[....] Starting OpenBSD Secure Shell server: sshd[ 53.873677] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 54.237144] audit: type=1800 audit(1539204618.290:29): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 54.256726] audit: type=1800 audit(1539204618.300:30): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 58.092083] random: sshd: uninitialized urandom read (32 bytes read) [ 58.626596] random: sshd: uninitialized urandom read (32 bytes read) [ 60.472553] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.76' (ECDSA) to the list of known hosts. [ 66.260372] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/10 20:50:32 fuzzer started [ 70.590112] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/10 20:50:36 dialing manager at 10.128.0.26:45337 2018/10/10 20:50:36 syscalls: 1 2018/10/10 20:50:36 code coverage: enabled 2018/10/10 20:50:36 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/10 20:50:36 setuid sandbox: enabled 2018/10/10 20:50:36 namespace sandbox: enabled 2018/10/10 20:50:36 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/10 20:50:36 fault injection: enabled 2018/10/10 20:50:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/10 20:50:36 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/10 20:50:36 net device setup: enabled [ 76.138899] random: crng init done 20:52:21 executing program 0: [ 177.785631] IPVS: ftp: loaded support on port[0] = 21 [ 179.029078] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.035632] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.044230] device bridge_slave_0 entered promiscuous mode [ 179.176861] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.183475] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.192890] device bridge_slave_1 entered promiscuous mode [ 179.322893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.449904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.844108] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.977433] bond0: Enslaving bond_slave_1 as an active interface with an up link 20:52:24 executing program 1: [ 180.764940] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.772846] team0: Port device team_slave_0 added [ 180.962612] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.970602] team0: Port device team_slave_1 added [ 181.233340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 181.250893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.259818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.399145] IPVS: ftp: loaded support on port[0] = 21 [ 181.417094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.653513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.661127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.670347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.846909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.854812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.863904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.167810] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.174851] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.183297] device bridge_slave_0 entered promiscuous mode [ 183.433492] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.439977] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.448616] device bridge_slave_1 entered promiscuous mode [ 183.688337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.867946] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.241220] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.247789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.254828] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.261284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.270085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.527959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.545509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.659991] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.823805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.830885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.964717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.971986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:52:29 executing program 2: [ 185.675258] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.683640] team0: Port device team_slave_0 added [ 186.010792] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.019001] team0: Port device team_slave_1 added [ 186.340032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.347414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.356097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.529751] IPVS: ftp: loaded support on port[0] = 21 [ 186.629644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.636913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.645828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.889047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.896763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.905785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.193053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.200672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.210036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.957422] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.964123] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.972675] device bridge_slave_0 entered promiscuous mode [ 189.273833] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.280322] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.289003] device bridge_slave_1 entered promiscuous mode [ 189.522244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 