caf78347cbd0c2c401957f4523373cf3cdf374a85cf085347e3e4d57e9aef0e12d49a3ecca13e35fc7c0ac5ad3067e0deb3e2a387d5debbeb5fc2177a5c62b3e1a9b6ad2b601c749597d2b65eb64", 0x73, 0x0) clock_gettime(0x0, &(0x7f0000002580)={0x0, 0x0}) utimes(&(0x7f0000002540)='./file1/file0\x00', &(0x7f00000025c0)={{r7, r8/1000+10000}, {0x77359400}}) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) symlink(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file1/file0\x00') open_by_handle_at(r6, &(0x7f0000002680)={0x83, 0x1ff, "c9d8a89b60140b89afa0cc068dea905b2a6164e618e5930a8f42018e7ad8009facd7711a7421854ac94073a053909b5c5786ffe7f1b786904bd7c35965ef9a80211856b03e68868d0a090274319082a9bfb1cb017b731f26b5ee7c50c093c5094aeed9137246cc03bddd18f9b24fcdd8f3dc4c3bc102a5c17a4988"}, 0x20a00) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r6, &(0x7f0000002740)={0x10000000}) 11:19:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000140), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 11:19:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008007, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) 11:19:19 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff7b, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20040010, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 265.366817] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:19:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008007, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) [ 265.573550] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:19:19 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff7b, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20040010, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:19:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) [ 265.854704] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:19:20 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f00000000c0)={0xa, 0xc0, 0xb, 0x200000080, 0x0, 0xffffffffffffffff, 0x7a02000000000000}, 0x2c) 11:19:20 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff7b, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20040010, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:19:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000200)='\'@!cpuset+vmnet0ppp0securityselinux:procbdevvboxnet0#*(\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) read(r0, &(0x7f0000000080)=""/78, 0x4e) sendfile(r0, r0, &(0x7f00000024c0), 0xffffffff) [ 266.501679] hrtimer: interrupt took 211434 ns 11:19:20 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x605e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xae03000000000000, &(0x7f00000000c0)={0xa, 0xc0, 0xb, 0x200000080, 0x0, 0xffffffffffffffff, 0x7a02000000000000}, 0x2c) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000002380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200002}, 0xc, &(0x7f0000002340)={&(0x7f0000000140)={0x18, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) 11:19:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0x349, &(0x7f0000001400)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0}}}, 0xb8}}, 0x0) [ 267.379290] IPVS: ftp: loaded support on port[0] = 21 [ 268.298813] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.305400] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.313777] device bridge_slave_0 entered promiscuous mode [ 268.395794] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.402585] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.410317] device bridge_slave_1 entered promiscuous mode [ 268.492324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.574496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.819567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.903486] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.986822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 268.994001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.084474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.091489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.342234] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 269.349916] team0: Port device team_slave_0 added [ 269.430260] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 269.438146] team0: Port device team_slave_1 added [ 269.519112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.605416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.688364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 269.695816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.705012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.784967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 269.792348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.801155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.695725] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.702348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.709122] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.715703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.724498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 270.992039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.069953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.380688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 274.685696] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 274.692027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.699862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.007303] 8021q: adding VLAN 0 to HW filter on device team0 11:19:31 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x400fff) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 11:19:31 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff7b, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20040010, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:19:31 