[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 57.544485] sshd (6140) used greatest stack depth: 53184 bytes left [....] Starting OpenBSD Secure Shell server: sshd[ 57.753929] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 58.560327] random: sshd: uninitialized urandom read (32 bytes read) [ 58.986653] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.153996] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. [ 67.508739] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/05 23:08:06 fuzzer started [ 72.153917] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/05 23:08:11 dialing manager at 10.128.0.26:36867 2018/10/05 23:08:11 syscalls: 1 2018/10/05 23:08:11 code coverage: enabled 2018/10/05 23:08:11 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/05 23:08:11 setuid sandbox: enabled 2018/10/05 23:08:11 namespace sandbox: enabled 2018/10/05 23:08:11 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/05 23:08:11 fault injection: enabled 2018/10/05 23:08:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/05 23:08:11 net packed injection: enabled 2018/10/05 23:08:11 net device setup: enabled [ 77.107969] random: crng init done 23:10:17 executing program 0: [ 201.062890] IPVS: ftp: loaded support on port[0] = 21 [ 203.412377] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.418860] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.427832] device bridge_slave_0 entered promiscuous mode [ 203.571102] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.577654] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.586196] device bridge_slave_1 entered promiscuous mode [ 203.723585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.863901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:10:21 executing program 1: [ 204.589567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.625945] IPVS: ftp: loaded support on port[0] = 21 [ 204.861173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.164748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.172019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.402914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.409925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.057299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.065506] team0: Port device team_slave_0 added [ 206.239547] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.247851] team0: Port device team_slave_1 added [ 206.494421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.528365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.537226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.738692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.025231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.032976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.042308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.305332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.313134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.322364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.102948] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.109510] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.118056] device bridge_slave_0 entered promiscuous mode [ 208.305153] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.312064] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.321133] device bridge_slave_1 entered promiscuous mode [ 208.614307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.905697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:10:26 executing program 2: [ 209.692085] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.999315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.226384] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.232955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.239900] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.246507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.255453] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.281899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.288959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.409751] IPVS: ftp: loaded support on port[0] = 21 [ 210.593699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.600771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.942092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.269552] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.277700] team0: Port device team_slave_0 added [ 211.556973] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.565218] team0: Port device team_slave_1 added [ 211.788824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.797774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.806895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.032620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.039653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.048600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.306578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.314342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.323493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.617421] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.625557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.634601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.384448] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.390945] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.399656] device bridge_slave_0 entered promiscuous mode [ 215.744394] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.750865] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.759450] device bridge_slave_1 entered promiscuous mode [ 