189.856302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 189.956063] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.962607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.969518] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.976104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.984730] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.577692] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.811888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.905183] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.108983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.116221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.347076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 191.354440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.264473] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.272841] team0: Port device team_slave_0 added 20:52:36 executing program 3: [ 192.607894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.616255] team0: Port device team_slave_1 added [ 192.894134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 192.903604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.912976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.223077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.230254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.239449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.503236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 193.510859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.520171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.664545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 193.672333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.681303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.229183] IPVS: ftp: loaded support on port[0] = 21 [ 196.222407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.278537] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.285460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.292530] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.299090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.307784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.455496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.471821] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.478325] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.487016] device bridge_slave_0 entered promiscuous mode [ 197.764411] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.770891] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.779488] device bridge_slave_1 entered promiscuous mode [ 197.854123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.115027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.388930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 198.706092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 198.712695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.720712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.495100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.822072] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.086566] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.163124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 200.170324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.508906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.516411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.546262] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.554586] team0: Port device team_slave_0 added 20:52:45 executing program 4: [ 201.904164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.912501] team0: Port device team_slave_1 added [ 202.327892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.335315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.345239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.775410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.782714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.791817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.180268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.188081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.196942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.311843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.531974] IPVS: ftp: loaded support on port[0] = 21 [ 203.586347] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.594062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.603125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.741882] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.273926] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.280508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.288917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.343790] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.350376] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.359076] device bridge_slave_0 entered promiscuous mode [ 207.780554] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.805158] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.811734] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.820092] device bridge_slave_1 entered promiscuous mode [ 208.164023] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.170521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.177640] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.184230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.193055] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.307004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.463470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.704575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 