[ 59.850905] audit: type=1800 audit(1539263252.881:27): pid=6148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 61.365781] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 63.318478] random: sshd: uninitialized urandom read (32 bytes read) [ 63.735435] random: sshd: uninitialized urandom read (32 bytes read) [ 66.127521] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.18' (ECDSA) to the list of known hosts. [ 71.980959] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 13:07:47 fuzzer started [ 76.707332] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 13:07:52 dialing manager at 10.128.0.26:39089 2018/10/11 13:07:52 syscalls: 1 2018/10/11 13:07:52 code coverage: enabled 2018/10/11 13:07:52 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 13:07:52 setuid sandbox: enabled 2018/10/11 13:07:52 namespace sandbox: enabled 2018/10/11 13:07:52 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 13:07:52 fault injection: enabled 2018/10/11 13:07:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 13:07:52 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 13:07:52 net device setup: enabled [ 81.592667] random: crng init done 13:09:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) unlink(&(0x7f0000000000)='./file0\x00') get_thread_area(&(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) [ 205.182706] IPVS: ftp: loaded support on port[0] = 21 [ 206.560422] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.567047] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.575844] device bridge_slave_0 entered promiscuous mode [ 206.722653] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.729154] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.738048] device bridge_slave_1 entered promiscuous mode [ 206.880534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.023237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.462939] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.615260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.333751] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.342140] team0: Port device team_slave_0 added 13:10:01 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000240)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086610, &(0x7f0000000040)={0x7ff00}) [ 208.483074] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.491084] team0: Port device team_slave_1 added [ 208.769125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.007317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.015065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.024254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.216424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.224154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.233443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.338200] IPVS: ftp: loaded support on port[0] = 21 [ 209.476980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.484748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.494020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.500476] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.507126] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.515783] device bridge_slave_0 entered promiscuous mode [ 211.750681] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.757335] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.766003] device bridge_slave_1 entered promiscuous mode [ 211.966018] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.972620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.979586] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.986193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.995294] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.008737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.185870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.502245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.833432] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.028278] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.247669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.256462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.178536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.186977] team0: Port device team_slave_0 added 13:10:07 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@mcast2={0xff, 0x2, [0x0, 0x1000000]}, 0x0, 0x0, 0x40000000000ff, 0x1}, 0x20) [ 214.446286] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.454742] team0: Port device team_slave_1 added [ 214.780634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.787999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.797176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.082237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.089332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.098333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.410874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.418677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.427995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.640274] IPVS: ftp: loaded support on port[0] = 21 [ 215.745874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.753666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.763085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.440592] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.447266] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.455941] device bridge_slave_0 entered promiscuous mode [ 218.824987] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.831590] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.840435] device bridge_slave_1 entered promiscuous mode [ 219.013607] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.020092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.027215] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.033758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.042874] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.088168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.417799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.023540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.193159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.477908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.779699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.787000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.088769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.096163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.979717] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.988439] team0: Port device team_slave_0 added 13:10:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], [], [], []]}, 0x458) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000080), 0x23e) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 