215.826849] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.833422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.840329] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.846928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.855670] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.992239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.093252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.308463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.172586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.477430] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:10:34 executing program 3: [ 217.815229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.822518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.174017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.181070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.873020] ip (6566) used greatest stack depth: 53040 bytes left [ 218.929921] IPVS: ftp: loaded support on port[0] = 21 [ 219.208711] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.216830] team0: Port device team_slave_0 added [ 219.608082] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.616357] team0: Port device team_slave_1 added [ 220.001007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.008183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.017668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.307524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.314706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.323662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.630152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.637999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.647229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.986387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.994187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.003294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.349269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.624752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.039553] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.046095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.053081] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.059532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.069033] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.093194] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.099630] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.108259] device bridge_slave_0 entered promiscuous mode [ 225.291944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.508911] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.515479] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.524023] device bridge_slave_1 entered promiscuous mode [ 225.894811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.091300] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.097824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.106198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.286962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.391953] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.509798] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.748233] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.059728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.066879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.416117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.423377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:10:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000040), 0x14) [ 229.688617] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.696797] team0: Port device team_slave_0 added [ 230.196537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.204748] team0: Port device team_slave_1 added [ 230.267879] IPVS: ftp: loaded support on port[0] = 21 [ 230.574038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.706262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.713412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.722332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.216895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.224115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.233181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.655586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.663424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.672670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.072173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.079801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.088840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.223473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.834607] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.840997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.848933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.424175] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.022350] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.028850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.035861] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.042407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.051076] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.215358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.331141] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.337877] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.346292] device bridge_slave_0 entered promiscuous mode 23:10:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f000000a880)="153f6234488dd25d766070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 237.797060] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.803835] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.812409] device bridge_slave_1 entered promiscuous mode 23:10:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x2000000004) write(r1, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40ec58d070054dc17fbffff0100002a00f3ff09", 