20:52:53 executing program 0: 20:52:53 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000440)={0x3, 0xd9, &(0x7f0000000340)="c3df7dbe0dcd448f3d78c2b1ab4da9e61be98f28164cb98ab49bc73496a2dcb5fb02dfe9addcded600dfd56d7bdcbd9651f6a7166bbe87342c48054f4e4ceb80ff182f7471ed0c54c0fdeb44eb80e0b1f1fa3b46b56e5369892bb0d89931b3c9bc7e0edf57c5560efe0a34551284908d1a7b7e3c0b1f656637d510cb5d0a647333ac44bdbe97fcebfd2420872626e87e81b6931eec5c64a32720f268d0085f036e9eeb6a454f511ba6c40cfeb1a72f4a8adede42f2b6fbf1151cb08854240ee04f9039948c1e04c8064c22f6893418d2e110826ac683b0fe2d"}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x408000, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x92}) r4 = msgget$private(0x0, 0x22) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000200)=""/110) ioctl(r0, 0x80, &(0x7f0000000080)="9e") ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000040)=0x2000000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x800100}, &(0x7f00000001c0)=0x10) ioctl$NBD_SET_SIZE(r1, 0xab02, 0xde) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], 0x5b) [ 209.897612] bond0: Enslaving bond_slave_0 as an active interface with an up link 20:52:54 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000440)={0x3, 0xd9, &(0x7f0000000340)="c3df7dbe0dcd448f3d78c2b1ab4da9e61be98f28164cb98ab49bc73496a2dcb5fb02dfe9addcded600dfd56d7bdcbd9651f6a7166bbe87342c48054f4e4ceb80ff182f7471ed0c54c0fdeb44eb80e0b1f1fa3b46b56e5369892bb0d89931b3c9bc7e0edf57c5560efe0a34551284908d1a7b7e3c0b1f656637d510cb5d0a647333ac44bdbe97fcebfd2420872626e87e81b6931eec5c64a32720f268d0085f036e9eeb6a454f511ba6c40cfeb1a72f4a8adede42f2b6fbf1151cb08854240ee04f9039948c1e04c8064c22f6893418d2e110826ac683b0fe2d"}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x408000, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x92}) r4 = msgget$private(0x0, 0x22) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000200)=""/110) ioctl(r0, 0x80, &(0x7f0000000080)="9e") ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000040)=0x2000000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x800100}, &(0x7f00000001c0)=0x10) ioctl$NBD_SET_SIZE(r1, 0xab02, 0xde) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], 0x5b) [ 210.339590] bond0: Enslaving bond_slave_1 as an active interface with an up link 20:52:54 executing program 0: r0 = socket(0xd, 0x8000002, 0x7e) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100feffffff0800000000000000", 0xffffffffffffffbc) [ 210.823456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.830637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:52:55 executing program 0: r0 = socket(0x10, 0x4000000000002, 0x0) ioctl$sock_ifreq(r0, 0x89f8, &(0x7f0000000100)={"7369743000888018000001e000000e02", @ifru_ivalue=0x400000}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) [ 211.203287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.210441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:52:55 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @random="a14ab814f78a", 'ip6_vti0\x00'}}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000100)) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) 20:52:56 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x8001, @empty, 0xfffffffffffffffd}, 0x1c) listen(r0, 0x20000004) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f0000000340)=[{0x10, 0x10d}], 0x10}}], 0x1, 0x0) [ 212.414800] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.423021] team0: Port device team_slave_0 added 20:52:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x18032, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000006c0), 0x1) [ 212.838706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.846976] team0: Port device team_slave_1 added [ 213.203008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.210142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.219597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.272605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.488354] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.495558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.504307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.815034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.822832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.831933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.125163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.132934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.141974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.322817] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.305936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.312631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.320438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:53:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000001c0)={0x7}, 0xff9d) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 216.442959] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.997434] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.004444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.011390] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.018111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.026538] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 217.033360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.779610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.467412] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.253122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.259573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.267641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:53:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3, 