222.206719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.215060] team0: Port device team_slave_1 added [ 222.511705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.518940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.527992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.896825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.904179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.913252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.262967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.270578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.279878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.600383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.608188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.617442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.916410] IPVS: ftp: loaded support on port[0] = 21 [ 224.088476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.450287] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.721623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.728166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.736328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.342934] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.349428] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.358088] device bridge_slave_0 entered promiscuous mode [ 227.662895] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.669386] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.678099] device bridge_slave_1 entered promiscuous mode [ 227.701466] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.708011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.715077] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.721540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.730471] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.974029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.160349] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.277543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.582337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.434895] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.785181] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.196341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.203599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.614575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.621670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.702401] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.710567] team0: Port device team_slave_0 added [ 232.052541] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.060766] team0: Port device team_slave_1 added [ 232.501099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.508777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.518004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.859695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 232.867029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.876188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 13:10:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) accept(r0, 0x0, &(0x7f0000000100)=0xf8) [ 233.266715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.274906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.284149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.448310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.689561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.697366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.707110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.823618] IPVS: ftp: loaded support on port[0] = 21 [ 235.075854] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.629825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.636385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.644676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:10:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x4b33, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) recvmmsg(r1, &(0x7f00000052c0)=[{{0x0, 0x2e, &(0x7f00000002c0)}}], 0x1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x0, &(0x7f0000002fe8)}, 0x10) 13:10:31 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000240)) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x55f5, 0x0, 0xfffffffffffffffe}, 0x14) r3 = dup(r0) write$P9_RWSTAT(r3, &(0x7f0000000280)={0x7, 0x7f, 0x1}, 0x7) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)={'mangle\x00', 0x8, "6aa861433e61bb80"}, &(0x7f0000000180)=0x2c) [ 238.405086] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.707511] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.714131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.721093] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.727677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.736366] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.743969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 13:10:31 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) unshare(0x2000400) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x44ed, 0x80) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)=0x2) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080)="90", 0x1) 13:10:32 executing program 0: r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000005fd4)=ANY=[], 0x0, 0x0, &(0x7f0000012fc7)}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl(r1, 0x1, &(0x7f00000000c0)="15411501a68dd25d7660703eed6d52239568b3b967db02286b355f9bffa7e69a6982277fa3177b19922d13550f9498d37b310500000000000000392596be4e5fd95ce5b72c") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000100)}) [ 239.276038] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.282629] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.291150] device bridge_slave_0 entered promiscuous mode [ 239.456724] binder: 7005:7008 BC_DEAD_BINDER_DONE 0000000000000000 not found 13:10:32 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000400)="6e65742fc6d5a287c383fa16") clone(0x12102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x40086604, 0xfffffffffffffffd) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8000, &(0x7f0000000000)=0x1, 0x7, 0x6) [ 239.794214] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.800686] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.809395] device bridge_slave_1 entered promiscuous mode 13:10:33 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x8, [0xff, 0x0, 0xa2, 0x7, 0x1, 0x3, 0x9, 0x0]}, 0x14) poll(&(0x7f00000002c0)=[{r0}], 0x1, 0x80c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f0000000000)) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000000)={[0x110001, 0x7000, 0x17003], 0x100, 0x40, 0x8c72}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x7ba, 0x6, 0x1, 0x1, 0x80000000}) [ 240.295462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 