0x29) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x410000) ioctl$KVM_NMI(r2, 0xae9a) [ 238.261015] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 23:10:55 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x5, 0xfffffffffffff581, 0x4, 0x6f, 0x0, 0x0, 0x0, 0x5, 0x48, 0x4, 0x3, 0x8, 0x99c8, 0x1ff, 0x8, 0xa8b6, 0x10000000000, 0x7f, 0x7fffffff, 0x8000, 0x3f, 0x99, 0x6fd, 0x8, 0x41a, 0x401, 0x0, 0x7ff, 0x0, 0x80000000, 0x7f7000000000000, 0x3, 0x7, 0xf0, 0x101, 0xcd, 0x0, 0x2000, 0x3, @perf_config_ext={0xff, 0x80000000}, 0x1, 0x80000000, 0x400, 0x7, 0x4, 0x8, 0x80000000}, r0, 0x10, r1, 0x9) r2 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = dup2(r3, r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r4, &(0x7f0000000300)={0xa0, 0x19, 0x1, {0x102, {0x0, 0x4, 0x3}, 0x80, r5, r6, 0x9, 0x7fffffff, 0x400, 0x3, 0x0, 0xc0e5, 0x7f, 0x5, 0x1, 0x4, 0xfffffffffffffff7, 0xfffffffffffffff7, 0x0, 0x7, 0x5}}, 0xa0) sendmsg$nl_generic(r3, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) [ 238.745915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 23:10:56 executing program 0: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') pread64(r0, &(0x7f0000000200), 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/131, 0x83}, {&(0x7f00000002c0)=""/124, 0x7c}], 0x2, &(0x7f0000000380)=""/235, 0xeb, 0x101}, 0x122) lseek(r0, 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/160, 0xa0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x0, 0x0, 0x10001, 0x0, 0x40}) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 23:10:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) userfaultfd(0x80000) close(r1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) write$P9_RCLUNK(r1, &(0x7f0000000040)={0xfffffffffffffe2a, 0x79, 0x5}, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) [ 240.176382] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.686194] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:10:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000000)=""/49) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) prctl$setendian(0x14, 0x0) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000580), 0x8) [ 241.066538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.073758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.405883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.413131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.647724] 8021q: adding VLAN 0 to HW filter on device bond0 23:10:58 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x100000001, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x401, 0x3}, 'port0\x00', 0x10, 0x130402, 0x9, 0x4, 0x4, 0x8, 0x101, 0x0, 0x5, 0x2}) r1 = semget(0x1, 0x1, 0x20) semctl$GETVAL(r1, 0x4, 0xc, &(0x7f0000000140)=""/112) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000001c0)={0x3, 0xffffffffffff7fff}) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000200)={{0x2000, 0x3000, 0xd, 0x5, 0x0, 0x4, 0x7, 0x916, 0x9, 0x100000001, 0xc0000000, 0x5}, {0x107000, 0x7000, 0xb, 0x200, 0x7, 0x200, 0x0, 0x7, 0x9a, 0x6dd, 0x1000, 0x353}, {0x0, 0xd000, 0xf, 0x9, 0xffffffff, 0x7, 0x9, 0x6, 0x9, 0x0, 0xb3f9, 0xfffffffffffffffe}, {0xf004, 0xf004, 0x1f, 0x2, 0x4, 0xfffffffffffffffc, 0xffff, 0x9, 0x6, 0x7, 0x5, 0x5}, {0x106000, 0xf000, 0x0, 0x400, 0x0, 0x784, 0x7, 0x1f, 0xfff, 0x3, 0x4, 0x9b}, {0x10000, 0x1000, 0xb, 0x400, 0x3def, 0x2, 0xcb, 0x7fffffff, 0x7d4, 0x101, 0x2, 0x7}, {0xd000, 0x4000, 0x0, 0xd0d, 0x5, 0x80000001, 0x401, 0x7f, 0x1, 0xac, 0x6, 0x8}, {0x10000, 0x100000, 0xf, 0x6, 0x80, 0x6, 0x7, 0x786, 0xf00, 0x4, 0x5, 0xfffffffffffffffa}, {0x5000, 0x6}, {0x10004, 0x5000}, 0x20, 0x0, 0x6000, 0x4040, 0xb, 0x4000, 0x100000, [0x3, 0x9, 0x2383, 0x8]}) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000340)=0x3, &(0x7f0000000380)=0x4) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) accept$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000540)={@local, @multicast1, r4}, 0xc) bind$vsock_dgram(r3, &(0x7f0000000580)={0x28, 0x0, 0x2711}, 0x10) ioctl$KDADDIO(r3, 0x4b34, 0xfffffffffffffffd) r5 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000600)={0x0, 0x10, &(0x7f00000005c0)=[@in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000000640)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000680)={r6, 0x5, 0x1000, 0xc94e}, 0x10) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f00000006c0)={0x8001, {{0xa, 0x4e23, 0x6, @ipv4={[], [], @broadcast}, 0x1}}, {{0xa, 0x4e22, 0xffff, @loopback, 0xe6}}}, 0x108) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000800), &(0x7f0000000840)=0x4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000880)={r6, 0x2}, 0x8) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000900)={0x1, &(0x7f00000008c0)=[{0x3, 0x1ff, 0x453, 0x3}]}) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000940)={0x101, 0x4}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000980), &(0x7f00000009c0)=0x4) write$P9_RLOCK(r3, &(0x7f0000000a00)={0x8, 0x35, 0x1}, 0x8) ioctl$RTC_VL_CLR(r3, 0x7014) r7 = msgget$private(0x0, 0x40) msgrcv(r7, &(0x7f0000000a40)={0x0, ""/219}, 0xe3, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000b40)=@assoc_value, &(0x7f0000000b80)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000bc0)={0x9, 0x8, 0x6, 0x7}, 0x8) listen(r0, 0x101) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000c00)=0xff00000000000000, 0x4) 23:10:59 executing program 0: r0 = getpid() capset(&(0x7f00000003c0)={0x20080522, r0}, &(0x7f0000000400)={0xe609, 0xfffffffffffff026, 0x0, 0x4, 0x1, 0x5}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'ip6gre0\x00', 0x400}) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xff49) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0x1, 0x5, 0x7fffffff, @broadcast, 'veth0_to_bond\x00'}) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000540), 