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000200)='\'@!cpuset+vmnet0ppp0securityselinux:procbdevvboxnet0#*(\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) read(r0, &(0x7f0000000080)=""/78, 0x4e) sendfile(0xffffffffffffffff, r0, &(0x7f00000024c0), 0xffffffff) 11:19:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) dup2(r1, r2) 11:19:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0x349, &(0x7f0000001400)={&(0x7f0000001040)=@updpolicy={0xb8, 0x19, 0x101, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffff0}}}, 0xb8}}, 0x0) 11:19:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x174]}) [ 277.124795] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 277.268112] ================================================================== [ 277.275581] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 277.283236] CPU: 1 PID: 7740 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #66 [ 277.290439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.299814] Call Trace: [ 277.302435] dump_stack+0x306/0x460 [ 277.306101] ? vmx_set_constant_host_state+0x1778/0x1830 [ 277.311604] kmsan_report+0x1a2/0x2e0 11:19:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000003980)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x80) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000280)='/dev/vcs#\x00', 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x7fff, 0xd9d4, 0x4, 0x4}, 0x2c) exit(0x0) sendmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000002040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x80, &(0x7f0000003340), 0x0, &(0x7f0000003380)}}], 0x1, 0x0) write$9p(0xffffffffffffffff, &(0x7f00000020c0)="c86f79e3ed52df4801514247dca77ede18d7dbf7809ba2196733b23bd8944e", 0x1f) [ 277.315475] __msan_warning+0x7c/0xe0 [ 277.319328] vmx_set_constant_host_state+0x1778/0x1830 [ 277.324657] vmx_create_vcpu+0x3e6f/0x7870 [ 277.328926] ? kmsan_set_origin_inline+0x6b/0x120 [ 277.333810] ? __msan_poison_alloca+0x17a/0x210 [ 277.338533] ? vmx_vm_init+0x340/0x340 [ 277.342462] kvm_arch_vcpu_create+0x25d/0x2f0 [ 277.347011] kvm_vm_ioctl+0x13fd/0x33d0 [ 277.351046] ? __msan_poison_alloca+0x17a/0x210 [ 277.355768] ? do_vfs_ioctl+0x18a/0x2810 [ 277.359869] ? __se_sys_ioctl+0x1da/0x270 [ 277.364058] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 277.368937] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 277.373823] do_vfs_ioctl+0xcf3/0x2810 [ 277.377771] ? security_file_ioctl+0x92/0x200 [ 277.382315] __se_sys_ioctl+0x1da/0x270 [ 277.386347] __x64_sys_ioctl+0x4a/0x70 [ 277.390276] do_syscall_64+0xbe/0x100 [ 277.394127] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 277.399347] RIP: 0033:0x457519 [ 277.402568] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.421499] RSP: 002b:00007f48cc38ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.429246] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 277.436565] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 277.443856] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 277.451150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cc38f6d4 [ 277.458445] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 277.465762] 11:19:31 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) fcntl$getown(0xffffffffffffffff, 0x9) [ 277.467412] Local variable description: ----dt@vmx_set_constant_host_state [ 277.474435] Variable was created at: [ 277.478191] vmx_set_constant_host_state+0x2b0/0x1830 [ 277.483410] vmx_create_vcpu+0x3e6f/0x7870 [ 277.487663] ================================================================== [ 277.495038] Disabling lock debugging due to kernel taint [ 277.501002] Kernel panic - not syncing: panic_on_warn set ... [ 277.501002] [ 277.508419] CPU: 1 PID: 7740 Comm: syz-executor2 Tainted: G B 4.19.0-rc4+ #66 11:19:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x3, 0xf7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"626f6e643000000000000000e500", 0x8000000000fff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'bridge_slave_1\x00', {0x2, 0x0, @multicast2}}) [ 277.517025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.526398] Call Trace: [ 277.529025] dump_stack+0x306/0x460 [ 277.532721] panic+0x54c/0xafa [ 277.536011] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 277.541501] kmsan_report+0x2d3/0x2e0 [ 277.545358] __msan_warning+0x7c/0xe0 [ 277.549214] vmx_set_constant_host_state+0x1778/0x1830 [ 277.554551] vmx_create_vcpu+0x3e6f/0x7870 [ 277.558830] ? kmsan_set_origin_inline+0x6b/0x120 [ 277.563729] ? __msan_poison_alloca+0x17a/0x210 [ 277.568456] ? vmx_vm_init+0x340/0x340 [ 277.572387] kvm_arch_vcpu_create+0x25d/0x2f0 [ 277.576930] kvm_vm_ioctl+0x13fd/0x33d0 [ 277.580959] ? __msan_poison_alloca+0x17a/0x210 [ 277.585676] ? do_vfs_ioctl+0x18a/0x2810 [ 277.589791] ? __se_sys_ioctl+0x1da/0x270 [ 277.593989] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 277.598870] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 277.603759] do_vfs_ioctl+0xcf3/0x2810 [ 277.607728] ? security_file_ioctl+0x92/0x200 [ 277.612275] __se_sys_ioctl+0x1da/0x270 [ 277.616308] __x64_sys_ioctl+0x4a/0x70 [ 277.620238] do_syscall_64+0xbe/0x100 [ 277.624090] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 277.629329] RIP: 0033:0x457519 [ 277.632555] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.651487] RSP: 002b:00007f48cc38ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.659231] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 277.666526] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 277.673821] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 277.681120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cc38f6d4 [ 277.688412] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 277.696727] Kernel Offset: disabled [ 277.700368] Rebooting in 86400 seconds..