Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. 2018/12/03 15:56:46 fuzzer started 2018/12/03 15:56:51 dialing manager at 10.128.0.26:37509 2018/12/03 15:56:51 syscalls: 1 2018/12/03 15:56:51 code coverage: enabled 2018/12/03 15:56:51 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/03 15:56:51 setuid sandbox: enabled 2018/12/03 15:56:51 namespace sandbox: enabled 2018/12/03 15:56:51 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/03 15:56:51 fault injection: enabled 2018/12/03 15:56:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/03 15:56:51 net packet injection: enabled 2018/12/03 15:56:51 net device setup: enabled 15:59:38 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) syzkaller login: [ 253.179809] IPVS: ftp: loaded support on port[0] = 21 [ 255.504306] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.510804] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.519789] device bridge_slave_0 entered promiscuous mode [ 255.658967] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.665557] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.674376] device bridge_slave_1 entered promiscuous mode [ 255.809703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.945899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.365279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.508772] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:59:42 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$user(&(0x7f0000000100)='user\x00', 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.463789] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.472330] team0: Port device team_slave_0 added [ 257.523093] IPVS: ftp: loaded support on port[0] = 21 [ 257.735047] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.743442] team0: Port device team_slave_1 added [ 257.929304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.092281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 258.099333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.108526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.366005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.373855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.383287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.649615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.657348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.666785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.188225] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.194841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.201791] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.208411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.217309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 261.281827] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.288401] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.297042] device bridge_slave_0 entered promiscuous mode [ 261.305070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.558948] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.565597] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.574621] device bridge_slave_1 entered promiscuous mode [ 261.853144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.044365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.634914] bond0: Enslaving bond_slave_0 as an active interface with an up link 15:59:48 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0xd4a}) [ 262.902265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.173474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 263.202388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.413060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.420107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.565173] IPVS: ftp: loaded support on port[0] = 21 [ 264.156100] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.164577] team0: Port device team_slave_0 added [ 264.473663] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.481730] team0: Port device team_slave_1 added [ 264.750721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 264.757965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.767058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.064189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.071269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.080446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.339577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.347545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.356561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.694312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.702276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.711247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.983868] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.990345] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.999055] device bridge_slave_0 entered promiscuous mode [ 268.297033] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.303681] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.312441] device bridge_slave_1 entered promiscuous mode [ 268.536369] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.542922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.549849] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.556448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.565541] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.574810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.652081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.878728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.592314] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 269.902446] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 270.177440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 270.184699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.380551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.387705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.144750] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.152958] team0: Port device team_slave_0 added [ 271.398125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.406329] team0: Port device team_slave_1 added [ 271.616104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 271.625621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.634547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.968556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 271.975808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.984988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 15:59:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8, 0x7fc) [ 272.316464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 272.324253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.333466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.712023] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 272.719737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.728934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.913542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.249750] IPVS: ftp: loaded support on port[0] = 21 [ 274.144759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.568823] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.575305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.583384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.680159] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.686742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.693850] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.700335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.709187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 276.715927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.818372] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.644295] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.650800] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.659639] device bridge_slave_0 entered promiscuous mode [ 279.046345] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.053133] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.061776] device bridge_slave_1 entered promiscuous mode [ 279.429236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 279.734908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 280.729545] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 281.075456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.445306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 281.452550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.473408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.732429] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 281.739518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.747266] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 282.783434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.791438] team0: Port device team_slave_0 added 16:00:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f0000000400)={0x77359400}, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), 0x0}, 0x20) [ 