[ 54.246650] audit: type=1800 audit(1538989184.294:27): pid=5981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 55.738859] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c[ 56.158674] random: sshd: uninitialized urandom read (32 bytes read) . [ 56.801379] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 59.053024] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. [ 64.918213] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 08:59:56 fuzzer started [ 69.453183] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 09:00:01 dialing manager at 10.128.0.26:36867 2018/10/08 09:00:02 syscalls: 1 2018/10/08 09:00:02 code coverage: enabled 2018/10/08 09:00:02 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 09:00:02 setuid sandbox: enabled 2018/10/08 09:00:02 namespace sandbox: enabled 2018/10/08 09:00:02 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 09:00:02 fault injection: enabled 2018/10/08 09:00:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 09:00:02 net packed injection: enabled 2018/10/08 09:00:02 net device setup: enabled [ 74.171443] random: crng init done 09:02:40 executing program 0: [ 231.233652] IPVS: ftp: loaded support on port[0] = 21 [ 233.675515] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.682099] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.690614] device bridge_slave_0 entered promiscuous mode [ 233.830412] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.836956] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.845403] device bridge_slave_1 entered promiscuous mode [ 233.982486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 234.117861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 09:02:44 executing program 1: [ 234.532612] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.713006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.015256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 235.022477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.289154] IPVS: ftp: loaded support on port[0] = 21 [ 235.826384] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.834746] team0: Port device team_slave_0 added [ 236.130453] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.138720] team0: Port device team_slave_1 added [ 236.404087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.411143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.420161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.609394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 236.616522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.625460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.804038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.811757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.821419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.016337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.024312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.033220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.438311] ip (6259) used greatest stack depth: 53056 bytes left [ 238.992548] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.999013] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.007553] device bridge_slave_0 entered promiscuous mode [ 239.186257] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.192888] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.201252] device bridge_slave_1 entered promiscuous mode [ 239.365472] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.372018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.378930] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.385496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.394400] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.402828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.612269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.081991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:02:50 executing program 2: [ 240.179768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.487368] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.795333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.802783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.093778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.100828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.214986] IPVS: ftp: loaded support on port[0] = 21 [ 242.070335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.078557] team0: Port device team_slave_0 added [ 242.354551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 242.362698] team0: Port device team_slave_1 added [ 242.640713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 242.648033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.657013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.015792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.022963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.032190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.253547] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.261140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.270184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.446696] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.454554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.463806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.047346] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.054005] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.062539] device bridge_slave_0 entered promiscuous mode [ 