240.714746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 13:10:33 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x40200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x1, 0x2, 0x202, 0x80, 0x3, 0x1ff, 0x5b, 0x3, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="0500e3ff04800200010000000002"], 0x12) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000040)=[r3, 0xee01]) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000300)=""/35) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) setfsgid(r4) getpriority(0x1, r0) r5 = socket$inet6(0xa, 0x3, 0xff) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000001c0)=0x14, 0x4) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write(r5, &(0x7f0000000080)="e6611de385ac9d6ba486aa1c7b2a57a08a744e52e3aee59ad8596eb0bc486087a195493c67c2ad42", 0x28) 13:10:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") lseek(r0, 0x23, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f00000000c0)=@v2, 0x14, 0x3) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1002, 0x4801) [ 242.015560] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.364512] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.709306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 242.716528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.058515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 243.065885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.156691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.165381] team0: Port device team_slave_0 added [ 244.603471] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.611759] team0: Port device team_slave_1 added [ 244.642046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.046204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 245.053909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.062915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.456411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 245.463715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.472726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.853682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.861449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.870562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.959095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.085183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 246.093023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.101886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.107976] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.114565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.122634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:10:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT2(r1, 0xc208ae62, &(0x7f00000001c0)={[{0x5}]}) [ 247.471748] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 248.297585] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.076977] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.083557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.090543] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.097124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.105686] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.112393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.672135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.494928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.379081] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.385631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.393671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:10:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 254.161617] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.610496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.195386] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 257.679786] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.686353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.694311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:10:50 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "6c48706adb53c9b8cece98acaf634e3959c875d8029a368864a52590c29bcfb3da32910b3bf6fc49d49f4efa95cabe2385a640bbabaf308c0c1667b171d963c961c51d9d130bc83d1e9042aef7fdf111"}, 0xd8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) [ 258.181631] 8021q: adding VLAN 0 to HW filter on device team0 13:10:53 executing program 4: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x10000) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x0, {0x1}}, 0x18) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 13:10:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x800) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x1a}, 0x4b}}, 0x3, 0x47}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000380)={r2, 0x3}, 0x8) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x100, 0x0) accept$inet6(r4, 0x0, &(0x7f0000000200)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x1, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r6, 0x401}, 0x8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) close(r5) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) close(r3) 13:10:53 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) socketpair$inet(0x2, 0x805, 0xc5, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001340)=@filter={'filter\x00', 0xe, 0x4, 0x348, 0x0, 0x120, 0x0, 0x0, 0x120, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x4, &(0x7f0000001300), {[{{@ip={@multicast1, @remote, 0xffffff00, 0x0, 'tunl0\x00', 'syz_tun\x00', {}, {}, 0x3b, 0x0, 0x51}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xe, 0xffff, 0x37, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x0, 0x0, [0x12, 0xa, 0x2a, 0x15, 0xf, 0x13, 0x22, 0x12, 0x3d, 0xf, 0xe, 0x27, 0x1c, 0x22, 0x7, 0x1], 0x1, 0xa26d, 0x8e}}}, {{@ip={@remote, @loopback, 0x0, 0xff000000, 'ifb0\x00', 'bridge0\x00', {}, {}, 0x5f, 0x2, 0x8}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}, {{@ip={@rand_addr=0x7, @broadcast, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'dummy0\x00', {0xff}, {}, 0x1, 0x2, 0x3}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xfffffffeffffffff, 0x7, 0x2}, {0x6, 0x5, 0x6}, {0x3, 0x200, 0x81}, 0x3325, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) r3 = syz_open_dev$usb(&(0x7f0000001700)='/dev/bus/usb/00#/00#\x00', 0x9, 0x2001) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000001740)) getsockopt$inet_buf(r3, 0x0, 0x27, &(0x7f0000001800)=""/232, &(0x7f0000001900)=0xe8) getsockopt$netlink(r3, 0x10e, 0x1, &(0x7f0000001940)=""/100, &(0x7f00000019c0)=0x64) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000001a00)={'nat\x00'}, &(0x7f0000001a80)=0x78) getsockopt$netlink(r3, 0x10e, 