283.206358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 283.214760] team0: Port device team_slave_1 added [ 283.560706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 283.567929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.576849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.993732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 284.000770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.009924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.146697] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.153190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.161063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.330354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 284.338096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.346979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.479286] IPVS: ftp: loaded support on port[0] = 21 [ 284.707806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 284.721043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.730158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.054832] hrtimer: interrupt took 55506 ns 16:00:11 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) [ 285.930425] 8021q: adding VLAN 0 to HW filter on device team0 16:00:12 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 16:00:13 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 16:00:14 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) 16:00:15 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x10001}, 0x8) 16:00:16 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) [ 290.265071] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.271572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.278610] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.285188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.293881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 290.642062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 16:00:16 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300), &(0x7f0000000600)=0xfffffffffffffe8c) 16:00:18 executing program 0: socket$inet6(0xa, 0x3, 0xf5) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c12") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8402, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad", 0x49) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x3f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={0x0, 0xfffffffffffffff7}, 0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r3) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x0, 0x0, 0x0, [], [], [], 0xb48}) [ 292.451032] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.457675] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.466378] device bridge_slave_0 entered promiscuous mode [ 292.929203] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.935935] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.944559] device bridge_slave_1 entered promiscuous mode [ 293.288086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 293.634761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 293.936718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.678417] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 294.962270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.246852] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 295.347440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 295.354591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.689102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 295.696278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 296.470077] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 296.552710] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 296.559123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.567097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.625621] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 296.634494] team0: Port device team_slave_0 added [ 296.671307] ================================================================== [ 296.678713] BUG: KMSAN: kernel-infoleak in kvm_write_guest_page+0x373/0x500 [ 296.685891] CPU: 1 PID: 7758 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #102 [ 296.693207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.702574] Call Trace: [ 296.705182] dump_stack+0x32d/0x480 [ 296.708836] ? kvm_write_guest_page+0x373/0x500 [ 296.713575] kmsan_report+0x12c/0x290 [ 296.717428] kmsan_internal_check_memory+0x9ce/0xa50 [ 296.722623] kmsan_copy_to_user+0x78/0xd0 [ 296.726812] kvm_write_guest_page+0x373/0x500 [ 296.731380] kvm_write_guest+0x1e1/0x360 [ 296.735508] kvm_emulate_hypercall+0x19c9/0x1ac0 [ 296.740347] handle_vmcall+0x41/0x50 [ 296.744090] ? handle_rdpmc+0x80/0x80 [ 296.747920] vmx_handle_exit+0x21bd/0xb980 [ 296.752203] ? vmalloc_to_page+0x585/0x6c0 [ 296.756504] ? kmsan_get_shadow_origin_ptr+0x142/0x410 [ 296.761832] ? vmx_flush_tlb_gva+0x480/0x480 [ 296.766292] kvm_arch_vcpu_ioctl_run+0xaeee/0x12040 [ 296.771471] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 296.776693] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 296.782090] ? update_load_avg+0x12ae/0x1db0 [ 296.786592] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 296.792013] ? __msan_get_context_state+0x9/0x20 [ 296.796814] ? INIT_BOOL+0xc/0x30 [ 296.800346] ? mutex_lock_killable+0x2f7/0x450 [ 296.805009] kvm_vcpu_ioctl+0xfe4/0x1cc0 [ 296.809134] ? do_vfs_ioctl+0x184/0x2ca0 [ 296.813226] ? kvm_vm_release+0x90/0x90 [ 296.817233] do_vfs_ioctl+0xefc/0x2ca0 [ 296.821176] ? security_file_ioctl+0x92/0x200 [ 296.825741] __se_sys_ioctl+0x1da/0x270 [ 296.829766] __x64_sys_ioctl+0x4a/0x70 [ 296.833683] do_syscall_64+0xcf/0x110 [ 296.837519] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.842730] RIP: 0033:0x457569 [ 296.845949] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.864887] RSP: 002b:00007fd142ea9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.872633] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 296.879920] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 296.887216] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 296.894517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd142eaa6d4 [ 296.901806] R13: 00000000004c034e R14: 00000000004d0d60 R15: 00000000ffffffff [ 296.909113] [ 296.910754] Local variable description: ----clock_pairing.i@kvm_emulate_hypercall [ 296.918380] Variable was created at: [ 296.922138] kvm_emulate_hypercall+0x62/0x1ac0 [ 296.926764] handle_vmcall+0x41/0x50 [ 296.930499] [ 296.932162] Bytes 28-63 of 64 are uninitialized [ 296.936848] Memory access of size 64 starts at ffff88812700f3c0 [ 296.942923] Data copied to user address 0000000020000000 [ 296.948382] ================================================================== [ 296.955746] Disabling lock debugging due to kernel taint [ 296.961202] Kernel panic - not syncing: panic_on_warn set ... [ 296.967119] CPU: 1 PID: 7758 Comm: syz-executor1 Tainted: G B 4.20.0-rc3+ #102 [ 296.975799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.985163] Call Trace: [ 296.987773] dump_stack+0x32d/0x480 [ 296.991456] panic+0x624/0xc08 [ 296.994757] kmsan_report+0x28a/0x290 [ 296.998637] kmsan_internal_check_memory+0x9ce/0xa50 [ 297.003796] kmsan_copy_to_user+0x78/0xd0 [ 297.007995] kvm_write_guest_page+0x373/0x500 [ 297.012535] kvm_write_guest+0x1e1/0x360 [ 297.016646] kvm_emulate_hypercall+0x19c9/0x1ac0 [ 297.021485] handle_vmcall+0x41/0x50 [ 297.025238] ? handle_rdpmc+0x80/0x80 [ 297.029065] vmx_handle_exit+0x21bd/0xb980 [ 297.033331] ? vmalloc_to_page+0x585/0x6c0 [ 297.037617] ? kmsan_get_shadow_origin_ptr+0x142/0x410 [ 297.042936] ? vmx_flush_tlb_gva+0x480/0x480 [ 297.047376] kvm_arch_vcpu_ioctl_run+0xaeee/0x12040 [ 297.052527] ? __update_load_avg_cfs_rq+0x105/0x10b0 [ 297.057725] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 297.063119] ? update_load_avg+0x12ae/0x1db0 [ 297.067622] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 297.073030] ? __msan_get_context_state+0x9/0x20 [ 297.077815] ? INIT_BOOL+0xc/0x30 [ 297.081296] ? mutex_lock_killable+0x2f7/0x450 [ 297.085960] kvm_vcpu_ioctl+0xfe4/0x1cc0 [ 297.090104] ? do_vfs_ioctl+0x184/0x2ca0 [ 297.094200] ? kvm_vm_release+0x90/0x90 [ 297.098194] do_vfs_ioctl+0xefc/0x2ca0 [ 297.102133] ? security_file_ioctl+0x92/0x200 [ 297.106673] __se_sys_ioctl+0x1da/0x270 [ 297.110693] __x64_sys_ioctl+0x4a/0x70 [ 297.114613] do_syscall_64+0xcf/0x110 [ 297.118441] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.123659] RIP: 0033:0x457569 [ 297.126880] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.146340] RSP: 002b:00007fd142ea9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.154142] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 297.161424] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 297.168728] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 297.176030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd142eaa6d4 [ 297.183319] R13: 00000000004c034e R14: 00000000004d0d60 R15: 00000000ffffffff [ 297.191606] Kernel Offset: disabled [ 297.195243] Rebooting in 86400 seconds..