246.289075] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.295644] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.304136] device bridge_slave_1 entered promiscuous mode [ 246.506138] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.512684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.519593] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.526173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.534839] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 246.547777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 246.642373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.888684] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 247.840050] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:02:58 executing program 3: [ 248.142392] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.522912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 248.530251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.867491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.874711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.218006] IPVS: ftp: loaded support on port[0] = 21 [ 249.783593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.791544] team0: Port device team_slave_0 added [ 250.008937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.017614] team0: Port device team_slave_1 added [ 250.376601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 250.383840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.392704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.687478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.694658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.703648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.760579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.999729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.007389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.016421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.412937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.420492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.429567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.067598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.464641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.470988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.478936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.796561] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.202983] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.209463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.216475] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.222988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.232381] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.346105] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.352680] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.361930] device bridge_slave_0 entered promiscuous mode [ 255.522027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.714281] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.720757] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.729378] device bridge_slave_1 entered promiscuous mode [ 256.190016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.468259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 257.357663] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.752128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 258.084192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 258.091270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:03:08 executing program 4: [ 258.472659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 258.479722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.600385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 259.608897] team0: Port device team_slave_0 added [ 259.639818] IPVS: ftp: loaded support on port[0] = 21 [ 260.125631] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 260.133821] team0: Port device team_slave_1 added [ 260.531245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 260.538585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.547673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.919045] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 260.926276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.935113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.103134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.436497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.444447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.453648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.782453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.790138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.799458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.601826] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.090799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.097344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.105291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:03:14 executing program 0: 09:03:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x4e22, @local}}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) 09:03:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffe}, 0x10}, 0x2}, 0x0) 09:03:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) r2 = dup(r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x2, 0x5, 0x10001}) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x40000001b) ioctl$TCFLSH(r0, 0x540b, 0x0) [ 265.811133] 8021q: adding VLAN 0 to HW