0x0, 0x2, r2}) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r4, 0x200000, 0x2, r4}) [ 221.554921] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 221.926146] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.063482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.563518] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.046001] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.052989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.060781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:53:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1}}}, 0x90) close(r0) [ 225.492265] 8021q: adding VLAN 0 to HW filter on device team0 20:53:11 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000200)}}}], 0xfffffffffffffda5, 0x0, &(0x7f0000000300)}) 20:53:11 executing program 0: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x5, 0x7ff, 0x6, 0xbae3, 0x20}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x3ff, 0x30}, 0xfffffffffffffefb) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000180)) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf27f27fce5e86cce) 20:53:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000001580)='/dev/usbmon#\x00', 0x1f, 0x41) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000015c0), &(0x7f0000001600)=0x4) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001640)) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000001680)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000016c0)={0x3, [0x88, 0x5, 0x7]}, 0xa) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001700)='/dev/ptmx\x00', 0x40, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) write$FUSE_WRITE(r0, &(0x7f0000001740)={0x18, 0x0, 0x2, {0x4}}, 0x18) sync_file_range(r1, 0x0, 0x9, 0x1) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000001780)) fcntl$notify(r1, 0x402, 0x0) ioctl$TCFLSH(r1, 0x540b, 0xfff) ioctl$RTC_WIE_ON(r0, 0x700f) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000017c0), 0x4) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000001800)={0x1, 0x0, 0x6, 0x0, 0xe8c3, 0xb3, 0x9}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001840)='/dev/urandom\x00', 0x0, 0x0) write$P9_RAUTH(r0, &(0x7f0000001880)={0x14, 0x67, 0x1, {0x1, 0x3, 0x8}}, 0x14) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000018c0)=@req3={0x2, 0x3, 0x0, 0x2, 0x4, 0x1, 0x8f}, 0x1c) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000019c0)={0x84, &(0x7f0000001900)=""/132}) fremovexattr(r1, &(0x7f0000001a00)=@random={'security.', '\\\x00'}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001a40)={{&(0x7f0000ff6000/0xa000)=nil, 0xa000}, 0x2}) ioctl$TIOCNXCL(r0, 0x540d) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000001b40)=@get={0x1, &(0x7f0000001ac0)=""/79, 0xfff}) r2 = getpid() fcntl$lock(r1, 0x7, &(0x7f0000001b80)={0x3, 0x3, 0x27d, 0xce6, r2}) getresuid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001c80)={{{@in=@broadcast, @in=@broadcast, 0x4e24, 0x0, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x4, 0x0, r3}, {0x7ff, 0x7, 0x800, 0x4, 0x9, 0x8001, 0x800, 0x1}, {0x1, 0x5, 0x3, 0x18}, 0x1, 0x6e6bb1, 0x2, 0x1, 0x0, 0x3}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6, 0x3504, 0x3, 0x2, 0x5, 0x86b3, 0x0, 0x2}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000002200)=@broute={'broute\x00', 0x20, 0x2, 0x428, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001dc0], 0x0, &(0x7f0000001d80), &(0x7f0000001dc0)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x9, 0x63, 0xfbff, 'gretap0\x00', 'bcsh0\x00', 'gretap0\x00', 'eql\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0x0, 0x0, 0xff], 0xa8, 0xd8, 0x128, [@realm={'realm\x00', 0x10, {{0x80000000, 0x7f, 0x1}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x200}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz1\x00', 0x8001}}}}, {{{0xf, 0x40, 0xcbbf, 'bond0\x00', 'yam0\x00', 'gretap0\x00', 'bond_slave_1\x00', @random="38f3800b3e8a", [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0xff, 0xff], 0xf0, 0x220, 0x270, [@mark_m={'mark_m\x00', 0x18, {{0x8d, 0x9, 0x3, 0x1}}}, @statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x8, 0x400, 0x8, 0x8}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x0, 'system_u:object_r:admin_passwd_exec_t:s0\x00'}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x4, 0x6b36f82a}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x4a0) sendmsg$nl_netfilter(r0, &(0x7f0000002400)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000023c0)={&(0x7f00000022c0)={0xf4, 0x10, 0x5, 0x0, 0x70bd2c, 0x25dfdbfd, {0x3, 0x0, 0x6}, [@generic="ab0625e43ae8d355c6bb36256a7dcec2015c1acbfbb52ab1e82e96fa38c2dcd2ade8d57ad43636b57fea4b2f6a89c5d3903a34e74064bd2e942417bf28d80eaf3c28b88c1dbdf8c59277c53aa8d9e4bd081fd6ad0883b0f320c08b7f3bdb47ca65b9bc651f6737cd5f62a6b9ea0df01f9c6931538c93552dd739d51c52e880435f16cfe9efbbb445fe52b8", @nested={0x54, 0xd, [@typed={0x8, 0x27, @pid=r2}, @generic="9c894b10cf7173d80aadb86d4c1a3e698612b34567ecb63dbab6feb02183670ec433d18681f987e978eef760eae001d3544187bc0883023409dc2dfcad15e5d4e402a66e4f6169"]}]}, 0xf4}}, 0x4000) 20:53:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x48}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 20:53:11 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x3c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6}, 0xffffffffffffff9e) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) 20:53:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80000040045010, &(0x7f0000000080)) dup2(r0, r1) [ 