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000580)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000140)) syz_open_pts(r2, 0x0) close(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000880)=0xe8) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000500)={0x1, 0x6}) [ 242.337283] hrtimer: interrupt took 66580 ns [ 242.623169] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.631228] team0: Port device team_slave_0 added [ 243.076758] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.085102] team0: Port device team_slave_1 added [ 243.232900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 243.302704] IPVS: ftp: loaded support on port[0] = 21 [ 243.420092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.427258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.436281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.696492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.703872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.712756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.085622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.093500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.102597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.494420] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.502171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.511108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.599567] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.606140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.614228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:11:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x101) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x4, 0x0, 0x40}}, 0x40) [ 246.082615] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.035723] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.042284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.049191] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.055763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.064185] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.292048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.553509] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.559987] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.568513] device bridge_slave_0 entered promiscuous mode [ 248.802421] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.808908] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.817632] device bridge_slave_1 entered promiscuous mode [ 249.015122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 249.250852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.251360] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.538675] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.804321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 250.811507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.039611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.046931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.885214] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.893402] team0: Port device team_slave_0 added [ 252.089646] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.097894] team0: Port device team_slave_1 added [ 252.352119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.364305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.373486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.478181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.687867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.695205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.704311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.080644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.088500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.097816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 23:11:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x84) [ 253.463222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.507743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.515427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.524431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.401858] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.408225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.416178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.329334] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.817777] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.824331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.831273] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.837842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.846293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.854858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.483974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.332227] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.083557] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.089918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.097822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:11:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) [ 260.960449] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.723739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.342820] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 23:11:21 executing program 4: socket$inet(0x2, 0x3, 0x2) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@random="b100485caa2a", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000140)) 23:11:21 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @local}, {}, {}, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000002c0)='eql\x00'}) 23:11:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/243, 0xf3}], 0x1, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 23:11:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") ioprio_get$uid(0x3, 