filter on device team0 09:03:16 executing program 0: r0 = socket$inet6(0xa, 0x7, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000100)={0x2, 0xffffffffffffffe0}, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="553f6234488dd25d766070") mmap(&(0x7f0000a70000/0x3000)=nil, 0x3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) mprotect(&(0x7f0000a72000/0x4000)=nil, 0x4000, 0x0) [ 266.432808] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.439291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.446331] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.452844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.461066] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:03:16 executing program 0: timer_create(0x2, &(0x7f0000000080)={0x0, 0x17}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f0000000180)) timer_gettime(0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) [ 266.965798] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.972429] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.980752] device bridge_slave_0 entered promiscuous mode [ 267.201896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:03:17 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f00000002c0)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x200, 0xfff) syz_emit_ethernet(0x1ce, &(0x7f0000000500)={@local, @link_local, [], {@mpls_mc={0x8848, {[{0x8, 0x100000001, 0xb5f, 0x3f}, {0x5, 0x0, 0xffff, 0x9}, {0x9, 0x4, 0xfffffffffffffff8, 0x16db}], @ipv6={0x0, 0x6, "42f4cf", 0x18c, 0x3a, 0x100000000, @remote, @mcast2, {[@routing={0x3a, 0x12, 0x0, 0x1, 0x0, [@local, @empty, @mcast1, @remote, @loopback, @empty, @remote, @remote, @remote]}], @tcp={{0x4e22, 0x4e24, r1, r2, 0xf896, 0x0, 0x6, 0x8, 0x20, 0x0, 0x8, {[@eol, @nop]}}, {"b4edf4cb5ddcfa7318fbb023f3001f2be31a1406e97aa6ed6af96c2cea2c204d226f2688911283f7fca66c6566b8caf1801326343c5294ebd197806726b352045f3d454dde5588003170af7e088b9a931faa6e5ca701defc1084e12cb1ce3e2892a9f591a8787517b51da3935bd31eda9aabf20d760a6c8e97775a50b613a5ed2b86ef3b8364f1cd2dcf304db7602fbc1f0e95860a48e8e005e46abfd2590f673a8b7d3680ca632842d97e1f9d466bac1541373cd5ad6cee89ba34e4f768e278dd4d69d82aab59082a37a72fbb7fd460d493e7a7903af1c879efe1cc"}}}}}}}}, &(0x7f00000002c0)={0x0, 0x0, [0x0, 0x1, 0xfffffffffffffffd]}) [ 267.488795] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.495413] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.503852] device bridge_slave_1 entered promiscuous mode 09:03:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) accept(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/nfsfs\x00') sendfile(r0, r2, &(0x7f0000000080)=0x4c, 0x7) [ 267.903049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.237532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.309026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.653555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 269.964463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.972087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.323716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.330756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.057795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.109769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.117900] team0: Port device team_slave_0 added [ 271.423869] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.432041] team0: Port device team_slave_1 added [ 271.695830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 271.702942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.711548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.012369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 272.019542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.028303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.182981] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.263420] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 272.270965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.279976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.593400] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.600926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.610009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.264697] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.271082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.279280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:03:23 executing program 1: [ 274.279775] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.575455] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.581996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.588889] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.595468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.604140] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 275.611269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.067989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.834774] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:03:29 executing program 2: [ 279.586794] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 279.593330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.601102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.124357] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.521089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.039424] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 09:03:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'lo\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1b"]}) [ 