227.597154] binder: 7356:7359 transaction failed 29189/-22, size 0-0 line 2855 [ 227.621658] binder: 7356:7359 transaction failed 29189/-22, size 0-0 line 2855 [ 227.653006] binder: 7356:7360 transaction failed 29189/-22, size 0-0 line 2855 [ 227.663565] binder: undelivered TRANSACTION_ERROR: 29189 20:53:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)) 20:53:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) 20:53:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x80000000010) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 20:53:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 20:53:12 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xffffff6b) splice(r0, 0x0, r1, 0x0, 0x6, 0x2) 20:53:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x24) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0)}, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000140)}}, {{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)}}], 0x400000000000222, 0x0) 20:53:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000000}, 0xc) 20:53:12 executing program 0: madvise(&(0x7f000086d000/0x4000)=nil, 0x4000, 0x20000000000c) [ 228.912655] IPVS: ftp: loaded support on port[0] = 21 [ 229.644429] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.650843] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.658872] device bridge_slave_0 entered promiscuous mode [ 229.738891] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.745418] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.753507] device bridge_slave_1 entered promiscuous mode [ 229.833398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.911763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.151956] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.238564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.393549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.400577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.640867] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.648641] team0: Port device team_slave_0 added [ 230.727004] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.735227] team0: Port device team_slave_1 added [ 230.814694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.897102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.976260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.984855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.993727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.073256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.080578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.089463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.964505] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.971147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.978242] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.984884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.992925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.341887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.224869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.525818] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.825129] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.831475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.839506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.140493] 8021q: adding VLAN 0 to HW filter on device team0 20:53:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') lseek(r0, 0x0, 0x0) 20:53:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.redirect\x00', &(0x7f00000002c0)=""/4096, 0x1000) 20:53:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) 20:53:22 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326535a1318fc24d93fbe000000") r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) sendfile(r4, r3, &(0x7f0000000180), 0x100000001) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x7, 0x8, 0x2}) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000effffffe) 20:53:22 executing program 0: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) select(0x40, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)={0x9}, &(0x7f0000000140)={0x0, 0x2710}) 20:53:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) 20:53:22 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="159f0116e18e39574cd1bd6fd61fa7cf9c54369cad55ec1c2991e07eb46f23b1e7e79e3c1edce9bb4c32ebeb368ebc67") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@l2, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001140)=[{{&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000740)="8025607ecd7cb2877ff9", 0xa}], 0x1, &(0x7f0000000980)=[{0x100, 0x1, 0x3, "6f5e7b1c703a570140599860a308d0344e473e5502a85b14f721b9f7170c3a813ec3598ef79f8b5335a5ab03e9f9657c12992e35370babf7d079c9d4677f75b32c290a16e4cffe1381fe17c685f88b11c6c954f8d75d39d32eb455f046be289de153e4de9f9c57797dc20f9806b59e9bd20b5228c81b1c71fca0839866c2e0838a4cc552808c9f69b813a1177ef4eb3114aee9609f9d0eb19a09baa1f5ab9b2b9a008d567abf7e29c21a6f6f897b2b7df309578bfbf926da1464263cbbcc0aa49ac332ef23d60a25709685df4ebd57a6fc1963e9b5baa764b8f1b63a660b7ccdde1e949f7f513aa81525558ba4"}], 0x100, 0x4004000}, 0x9}], 0x1, 0x4008085) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0x4008af03, &(0x7f0000000100)=0x40) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 20:53:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x80000040045010, &(0x7f0000000080)) dup2(r0, r1) 20:53:22 executing program 0: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$apparmor_exec(r0, &(0x7f0000000000)={'stack ', '..mime_type!:^{+vmnet0\x00'}, 