0x0) 23:11:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2, {0x0, 0x0, 0x1000000000000}}, 0x90) [ 265.009263] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.015780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.023775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:11:22 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@mpls_getnetconf={0x14, 0x52, 0x868982dd5c21e331}, 0x14}}, 0x0) [ 265.919260] 8021q: adding VLAN 0 to HW filter on device team0 23:11:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_adj\x00') ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x1, 0x1, [@local]}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 23:11:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r0, 0x0) futex(&(0x7f0000002ec0), 0x4, 0x0, &(0x7f00000000c0), &(0x7f00000001c0), 0x0) 23:11:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/243, 0xf3}], 0x1, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 23:11:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) read(r1, &(0x7f0000000340)=""/72, 0x48) 23:11:25 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/243, 0xf3}], 0x1, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 23:11:26 executing program 1: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f0000000040)=0x8) 23:11:26 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:26 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000080), 0x8, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) 23:11:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) [ 269.333393] ptrace attach of "/root/syz-executor4"[6830] was attempted by "/root/syz-executor4"[7925] 23:11:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local, [0x0, 0xb00, 0x0, 0x33b]}}) 23:11:26 executing program 1: [ 269.456586] ptrace attach of "/root/syz-executor4"[6830] was attempted by "/root/syz-executor4"[7931] 23:11:26 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:26 executing program 1: 23:11:26 executing program 4: 23:11:27 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_adj\x00') ioctl$KDDISABIO(r0, 0x4b37) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 23:11:27 executing program 2: r0 = getpid() capset(&(0x7f00000003c0)={0x20080522, r0}, &(0x7f0000000400)={0xe609, 0x0, 0x0, 0x4, 0x1, 0x5}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast2, @dev}, &(0x7f00000002c0)=0xc) getsockname(r1, &(0x7f0000000340)=@can, &(0x7f0000000440)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockname$packet(r1, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(r1, &(0x7f00000006c0), &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) getpeername$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000a00)={0x0, @multicast1}, &(0x7f0000000a40)=0xc) accept4$packet(r1, &(0x7f0000000a80)={0x11, 0x0, 0x0}, &(0x7f0000000ac0)=0x14, 0x800) accept4$packet(r1, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003200)={@multicast2, @loopback}, &(0x7f0000003240)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004640)={{}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000004740)=0xe8) getsockname$packet(r1, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004940)={'team_slave_1\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004d00)={&(0x7f0000004980)={0x5c, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000015}, 0x400c801) recvmmsg(r1, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000280)=0x800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'ip6gre0\x00', 0x400}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000180)) rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x5, 0x3ff, 0xc000000, 0x8}, 0x1}, 0xffffffffffffff14, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xff49) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000540), 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000580)) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000140)) syz_open_pts(r5, 0x0) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000880)=0xe8) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000500)={0x1, 0x6}) 23:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:27 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001300)=""/4096, 0x1000) 23:11:27 executing program 3: 23:11:27 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:27 executing program 3: 23:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:28 executing program 1: 23:11:28 executing program 4: 23:11:28 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:28 executing program 3: 23:11:29 executing program 2: r0 = getpid() capset(&(0x7f00000003c0)={0x20080522, r0}, &(0x7f0000000400)={0xe609, 0x0, 0x0, 0x4, 0x1, 0x5}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast2, @dev}, &(0x7f00000002c0)=0xc) getsockname(r1, &(0x7f0000000340)=@can, &(0x7f0000000440)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockname$packet(r1, &(0x7f0000000640), &(0x7f0000000680)=0x14) accept$packet(r1, &(0x7f00000006c0), &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) getpeername$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000a00)={0x0, @multicast1}, &(0x7f0000000a40)=0xc) accept4$packet(r1, &(0x7f0000000a80)={0x11, 0x0, 0x0}, &(0x7f0000000ac0)=0x14, 0x800) accept4$packet(r1, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003200)={@multicast2, @loopback}, &(0x7f0000003240)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000004480)={@loopback}, &(0x7f00000044c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004640)={{}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000004740)=0xe8) getsockname$packet(r1, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004940)={'team_slave_1\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004d00)={&(0x7f0000004980)={0x5c, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000015}, 