283.538982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 283.545486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.553422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.883415] 8021q: adding VLAN 0 to HW filter on device team0 09:03:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000d11000), &(0x7f00000001c0)=0xffffffffffffff6e) 09:03:35 executing program 1: 09:03:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x81) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000002c0)=@ng={0x4, 0xd}, 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x19, 0x0, "1d4790690a7d5deee8866485b9b27c5b3034cc6304f88f75d49ec339470174a8fa0f9340aac0c27dcddf03e5d3776bb764aeb72cdc55bbd9ff60426512710b4c", "993a4362fd93614090b0bb130db56adfa14defd14ffccc100b331ba7e553bd2e5944d34c05c3d983bb53fadebb6a9aa93f7e8048f1068d104f70feb776e3e748", "c8fa64e2e89dfd34a4a0ccab16a19bdccf09e9bcf063c4d2ed7d2cdf3a063c65"}) 09:03:35 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x450000, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v2={0x7, 0x0, 0x6, 0x1e8a, 0x85, "6de03fc8004a70cab9a4b20404785712ec703528ee7d382ac31d41c75bc7a267c4ef778057f9f72335f71587e87f92018912663824313ed8633f8a8aaf11c104cce334e88342eaaaf127452be92ab1d6e3ed4a26c0e7828135061ed0ecda9b7e6f7219e6fd12d2099321787f5f3af16af5c22154a528c8d7ff529c801225edd90e52539208"}, 0x8f, 0x2) pread64(r0, &(0x7f0000000140)=""/45, 0x2d, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e23, 0x80, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000340)=0x84) ioctl$RTC_PIE_ON(r0, 0x7005) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in={{0x2, 0x4e21, @rand_addr=0xffa}}}, 0x84) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0x1) sendmsg$nl_netfilter(r0, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x88, 0x4, 0x2, 0x118, 0x70bd25, 0x25dfdbfb, {0xf, 0x0, 0x3}, [@typed={0x8, 0x1, @u32=0x7}, @typed={0x8, 0x15, @u32=0x7}, @generic="c4023f6101a666854ecb", @generic="ee843635f19c9076d2084056ad84d63d2d48c25cd59438dd829ed6f1960462c1dd66a1da", @nested={0x34, 0x5a, [@generic="21c322bc591685f0bc59abde685443c732ef1dbff46985e0b6ef17e1f2a60e78a761afecdb86d510342113f73e79"]}]}, 0x88}, 0x1, 0x0, 0x0, 0x44080}, 0x4000000) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000600)=0x6, &(0x7f0000000640)=0x2) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000680)={r2, 0x4}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000d40)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000e80)={&(0x7f0000000d80)={0x1d, r3}, 0x10, &(0x7f0000000e40)={&(0x7f0000000dc0)=@canfd={{0x3, 0x6, 0x1f, 0x3f}, 0x23, 0x3, 0x0, 0x0, "890f64c49a84af5eda97ce14ccfc7748c6e633db1641dbd2613b0936d7fab8ac73347d5ee26825a4dceec812466a0c5dd84871cb4c732addaffe6474db149777"}, 0x48}}, 0x800) fchdir(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000f00)={0x1, 0x70, 0x0, 0x8, 0x9, 0x6, 0x0, 0x1ff, 0x2200, 0x6, 0xd34b, 0x310, 0xe327, 0xffffffff, 0x5, 0x0, 0x65, 0x5, 0x1, 0xfff, 0x8, 0x236, 0x4ad0acb9, 0x48, 0x0, 0x3, 0x3, 0x1, 0xff, 0x20, 0x7, 0x2, 0x9, 0x2, 0x2, 0x4, 0x1, 0x3, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000ec0), 0x4}, 0x1682, 0x27c, 0x8, 0x2, 0x854c, 0x40, 0x1}) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000f80)=""/171, 0xab}, {&(0x7f0000001040)=""/145, 0x91}, {&(0x7f0000001100)=""/199, 0xc7}, {&(0x7f0000001200)=""/188, 0xbc}, {&(0x7f00000012c0)=""/206, 0xce}], 0x5) setsockopt$inet6_buf(r0, 0x29, 0x7f, &(0x7f0000001440)="6bc2d1aad990178e669d7670aa4912bd46ce11e2c351639dc58dc9a9eb6047c0a811c22f9de2b2a629a41c376bdfa1dc2fbc7d01a3a492792e449415442395dba7c90b6d8bce576d5df3898f8ce089a2a497c57437527c8f6ae3743199c952752ba44d4daf67f101dd170d39e08a510db9be373d499b439d69d413f3cf2fec5c0cd9f94d8c3ddb29557e969e1baba74482ea3bc1795d6a80976569927454dfdc947ab6c9d186eae398eb5e5b8183b23e6545f6efea2fb2b963275ec28e06d0737f870ebb1c6305", 0xc7) fstat(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f00000015c0)={0xae, 0x7d, 0x1, {{0x0, 0x8b, 0x8dbd, 0x0, {0x84, 0x0, 0x5}, 0x80080000, 0x8, 0x2, 0x6, 0x34, 'posix_acl_access%vboxnet1*wlan0%.\'wlan0eth1mime_type', 0xd, 'security.evm\x00', 0x9, '/dev/vcs\x00', 0xe, '%lo(@{keyring!'}, 0xe, 'vboxnet1\\proc:', r4, r5, r4}}, 0xae) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000001680)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000016c0)) write$P9_RLERRORu(r0, &(0x7f0000001780)={0x2d, 0x7, 0x1, {{0x20, 'userkeyringsecurityprocvmnet0]!+'}, 0x6}}, 0x2d) r6 = fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000017c0)=0x0) kcmp(r6, r7, 0x3, r0, r0) msgget(0x2, 0x84) syz_open_dev$midi(&(0x7f0000001800)='/dev/midi#\x00', 0x148, 0x40200) socket$unix(0x1, 0x1, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001840)) openat$cgroup_ro(r0, &(0x7f0000001880)='memory.swap.current\x00', 0x0, 0x0) 09:03:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r3, 0x4, 0x72109c5fef5d34d3) r4 = gettid() fcntl$setown(r2, 0x8, r4) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00000002c0)='./control\x00', 0xa4000960) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './control/file0\x00'}, 0x6e) 09:03:35 executing program 0: r0 = socket(0x8, 0x40000000040, 0x5) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x7fffffff, 0x400}, 0x1}, 0x10) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) shutdown(r0, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r2, &(0x7f00000000c0)={0x60, 0x0, 0x6, {{0x80, 0x29, 0x1, 0xc52, 0x8000, 0x2, 0x1, 0x9}}}, 0x60) shutdown(r0, 0x0) 09:03:36 