0x7, &(0x7f0000001ac0)=""/39, &(0x7f0000001b00)=0x27) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000001b80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001b40)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000001bc0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x2, @local, 0xfffffffffffffff9}, {0xa, 0x4e24, 0x4, @empty, 0x9}, r4, 0x8}}, 0x48) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000001c40)=0x7) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001c80)=0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/ppp\x00', 0x101000, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001d40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000001f00)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001d80)={0x120, r6, 0x10, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9d7}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_SERVICE={0x6c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xf33150c58d59bb2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xb3e8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xf92b}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x974}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x35280000000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf9e}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4800}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000001f80)={0x4004, &(0x7f0000001f40), 0x7, r3, 0x3}) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000001fc0)=0x500, 0x4) bind$bt_rfcomm(r3, &(0x7f0000002000)={0x1f, {0x3, 0x9, 0x10000, 0x3f, 0x8001, 0x1}, 0x2}, 0xa) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000002080)="7d308a3103b5c9ecd7c16cb5d1263b1102b018944de7cb52a9c387402435635c0688e7d398d395d4324292845e32f0006501592234c83eb18f6c5faaf696eff4fb70634047166d93df9fbf6a7145005ae753498e8aeb05e6ec1c353b13889f6aeb526e05e11bb00f508c2ff72ac3f972a471b2ff4c034f35add5e6da6692729b23f164067144a21b01855d42d29f787932b996585c1cfa372a", 0x99) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000002140)='trusted.overlay.nlink\x00', &(0x7f0000002180)={'L-', 0x5}, 0x28, 0x2) r8 = semget$private(0x0, 0x2, 0x4) semctl$IPC_STAT(r8, 0x0, 0x2, &(0x7f00000021c0)=""/228) ioctl$PPPIOCGCHAN(r7, 0x80047437, &(0x7f00000022c0)) ioctl$UI_SET_RELBIT(r7, 0x40045566, 0x9) ioctl$SG_GET_REQUEST_TABLE(r7, 0x2286, &(0x7f0000002300)) 13:10:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) r2 = socket$inet6(0xa, 0x803, 0x800000003) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) accept(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000240)=0xfffffffffffffedf) 13:10:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:10:53 executing program 2: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) [ 260.434936] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:10:53 executing program 3: 13:10:53 executing program 2: 13:10:53 executing program 0: 13:10:53 executing program 4: 13:10:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) r2 = socket$inet6(0xa, 0x803, 0x800000003) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) accept(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000240)=0xfffffffffffffedf) 13:10:54 executing program 2: 13:10:54 executing program 3: 13:10:54 executing program 0: [ 261.349016] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 261.926290] IPVS: ftp: loaded support on port[0] = 21 [ 262.673823] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.680237] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.688998] device bridge_slave_0 entered promiscuous mode [ 262.768625] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.775143] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.783413] device bridge_slave_1 entered promiscuous mode [ 262.859723] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.936790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.180091] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.263105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.345335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 263.352537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.431075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.438170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.676961] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.685291] team0: Port device team_slave_0 added [ 263.764174] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 263.771784] team0: Port device team_slave_1 added [ 263.854104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.937301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.018124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.025951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.035288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.113930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.121253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.130655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.009949] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.016465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.023499] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.029909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.038368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.322300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.171102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.468573] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 268.764963] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 268.771239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.779473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.070324] 8021q: adding VLAN 0 to HW filter on device team0 13:11:04 executing program 5: 13:11:04 executing program 4: 13:11:04 executing program 2: 13:11:04 executing program 1: 13:11:04 executing program 3: 13:11:04 executing program 0: 13:11:04 executing program 2: 13:11:04 executing program 3: 13:11:04 executing program 4: 13:11:04 executing program 1: 13:11:04 executing program 5: 13:11:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000180)="0fb7babc0a0f01d1f30f0d11640f01c966b8001800000f23c80f21f866350400a0000f23f866b99000004066b80000000066ba000000000f30baf80c66b824f8528366efbafc0ced0fa54f0166b8007000000f23d80f21f86635c00000400f23f80f01cb", 0x64}], 0x1, 0x24, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:11:04 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x3c, 0x0, {"f6f54dd3a013dcf6b9b12979d2ee0aeef1ac0dcbe26400335f1f18efa829890f388f4073"}}}, &(0x7f0000000840)=""/164, 0x3e, 0xa4}, 0x20) socketpair(0x8, 0x80a, 0x9, &(0x7f0000000000)) recvmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000500)=@hci, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000580)=""/246, 0xf6}, {&(0x7f0000000680)=""/176, 0xb0}, {&(0x7f0000000a00)=""/107, 0x6b}, {&(0x7f0000000a80)=""/218, 0xda}, {&(0x7f0000000b80)=""/255, 0xff}], 0x5, 0x0, 0x0, 0x80000004}, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/208, 