0x400c801) recvmmsg(r1, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000280)=0x800) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'ip6gre0\x00', 0x400}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000180)) rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x5, 0x3ff, 0xc000000, 0x8}, 0x1}, 0xffffffffffffff14, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xff49) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000540), 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000580)) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000140)) syz_open_pts(r5, 0x0) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000880)=0xe8) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000500)={0x1, 0x6}) 23:11:29 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:29 executing program 4: 23:11:29 executing program 1: 23:11:29 executing program 3: 23:11:29 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:29 executing program 4: 23:11:29 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:29 executing program 1: 23:11:29 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:29 executing program 3: 23:11:29 executing program 4: 23:11:30 executing program 2: 23:11:30 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:30 executing program 1: 23:11:30 executing program 3: 23:11:30 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:30 executing program 2: 23:11:30 executing program 4: 23:11:30 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:30 executing program 1: 23:11:30 executing program 3: 23:11:30 executing program 2: 23:11:30 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:30 executing program 3: 23:11:30 executing program 1: 23:11:31 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:31 executing program 2: 23:11:31 executing program 4: 23:11:31 executing program 1: 23:11:31 executing program 3: 23:11:31 executing program 2: 23:11:31 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:31 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:31 executing program 4: 23:11:31 executing program 3: 23:11:31 executing program 1: 23:11:31 executing program 2: 23:11:32 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:32 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:32 executing program 4: 23:11:32 executing program 3: 23:11:32 executing program 1: 23:11:32 executing program 2: 23:11:32 executing program 4: 23:11:32 executing program 3: 23:11:32 executing program 1: 23:11:32 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:33 executing program 2: 23:11:33 executing program 1: 23:11:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:33 executing program 4: 23:11:33 executing program 3: 23:11:33 executing program 2: 23:11:33 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:33 executing program 1: 23:11:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:33 executing program 4: 23:11:33 executing program 3: 23:11:33 executing program 2: 23:11:34 executing program 1: 23:11:34 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:34 executing program 4: 23:11:34 executing program 3: 23:11:34 executing program 1: 23:11:34 executing program 2: 23:11:34 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:34 executing program 1: 23:11:34 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:34 executing program 3: 23:11:35 executing program 4: creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r0, 0x1, &(0x7f0000001780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}]) 23:11:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffb) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, [0x11]}, 0x2c) 23:11:35 executing program 1: clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) splice(r2, 0x0, r1, 0x0, 0xced1, 0x0) 23:11:35 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:35 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000380)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) 23:11:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000000000/0x3000)=nil, 0x7000) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) 23:11:35 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:35 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[]}}], 0x1, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c1262858e8070") r1 = socket$inet6(0xa, 0x3, 0x9) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 23:11:35 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000380)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) 23:11:36 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x803, 0x0) ioctl(r2, 0x0, &(0x7f0000000000)) r3 = socket$kcm(0x29, 0x805, 0x0) sendfile(r3, r1, &(0x7f0000000040)=0x1, 0x10001) 23:11:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_adj\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 23:11:38 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0xfffffffffffffffc, @empty, 0x1}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local, @link_local={0x12, 0x80, 0xc2, 0x0, 0xe000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x74, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 23:11:38 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:38 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x5, 0x0) close(r1) 23:11:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000380)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) 23:11:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340)="f4", 0x1, 0xfffffffffffffffb) 23:11:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:38 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2, 0x802032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 23:11:38 executing program 0: r0 = socket$inet6(0xa, 0x800000080003, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) 23:11:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x3, 