0x1d) execveat(r0, &(0x7f0000000100)='\x00', &(0x7f00000001c0), &(0x7f0000000340), 0x1000) 20:53:22 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000400)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326535a1318fc24d93fbe000000") r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) sendfile(r4, r3, &(0x7f0000000180), 0x100000001) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x7, 0x8, 0x2}) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000effffffe) 20:53:22 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2ca75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d964e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb4316cceb5bae136654e58499da7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470a8") preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000003200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r0, &(0x7f00000001c0), 0x10d, 0x0) 20:53:23 executing program 1: unshare(0x400) r0 = socket$inet(0x2, 0xa, 0x0) pwritev(r0, &(0x7f00000001c0), 0x0, 0x0) [ 239.052553] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 20:53:23 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:23 executing program 0: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:23 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 20:53:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 20:53:23 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000005c0)="9099f73a1c7a8d070fc9118d5475663b2ed16f0008f441b01fd923c640a21c6619ecb5cf774b4a64549d57962a838f8edd993560a2f848bc483a9d16f602d4739aa45b3d5930d1865232afa712497380f8733173c58546fb224a6dd2e652c54dc25570fce3a59c1ee353a2dcdd719edc15752cee6ea21a24186d1ba23b0b61719b96815f5cbbb9026156652e8933d146282932233e3dd06803ffd006364892e09dbe7c5f712dd3b3e1", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 20:53:23 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0xa06, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f0000000000), 0x2b428a52) 20:53:23 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:23 executing program 0: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:23 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 20:53:24 executing program 1: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xffffffffffffff41) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xfffffffffffffda1, 0x3f00, &(0x7f0000000100)=@abs, 0xa) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x8c700, 0x0) r3 = dup3(r0, r0, 0x80000) perf_event_open$cgroup(&(0x7f00000005c0)={0x3, 0x70, 0xf2, 0x401, 0x10000, 0x0, 0x0, 0xff, 0x40, 0x4, 0xf913, 0x964b, 0x5, 0x4, 0x8, 0x5f14, 0x4, 0xe81, 0x7, 0xe8b0, 0x800, 0x3, 0x5, 0x4000, 0x2, 0x2, 0x3, 0x8, 0x3, 0x2, 0x8, 0x3, 0x7c, 0xe104, 0xcc, 0x100, 0x3ff, 0x7, 0x0, 0x80000001, 0x1, @perf_config_ext={0x8, 0x1fa}, 0x298, 0xffff, 0xa, 0x7, 0x332d, 0x2}, r2, 0x5, r3, 0x6) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000680)=0x7, 0x4) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000280)="4851bfe7a87db05ebb9d2ed19db8b68d29a960f49c33b42e79e9ff3463c2b2282abd0b8f4da211ec95b4c61865894ec1ba4eaf4e8ce164d96b1ad1ca042239358f82c67d06a279fb737c4a397447097549852663857eb35a6a6ff29edb8403f8a9b41cab73e8718ce89cf7530c25c0f2beb634e6cd008832da31900742322e399f55309cc91d8a1a") r5 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) creat(&(0x7f0000000700)='./file0\x00', 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000480)) write(r5, &(0x7f0000000000)="641c508c0eed24018a921b24aba9e5afa50bc61d177ee50316ee964196cf924eac2b5586865f3bbc1008ed776c94335f2825c44e2aa9131bd425c50504167ff5158a20e34c0043702ecd94985ef59c1464cd72956ea5c37ef8d63a24b75fc822afb715982d46fd1c3d8489db411b04af5fa32d53ca0eec3e67ab735f", 0x7c) open(&(0x7f0000000080)='./file0\x00', 0x400, 0x0) sendfile(r5, r5, &(0x7f0000001000), 0xffff) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000440), &(0x7f00000006c0)=0xc) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r5, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 20:53:24 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x10000, 0x24040) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 20:53:24 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0xa06, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f0000000000), 0x2b428a52) 20:53:24 executing program 0: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:24 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:24 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 20:53:24 executing program 2: r0 = memfd_create(&(0x7f0000000140)='md5sumbdev.vmnet1lo\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f00000000c0)='./file0/../file0\x00', 0x0) 20:53:24 executing program 0: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) 20:53:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8800, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000100)=0xfffffffffffffffc, 0x8) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 20:53:24 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:25 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 20:53:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) 20:53:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) close(r0) 20:53:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x7, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 20:53:25 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:25 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) 20:53:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00006c4f60)=[{&(0x7f0000317fa3)="b5", 0x1}], 0x1) write(r0, &(0x7f0000805000), 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x4) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) 