0xd0}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000140)=""/19, 0x13}], 0x3, &(0x7f0000000400)=""/134, 0x86, 0x9}, 0x20) 13:11:04 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ff7f00000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:11:04 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x20000008912, &(0x7f0000000ac0)="153f6234488dd25d766070") socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000140), 0x2d6, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x70}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f00000001c0), &(0x7f0000000140), 0x2}, 0x20) 13:11:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200f000fe100f000ee1000c08001800a000a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) 13:11:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="cc0f99a8f972"], 0x6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000002c0)="66b99408000066b81e111ee366ba25b5a6000f303681950d00918e66b80b0000000f23c80f21f86635080060000f23f83e0f009125000f381ee594360f320f019dfc32f20f01c98395008800", 0x4c}], 0x1, 0x57, &(0x7f0000000100), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 272.205692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 272.281989] ================================================================== [ 272.289454] BUG: KMSAN: uninit-value in vmx_handle_external_intr+0x244/0x280 [ 272.296680] CPU: 0 PID: 7908 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #66 [ 272.303897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.313408] Call Trace: [ 272.316040] dump_stack+0x306/0x460 [ 272.319831] ? _raw_spin_lock_irqsave+0x227/0x340 [ 272.324711] ? vmx_handle_external_intr+0x244/0x280 13:11:05 executing program 2: [ 272.329785] kmsan_report+0x1a2/0x2e0 [ 272.333670] __msan_warning+0x7c/0xe0 [ 272.337522] vmx_handle_external_intr+0x244/0x280 [ 272.342405] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 272.347853] ? free_kvm_area+0x250/0x250 [ 272.351970] kvm_arch_vcpu_ioctl_run+0x9d7a/0x10a20 [ 272.357190] ? task_kmsan_context_state+0x6b/0x120 [ 272.362178] ? __msan_get_context_state+0x9/0x30 [ 272.367006] ? INIT_INT+0xc/0x30 [ 272.370415] ? task_kmsan_context_state+0x6b/0x120 [ 272.375415] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 272.380925] ? kmsan_set_origin_inline+0x6b/0x120 [ 272.385844] ? __msan_poison_alloca+0x17a/0x210 [ 272.390570] ? put_pid+0x71/0x410 [ 272.394067] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 272.398444] ? put_pid+0x1a9/0x410 [ 272.402026] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 272.407436] ? get_task_pid+0x17b/0x270 [ 272.411457] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 272.415665] ? do_vfs_ioctl+0x18a/0x2810 [ 272.419762] ? __se_sys_ioctl+0x1da/0x270 [ 272.423986] ? kvm_vm_release+0x90/0x90 [ 272.428006] do_vfs_ioctl+0xcf3/0x2810 [ 272.431965] ? security_file_ioctl+0x92/0x200 [ 272.436529] __se_sys_ioctl+0x1da/0x270 [ 272.440567] __x64_sys_ioctl+0x4a/0x70 [ 272.444504] do_syscall_64+0xbe/0x100 [ 272.448358] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.453587] RIP: 0033:0x457519 [ 272.456858] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.475829] RSP: 002b:00007f7f4b059c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.483600] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 272.490908] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 272.498211] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 272.505515] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4b05a6d4 [ 272.512841] R13: 00000000004bffda R14: 00000000004d00a8 R15: 00000000ffffffff [ 272.520246] [ 272.521924] Uninit was stored to memory at: [ 272.526320] kmsan_internal_chain_origin+0x136/0x240 13:11:05 executing program 2: [ 272.531466] __msan_chain_origin+0x75/0xd0 [ 272.535747] vmx_set_constant_host_state+0xf1a/0x1830 [ 272.540981] vmx_create_vcpu+0x3e6f/0x7870 [ 272.545252] kvm_arch_vcpu_create+0x25d/0x2f0 [ 272.549789] kvm_vm_ioctl+0x13fd/0x33d0 [ 272.553867] do_vfs_ioctl+0xcf3/0x2810 [ 272.557791] __se_sys_ioctl+0x1da/0x270 [ 272.561917] __x64_sys_ioctl+0x4a/0x70 [ 272.565870] do_syscall_64+0xbe/0x100 [ 272.569716] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.574935] [ 272.576591] Local variable description: ----dt@vmx_set_constant_host_state [ 272.583632] Variable was created at: [ 272.587394] vmx_set_constant_host_state+0x2b0/0x1830 [ 272.592628] vmx_create_vcpu+0x3e6f/0x7870 [ 272.596887] ================================================================== [ 272.604270] Disabling lock debugging due to kernel taint [ 272.609757] Kernel panic - not syncing: panic_on_warn set ... [ 272.609757] [ 272.617203] CPU: 0 PID: 7908 Comm: syz-executor5 Tainted: G B 4.19.0-rc4+ #66 [ 272.625835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.635215] Call Trace: [ 272.637874] dump_stack+0x306/0x460 [ 272.641562] panic+0x54c/0xafa [ 272.644876] kmsan_report+0x2d3/0x2e0 [ 272.648732] __msan_warning+0x7c/0xe0 [ 272.652581] vmx_handle_external_intr+0x244/0x280 [ 272.657458] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 272.662880] ? free_kvm_area+0x250/0x250 [ 272.666980] kvm_arch_vcpu_ioctl_run+0x9d7a/0x10a20 [ 272.672264] ? task_kmsan_context_state+0x6b/0x120 [ 272.677239] ? __msan_get_context_state+0x9/0x30 [ 272.682031] ? INIT_INT+0xc/0x30 [ 272.685438] ? task_kmsan_context_state+0x6b/0x120 [ 272.690412] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 272.695908] ? kmsan_set_origin_inline+0x6b/0x120 [ 272.700829] ? __msan_poison_alloca+0x17a/0x210 [ 272.705553] ? put_pid+0x71/0x410 [ 272.709043] ? kvm_vcpu_ioctl+0x20a4/0x20b0 [ 272.713413] ? put_pid+0x1a9/0x410 [ 272.716993] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 272.722396] ? get_task_pid+0x17b/0x270 [ 272.726424] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 272.730636] ? do_vfs_ioctl+0x18a/0x2810 [ 272.734735] ? __se_sys_ioctl+0x1da/0x270 [ 272.738931] ? kvm_vm_release+0x90/0x90 [ 272.742948] do_vfs_ioctl+0xcf3/0x2810 [ 272.746893] ? security_file_ioctl+0x92/0x200 [ 272.751439] __se_sys_ioctl+0x1da/0x270 [ 272.755478] __x64_sys_ioctl+0x4a/0x70 [ 272.759407] do_syscall_64+0xbe/0x100 [ 272.763252] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.768473] RIP: 0033:0x457519 13:11:05 executing program 2: [ 272.771695] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.790635] RSP: 002b:00007f7f4b059c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.798479] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 272.805778] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 272.813111] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 272.820414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4b05a6d4 [ 272.827725] R13: 00000000004bffda R14: 00000000004d00a8 R15: 00000000ffffffff [ 272.836450] Kernel Offset: disabled [ 272.840172] Rebooting in 86400 seconds..