0x20}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/144}, 0xee) 23:11:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) umount2(&(0x7f00000007c0)='./control\x00', 0x6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) gettid() r3 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) r4 = gettid() r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10210}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x78, r5, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x200}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0xc040) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x1) mq_timedreceive(r3, &(0x7f0000000180)=""/210, 0xffffffffffffffa4, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000540)=0xffffffff) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x2, &(0x7f0000000100)=[{0x50}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) getpeername$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c) r6 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="9022e6ca34968e62cb39a36ca2a549a4c0542e443d01f1c8fc2bdb6be66e78d19d095b1769ee543ba63cdbe4f160fbd78fa64c0b40a080ca9a1ed72d2b5c4017202b8086a1a1edf195111a7d376be71fe5562ccad357308daeb370112ec34cd6256a03a10078b6bfef80048d3e", 0x6d, 0x0) keyctl$invalidate(0x15, r6) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000580)={0x0, 0xb8, "69ed888ff536219825da5764d7a6e81329aaebc925233483f7a343cc5171874079e9ca3367aeb3e3dc1b1ed033925443e0d1285b498f9ee21234e69e599f6014b865e2fe453b38f0e19d26202177af795fb0d24414472c8112b768f68bc7b013b18ed044f959d67547a99f465825b8893ee47405bc41e92f10dea0ca873252de90e2e14b2dc26e20d7056e29bed82c436559192f15e559c08fe9e552337480ed1f5fa73c3944d7d5afec8ec2eebfe55c27793dc5b141fa8a"}, &(0x7f0000000640)=0xc0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000700)={r7, 0x48, &(0x7f0000000680)=[@in6={0xa, 0x4e23, 0x7, @local, 0x9}, @in6={0xa, 0x4e20, 0x0, @local, 0x3}, @in={0x2, 0x4e22, @rand_addr=0x9}]}, &(0x7f0000000740)=0x10) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x8001) 23:11:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000540)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x40bc5311, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000015) 23:11:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000f40)=@ethernet={0x0, @random}, 0x264, &(0x7f0000002380), 0x0, &(0x7f0000002400)=""/191, 0xbf}}, {{&(0x7f0000003440)=@l2, 0x80, &(0x7f0000003680), 0x0, &(0x7f00000036c0)=""/64, 0xe}}], 0xf, 0x0, &(0x7f0000003700)={0x77359400}) 23:11:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0xffc99a3b00000000}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) close(r0) close(r1) 23:11:39 executing program 4: getpid() r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 23:11:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) 23:11:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000560e, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) shutdown(r0, 0x1) [ 282.767197] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 23:11:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) [ 282.868313] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 282.894612] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 282.910928] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 23:11:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf542b025", 0x24) 23:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x75, 0x0, [0xc0000102, 0x4000000000000001]}) [ 283.226122] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 23:11:40 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nl=@kern={0x10, 0x7003, 0x6c00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f0d00fe01b2a4a280930a600800ffa84302910000002d00090023000c000b0000000d000500fe8000000000c78b80082314e9030b9d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 23:11:40 executing program 3: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000380), 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240)={{0x0, @remote, 0x0, 0x0, 'fo\x00'}, {@dev}}, 0x44) fstatfs(0xffffffffffffffff, &(0x7f00000003c0)=""/118) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) process_vm_writev(0x0, &(0x7f0000000000), 0x0, &(0x7f0000121000), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001140)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000001c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f34"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:11:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040), 0x8001) [ 283.415390] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. 23:11:40 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x2) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0xf00000000000000, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 283.542386] ================================================================== [ 283.549804] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 283.556313] CPU: 0 PID: 8344 Comm: blkid Not tainted 4.19.0-rc4+ #63 [ 283.562808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.572166] Call Trace: [ 283.574759] [ 283.576935] dump_stack+0x306/0x460 [ 283.580596] ? loaded_vmcs_init+0x343/0x590 [ 283.584959] kmsan_report+0x1a3/0x2d0 [ 283.588788] __msan_warning+0x7c/0xe0 [ 283.592623] loaded_vmcs_init+0x343/0x590 [ 283.596807] __loaded_vmcs_clear+0x2fb/0x3c0 [ 283.601249] flush_smp_call_function_queue+0x404/0x770 [ 283.606564] ? vmx_get_msr_feature+0x180/0x180 [ 283.611186] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 283.617441] smp_call_function_single_interrupt+0x2f7/0x530 [ 283.623183] call_function_single_interrupt+0xf/0x20 [ 283.628291] [ 283.630591] RIP: 0010:__msan_poison_alloca+0x16b/0x210 [ 283.635885] Code: 24 20 be 20 00 48 00 e8 f3 82 bf 02 41 ff 8e 7c 09 00 00 0f 85 98 00 00 00 89 c3 e8 8f cc 36 ff 4c 89 64 24 18 ff 74 24 18 