20:53:25 executing program 3: getrandom(&(0x7f0000000380)=""/48, 0xfffffffffffffee1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000fc0)={'filter\x00'}, &(0x7f00000000c0)=0x54) 20:53:25 executing program 0: semop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:25 executing program 5: semop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) 20:53:26 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="24000000110007031dfffd946fa2830020200a0003000000001d85680c5ba3a20400ff7e", 0x24}], 0x1}, 0x0) 20:53:26 executing program 5: semop(0x0, &(0x7f0000000080), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:26 executing program 0: semop(0x0, &(0x7f0000000080), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 20:53:26 executing program 2: clone(0x20040200, &(0x7f0000000180), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000980), &(0x7f00000006c0)) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, &(0x7f0000000240), 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(0x0, 0x1000000000016) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) 20:53:26 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:26 executing program 5: semop(0x0, &(0x7f0000000080), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:26 executing program 3: r0 = socket$inet6(0xa, 0x80806, 0x0) r1 = socket$inet6(0xa, 0x800, 0xfdb) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000004000)}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000005, 0x10, 0xffffffffffffffff, 0x52) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000700)='fou\x00') sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r3, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000640), 0x7) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000380)={r0}) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000006c0)='cubic\x00', 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r1}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000600)=0x1400, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000500)=""/81, &(0x7f0000000580)=0x51) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYRES16=r3], 0x2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0xfffffffffffffffa, 0x9, 0x8001, 0x1, 0x2}, &(0x7f0000000480)=0x14) getpeername$netlink(r4, &(0x7f0000000100), &(0x7f0000000240)=0xc) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000004c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x7}, 0x8) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f76") 20:53:27 executing program 0: semop(0x0, &(0x7f0000000080)=[{}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:27 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) 20:53:27 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:27 executing program 5: semop(0x0, &(0x7f0000000080), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000080)) 20:53:27 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) 20:53:27 executing program 5: semop(0x0, &(0x7f0000000080)=[{}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x8000, &(0x7f0000000400)={0x2, 0x4e23}, 0x10) close(r0) 20:53:28 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)) 20:53:28 executing program 0: semop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) 20:53:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', @ifru_mtu}) 20:53:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_delrule={0x20, 0x5e, 0x601, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) 20:53:28 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) sendfile(r0, r0, &(0x7f00000001c0), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000140), 0x12800) 20:53:28 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x801) read$eventfd(r0, &(0x7f0000000000), 0x8) 20:53:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) write(r0, &(0x7f0000000180)="e7", 0x1) 20:53:28 executing program 0: semop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) 20:53:28 executing program 5: semop(0x0, &(0x7f0000000080)=[{}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x7fff]) 20:53:28 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) sendfile(r0, r0, &(0x7f00000001c0), 0x7fffffff) sendfile(r0, r0, &(0x7f0000000140), 0x12800) 20:53:29 executing program 2: mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000b80)='keyring\x00', &(0x7f0000000bc0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000b00)='logon\x00', &(0x7f0000000b40)={'syz', 0x3}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_delrule={0x20, 0x5e, 0x601, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x20}}, 0x0) 20:53:29 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:29 executing program 1: 20:53:29 executing program 3: 20:53:29 executing program 1: 20:53:29 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50}, 0x50) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) 20:53:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000200)="17", 0x1) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000040)=""/81, 0x51}, 0x40002102) 20:53:29 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r2}) 20:53:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={r1, 0x26}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x2e01], 0x7fffffff, 0xfff, 0x5, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r0, r0, 0x9, 0x2}, 0x10) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000180)) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0x0, 0x5, 0x10000000}) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x83, 0x80000) ioctl$TIOCEXCL(r3, 0x540c) 20:53:29 executing program 0: semop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0xc0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x0]) [ 245.873149] hrtimer: interrupt took 35009 ns [ 246.443525] ================================================================== [ 246.450982] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 246.458108] CPU: 0 PID: 7944 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #66 [ 246.465315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.474694] Call Trace: [ 246.477295] dump_stack+0x306/0x460 [ 246.480925] ? vmap_page_range_noflush+0x975/0xed0 [ 246.485875] kmsan_report+0x1a2/0x2e0 [ 246.489682] __msan_warning+0x7c/0xe0 [ 246.493491] vmap_page_range_noflush+0x975/0xed0 [ 246.498277] map_vm_area+0x17d/0x1f0 [ 246.501999] kmsan_vmap+0xf2/0x180 [ 246.505560] vmap+0x3a1/0x510 [ 246.508668] ? relay_open_buf+0x81e/0x19d0 [ 246.512936] relay_open_buf+0x81e/0x19d0 [ 246.517110] relay_open+0xabb/0x1370 [ 246.520851] do_blk_trace_setup+0xaf7/0x1780 [ 246.525279] __blk_trace_setup+0x20b/0x380 [ 246.529526] blk_trace_ioctl+0x274/0x970 [ 246.533618] ? kmsan_set_origin_inline+0x6b/0x120 [ 246.538463] ? __msan_poison_alloca+0x17a/0x210 [ 246.543139] ? blkdev_ioctl+0x327/0x55e0 [ 246.547206] ? block_ioctl+0x16f/0x1d0 [ 246.551096] blkdev_ioctl+0x1aaa/0x55e0 [ 246.555085] ? do_futex+0xada/0x59c0 [ 246.558807] ? task_kmsan_context_state+0x6b/0x120 [ 246.563826] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 246.569200] ? vmalloc_to_page+0x57d/0x6b0 [ 246.573442] ? kmsan_set_origin_inline+0x6b/0x120 [ 246.578303] block_ioctl+0x16f/0x1d0 [ 246.582018] ? block_llseek+0x190/0x190 [ 246.586009] do_vfs_ioctl+0xcf3/0x2810 [ 246.589903] ? security_file_ioctl+0x92/0x200 [ 246.594416] __se_sys_ioctl+0x1da/0x270 [ 246.598411] __x64_sys_ioctl+0x4a/0x70 [ 246.602300] do_syscall_64+0xbe/0x100 [ 246.606102] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 246.611287] RIP: 0033:0x457579 [ 246.614484] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.633387] RSP: 002b:00007fbcf5fc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.641108] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 246.648385] RDX: 0000000020000340 RSI: 00000000c0481273 RDI: 0000000000000008 [ 246.655665] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.662929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbcf5fc36d4 [ 246.670207] R13: 00000000004be9e3 R14: 00000000004ce6e0 R15: 00000000ffffffff [ 246.677482] [ 246.679101] Uninit was created at: [ 246.682644] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 246.687742] kmsan_kmalloc+0xa4/0x120 [ 246.691550] __kmalloc+0x14b/0x440 [ 246.695356] kmsan_vmap+0x9b/0x180 [ 246.699240] vmap+0x3a1/0x510 [ 246.702340] relay_open_buf+0x81e/0x19d0 [ 246.706420] relay_open+0xabb/0x1370 [ 246.710129] do_blk_trace_setup+0xaf7/0x1780 [ 246.714559] __blk_trace_setup+0x20b/0x380 [ 246.718789] blk_trace_ioctl+0x274/0x970 [ 246.722845] blkdev_ioctl+0x1aaa/0x55e0 [ 246.726817] block_ioctl+0x16f/0x1d0 [ 246.730528] do_vfs_ioctl+0xcf3/0x2810 [ 246.734412] __se_sys_ioctl+0x1da/0x270 [ 246.738381] __x64_sys_ioctl+0x4a/0x70 [ 246.742277] do_syscall_64+0xbe/0x100 [ 246.746079] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 246.751256] ================================================================== [ 246.758616] Disabling lock debugging due to kernel taint [ 246.764058] Kernel panic - not syncing: panic_on_warn set ... [ 246.764058] [ 246.771432] CPU: 0 PID: 7944 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #66 [ 246.780000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.789357] Call Trace: [ 246.791962] dump_stack+0x306/0x460 [ 246.795625] panic+0x54c/0xafa [ 246.798855] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 246.804303] kmsan_report+0x2d3/0x2e0 [ 246.808107] __msan_warning+0x7c/0xe0 [ 246.811909] vmap_page_range_noflush+0x975/0xed0 [ 246.816685] map_vm_area+0x17d/0x1f0 [ 246.820401] kmsan_vmap+0xf2/0x180 [ 246.823941] vmap+0x3a1/0x510 [ 246.827050] ? relay_open_buf+0x81e/0x19d0 [ 246.831287] relay_open_buf+0x81e/0x19d0 [ 246.835361] relay_open+0xabb/0x1370 [ 246.839084] do_blk_trace_setup+0xaf7/0x1780 [ 246.843514] __blk_trace_setup+0x20b/0x380 [ 246.847777] blk_trace_ioctl+0x274/0x970 [ 246.851853] ? kmsan_set_origin_inline+0x6b/0x120 [ 246.856694] ? __msan_poison_alloca+0x17a/0x210 [ 246.861365] ? blkdev_ioctl+0x327/0x55e0 [ 246.865425] ? block_ioctl+0x16f/0x1d0 [ 246.869318] blkdev_ioctl+0x1aaa/0x55e0 [ 246.873294] ? do_futex+0xada/0x59c0 [ 246.877016] ? task_kmsan_context_state+0x6b/0x120 [ 246.881962] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 246.887326] ? vmalloc_to_page+0x57d/0x6b0 [ 246.891649] ? kmsan_set_origin_inline+0x6b/0x120 [ 246.896495] block_ioctl+0x16f/0x1d0 [ 246.900224] ? block_llseek+0x190/0x190 [ 246.904207] do_vfs_ioctl+0xcf3/0x2810 [ 246.908105] ? security_file_ioctl+0x92/0x200 [ 246.912613] __se_sys_ioctl+0x1da/0x270 [ 246.916589] __x64_sys_ioctl+0x4a/0x70 [ 246.920474] do_syscall_64+0xbe/0x100 [ 246.924274] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 246.929457] RIP: 0033:0x457579 [ 246.932657] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.951575] RSP: 002b:00007fbcf5fc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.959280] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 246.966548] RDX: 0000000020000340 RSI: 00000000c0481273 RDI: 0000000000000008 [ 246.973810] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.981091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbcf5fc36d4 [ 246.988363] R13: 00000000004be9e3 R14: 00000000004ce6e0 R15: 00000000ffffffff [ 246.996652] Kernel Offset: disabled [ 247.000288] Rebooting in 86400 seconds..