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x7b35f44f63a59b09) openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc4c85513, &(0x7f0000000600)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x81e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f0000000000), 0x0, [], [0x5]}) 09:03:36 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005e0007031dfffd946fa2830020200a0005000010b21d85680c1ba3a20c02ff7e", 0x24}], 0x1}, 0x0) 09:03:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000380)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffff9793}, &(0x7f0000000280)=0x10) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r2, &(0x7f0000007080)=[{&(0x7f0000000140)=@in6={0xa, 0x0, 0x4, @remote}, 0x1c, &(0x7f0000000540)}], 0x342, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000180)={0x84}) getgroups(0xff27, 0xfffffffffffffffd) 09:03:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000007c0)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:03:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x24cbef0117d895d, 0x0) 09:03:36 executing program 2: r0 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) listen(r1, 0x0) [ 286.501661] hrtimer: interrupt took 112138 ns [ 286.692688] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 286.794975] ================================================================== [ 286.802408] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 286.809012] CPU: 1 PID: 7499 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #63 [ 286.816210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.825583] Call Trace: [ 286.828200] dump_stack+0x306/0x460 [ 286.831861] ? _raw_spin_lock_irqsave+0x227/0x340 [ 286.836735] ? vmx_create_vcpu+0x10df/0x7920 [ 286.841190] kmsan_report+0x1a3/0x2d0 [ 286.845040] __msan_warning+0x7c/0xe0 [ 286.848871] vmx_create_vcpu+0x10df/0x7920 [ 286.853153] ? kmsan_set_origin_inline+0x6b/0x120 [ 286.858030] ? __msan_poison_alloca+0x17a/0x210 [ 286.862756] ? vmx_vm_init+0x340/0x340 [ 286.866679] kvm_arch_vcpu_create+0x25d/0x2f0 [ 286.871230] kvm_vm_ioctl+0x13fd/0x33d0 [ 286.875263] ? __msan_poison_alloca+0x17a/0x210 [ 286.879980] ? do_vfs_ioctl+0x18a/0x2810 [ 286.884068] ? __se_sys_ioctl+0x1da/0x270 [ 286.888253] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 286.893152] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 286.898030] do_vfs_ioctl+0xcf3/0x2810 [ 286.901968] ? security_file_ioctl+0x92/0x200 [ 286.906505] __se_sys_ioctl+0x1da/0x270 [ 286.910521] __x64_sys_ioctl+0x4a/0x70 [ 286.914437] do_syscall_64+0xbe/0x100 [ 286.918280] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 286.923489] RIP: 0033:0x457579 [ 286.926709] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.945638] RSP: 002b:00007fd2fa642c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.953380] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 286.960672] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 286.967957] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.975250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2fa6436d4 [ 286.982552] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 286.989860] [ 286.991503] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 286.998443] Variable was created at: [ 287.002191] vmx_create_vcpu+0xd5/0x7920 [ 287.006291] kvm_arch_vcpu_create+0x25d/0x2f0 [ 287.011316] ================================================================== [ 287.018689] Disabling lock debugging due to kernel taint [ 287.024156] Kernel panic - not syncing: panic_on_warn set ... [ 287.024156] [ 287.031570] CPU: 1 PID: 7499 Comm: syz-executor4 Tainted: G B 4.19.0-rc4+ #63 [ 287.040180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.049561] Call Trace: [ 287.052189] dump_stack+0x306/0x460 [ 287.055882] panic+0x54c/0xafa [ 287.059156] kmsan_report+0x2cd/0x2d0 [ 287.063001] __msan_warning+0x7c/0xe0 [ 287.066852] vmx_create_vcpu+0x10df/0x7920 [ 287.071125] ? kmsan_set_origin_inline+0x6b/0x120 [ 287.076007] ? __msan_poison_alloca+0x17a/0x210 [ 287.080722] ? vmx_vm_init+0x340/0x340 [ 287.084649] kvm_arch_vcpu_create+0x25d/0x2f0 [ 287.089182] kvm_vm_ioctl+0x13fd/0x33d0 [ 287.093213] ? __msan_poison_alloca+0x17a/0x210 [ 287.097959] ? do_vfs_ioctl+0x18a/0x2810 [ 287.102050] ? __se_sys_ioctl+0x1da/0x270 [ 287.106247] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 287.111157] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 287.116033] do_vfs_ioctl+0xcf3/0x2810 [ 287.119963] ? security_file_ioctl+0x92/0x200 [ 287.124513] __se_sys_ioctl+0x1da/0x270 [ 287.128539] __x64_sys_ioctl+0x4a/0x70 [ 287.132464] do_syscall_64+0xbe/0x100 [ 287.136312] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 287.141525] RIP: 0033:0x457579 09:03:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000000028000007a0a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_flags}) 09:03:37 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)=ANY=[@ANYBLOB="2303338408"]) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0x4020940d, 0x0) [ 287.144740] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.163671] RSP: 002b:00007fd2fa642c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.171411] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 287.178699] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 287.186002] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.193288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd2fa6436d4 [ 287.200576] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 287.208899] Kernel Offset: disabled [ 287.212538] Rebooting in 86400 seconds..