9d <48> 8b 7c 24 08 44 89 fe 89 da e8 66 fd ff ff 65 48 8b 04 25 28 00 [ 283.655300] RSP: 0018:ffff8801ad11fa10 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 283.663030] RAX: 00000000976000ba RBX: 00000000976000ba RCX: ffff8801ad11fa50 [ 283.670311] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000006aad8eb6 [ 283.677599] RBP: ffff8801ad11fab0 R08: 0000000000480020 R09: 0000000000000002 [ 283.684884] R10: 0000000000000001 R11: ffffffff81f2a380 R12: 0000000000000246 [ 283.692167] R13: ffff8801ad11fc70 R14: ffff8801638cbc00 R15: 0000000000000010 [ 283.699472] ? init_admin_reserve+0x210/0x210 [ 283.704009] ? perf_event_mmap+0x8c/0x2430 [ 283.708258] ? do_brk_flags+0x17cc/0x1af0 [ 283.712431] perf_event_mmap+0x8c/0x2430 [ 283.716522] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 283.722024] ? vma_gap_callbacks_rotate+0x41c/0x490 [ 283.727071] ? kmsan_set_origin_inline+0x6b/0x120 [ 283.731941] ? __msan_poison_alloca+0x17a/0x210 [ 283.736634] ? __vma_link_file+0x60/0x430 [ 283.740799] ? do_brk_flags+0x1700/0x1af0 [ 283.744973] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 283.750355] ? __vma_link_file+0x14d/0x430 [ 283.754623] do_brk_flags+0x17cc/0x1af0 [ 283.758618] ? __msan_poison_alloca+0x17a/0x210 [ 283.763572] __se_sys_brk+0x846/0xcc0 [ 283.767419] __x64_sys_brk+0x32/0x50 [ 283.771153] do_syscall_64+0xbe/0x100 [ 283.774982] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 283.780186] RIP: 0033:0x7ff9879ab20a [ 283.783914] Code: 03 01 00 00 00 0f 1f 00 b8 ff ff ff ff 48 8b 1c 24 48 8b 6c 24 08 4c 8b 64 24 10 48 83 c4 18 c3 48 89 fa b8 0c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 48 8b 0d 57 fc 2a 00 48 89 01 31 c9 48 39 [ 283.802829] RSP: 002b:00007fff4d87e7b8 EFLAGS: 00000206 ORIG_RAX: 000000000000000c [ 283.810567] RAX: ffffffffffffffda RBX: 0000000000abb000 RCX: 00007ff9879ab20a [ 283.817848] RDX: 0000000000adc000 RSI: 0000000000000008 RDI: 0000000000adc000 [ 283.825135] RBP: 0000000000021000 R08: 00007ff987c5ce40 R09: 00007ff9878d7c60 [ 283.832417] R10: 0000000000091a20 R11: 0000000000000206 R12: 00007ff987c5def0 [ 283.839695] R13: 0000000000000000 R14: 0000000000021000 R15: 0000000000021000 [ 283.847000] [ 283.848636] Local variable description: ----error.i@loaded_vmcs_init [ 283.855130] Variable was created at: [ 283.858860] loaded_vmcs_init+0x8a/0x590 [ 283.862936] __loaded_vmcs_clear+0x2fb/0x3c0 [ 283.867343] ================================================================== [ 283.874705] Disabling lock debugging due to kernel taint [ 283.880159] Kernel panic - not syncing: panic_on_warn set ... [ 283.880159] [ 283.887562] CPU: 0 PID: 8344 Comm: blkid Tainted: G B 4.19.0-rc4+ #63 [ 283.895451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.904811] Call Trace: [ 283.907405] [ 283.909594] dump_stack+0x306/0x460 [ 283.913263] panic+0x54c/0xafa [ 283.916520] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 283.922014] kmsan_report+0x2cd/0x2d0 [ 283.925848] __msan_warning+0x7c/0xe0 [ 283.929682] loaded_vmcs_init+0x343/0x590 [ 283.933863] __loaded_vmcs_clear+0x2fb/0x3c0 [ 283.938301] flush_smp_call_function_queue+0x404/0x770 [ 283.943603] ? vmx_get_msr_feature+0x180/0x180 [ 283.948224] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 283.954475] smp_call_function_single_interrupt+0x2f7/0x530 [ 283.960215] call_function_single_interrupt+0xf/0x20 [ 283.965329] [ 283.967593] RIP: 0010:__msan_poison_alloca+0x16b/0x210 [ 283.972888] Code: 24 20 be 20 00 48 00 e8 f3 82 bf 02 41 ff 8e 7c 09 00 00 0f 85 98 00 00 00 89 c3 e8 8f cc 36 ff 4c 89 64 24 18 ff 74 24 18 9d <48> 8b 7c 24 08 44 89 fe 89 da e8 66 fd ff ff 65 48 8b 04 25 28 00 [ 283.991804] RSP: 0018:ffff8801ad11fa10 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 283.999533] RAX: 00000000976000ba RBX: 00000000976000ba RCX: ffff8801ad11fa50 [ 284.006836] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000006aad8eb6 [ 284.014121] RBP: ffff8801ad11fab0 R08: 0000000000480020 R09: 0000000000000002 [ 284.021418] R10: 0000000000000001 R11: ffffffff81f2a380 R12: 0000000000000246 [ 284.028698] R13: ffff8801ad11fc70 R14: ffff8801638cbc00 R15: 0000000000000010 [ 284.036006] ? init_admin_reserve+0x210/0x210 [ 284.040564] ? perf_event_mmap+0x8c/0x2430 [ 284.044817] ? do_brk_flags+0x17cc/0x1af0 [ 284.048991] perf_event_mmap+0x8c/0x2430 [ 284.053081] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 284.058565] ? vma_gap_callbacks_rotate+0x41c/0x490 [ 284.063614] ? kmsan_set_origin_inline+0x6b/0x120 [ 284.068481] ? __msan_poison_alloca+0x17a/0x210 [ 284.073178] ? __vma_link_file+0x60/0x430 [ 284.077342] ? do_brk_flags+0x1700/0x1af0 [ 284.081514] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 284.086906] ? __vma_link_file+0x14d/0x430 [ 284.091180] do_brk_flags+0x17cc/0x1af0 [ 284.095180] ? __msan_poison_alloca+0x17a/0x210 [ 284.099911] __se_sys_brk+0x846/0xcc0 [ 284.103758] __x64_sys_brk+0x32/0x50 [ 284.107495] do_syscall_64+0xbe/0x100 [ 284.111323] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 284.116528] RIP: 0033:0x7ff9879ab20a [ 284.120276] Code: 03 01 00 00 00 0f 1f 00 b8 ff ff ff ff 48 8b 1c 24 48 8b 6c 24 08 4c 8b 64 24 10 48 83 c4 18 c3 48 89 fa b8 0c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 48 8b 0d 57 fc 2a 00 48 89 01 31 c9 48 39 [ 284.139190] RSP: 002b:00007fff4d87e7b8 EFLAGS: 00000206 ORIG_RAX: 000000000000000c [ 284.146918] RAX: ffffffffffffffda RBX: 0000000000abb000 RCX: 00007ff9879ab20a [ 284.154203] RDX: 0000000000adc000 RSI: 0000000000000008 RDI: 0000000000adc000 [ 284.161486] RBP: 0000000000021000 R08: 00007ff987c5ce40 R09: 00007ff9878d7c60 [ 284.168768] R10: 0000000000091a20 R11: 0000000000000206 R12: 00007ff987c5def0 [ 284.176051] R13: 0000000000000000 R14: 0000000000021000 R15: 0000000000021000 [ 284.184382] Kernel Offset: disabled [ 284.188023] Rebooting in 86400 seconds..