[ 59.196416] audit: type=1800 audit(1539252527.236:27): pid=6100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 60.833225] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 61.657990] random: sshd: uninitialized urandom read (32 bytes read) [ 62.198045] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 64.719294] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.85' (ECDSA) to the list of known hosts. [ 70.561118] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 10:09:00 fuzzer started [ 75.169693] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 10:09:05 dialing manager at 10.128.0.26:39089 2018/10/11 10:09:05 syscalls: 1 2018/10/11 10:09:05 code coverage: enabled 2018/10/11 10:09:05 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 10:09:05 setuid sandbox: enabled 2018/10/11 10:09:05 namespace sandbox: enabled 2018/10/11 10:09:05 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 10:09:05 fault injection: enabled 2018/10/11 10:09:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 10:09:05 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 10:09:05 net device setup: enabled [ 81.063080] random: crng init done 10:11:04 executing program 0: [ 197.209330] IPVS: ftp: loaded support on port[0] = 21 [ 198.246394] ip (6277) used greatest stack depth: 53056 bytes left [ 198.698350] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.705009] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.714013] device bridge_slave_0 entered promiscuous mode [ 198.864667] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.871161] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.879969] device bridge_slave_1 entered promiscuous mode [ 199.029641] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.177520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.633803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.786116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.073976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.081077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:11:08 executing program 1: [ 200.595651] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 200.604097] team0: Port device team_slave_0 added [ 200.816129] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 200.824462] team0: Port device team_slave_1 added [ 201.032814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.211962] IPVS: ftp: loaded support on port[0] = 21 [ 201.245346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 201.252556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.261725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.463091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 201.470716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.480090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.666466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.674318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.683680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.212968] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.219457] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.228268] device bridge_slave_0 entered promiscuous mode [ 203.467568] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.474343] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.482941] device bridge_slave_1 entered promiscuous mode [ 203.691780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.984984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.145777] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.152363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.159382] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.165971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.175189] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.186732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.673393] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.940672] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.214222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.221319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.369469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.376707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.229871] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.238568] team0: Port device team_slave_0 added [ 206.451866] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.460143] team0: Port device team_slave_1 added [ 206.642367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 206.649586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.658826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.836046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 206.843770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.852760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 10:11:15 executing program 2: [ 207.086590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.094426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.103853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.416854] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.424736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.434128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.014966] IPVS: ftp: loaded support on port[0] = 21 [ 210.784804] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.791322] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.800328] device bridge_slave_0 entered promiscuous mode [ 210.906032] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.912588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.919531] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.926193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.935418] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.139190] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.145946] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.154554] device bridge_slave_1 entered promiscuous mode [ 211.361959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.424070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.752862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.579546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.898855] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.211801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.218901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.491051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.498386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.326242] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.334650] team0: Port device team_slave_0 added [ 214.681297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.689693] team0: Port device team_slave_1 added [ 214.977456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.984727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.993961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.336598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.343838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.352805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.431811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.695217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.703040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.712685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:11:24 executing program 3: [ 215.954848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.963590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.972880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.668585] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 217.525695] IPVS: ftp: loaded support on port[0] = 21 [ 218.235264] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 218.241917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.250119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.650578] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.312517] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.319035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.326174] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.332760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.342084] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.348716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.579305] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.585876] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.594600] device bridge_slave_0 entered promiscuous mode [ 220.944072] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.950559] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.959431] device bridge_slave_1 entered promiscuous mode [ 221.319118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.677963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.641149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.975427] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.318448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.325703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.722274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.729389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.869818] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.878224] team0: Port device team_slave_0 added [ 224.896958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.337771] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.346287] team0: Port device team_slave_1 added [ 225.642024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.649196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.658598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.091303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.098648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.107752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.248498] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 10:11:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setxattr$security_evm(&(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)='security.evm\x00', &(0x7f0000000700)=@v2, 0xa, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) write$FUSE_ENTRY(r0, &(0x7f0000000500)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 226.560586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.568321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.577795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.072149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.079838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.089270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.968384] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.974895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.983023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.300659] IPVS: ftp: loaded support on port[0] = 21 10:11:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x616, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000140)) [ 229.676476] 8021q: adding VLAN 0 to HW filter on device team0 10:11:37 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x8010, r0, 0x0) unshare(0x8000400) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r2, 0x28, 0x0, &(0x7f00000000c0), &(0x7f0000000000)=0x4) 10:11:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x400002102201ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) pause() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4002, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x5) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000040)={0x2, 0xfffffffffffffffc, 0x74, 0x100}) 10:11:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x42, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x7fffffff, 0x7}, {0x4, 0x9}, {0x72, 0x8}]}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x84280) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="0900009dc09b9585598877f2620c0a6ca71f00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x28) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x4}, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00') ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'gre0\x00'}) 10:11:39 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x42, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x7fffffff, 0x7}, {0x4, 0x9}, {0x72, 0x8}]}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x84280) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="0900009dc09b9585598877f2620c0a6ca71f00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x28) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x4}, 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00') ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'gre0\x00'}) 10:11:39 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = dup2(r0, r1) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') exit(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x3) geteuid() 10:11:40 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = dup2(r0, r1) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') exit(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x3) geteuid() [ 232.203497] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.210002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.217133] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.223666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.232372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.482810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.658217] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.664960] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.673811] device bridge_slave_0 entered promiscuous mode [ 233.067656] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.074295] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.083100] device bridge_slave_1 entered promiscuous mode 10:11:41 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = dup2(r0, r1) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') exit(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x3) geteuid() [ 233.553239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 233.924095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.126876] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.541356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.980116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 235.987423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.325571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 236.332762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.397011] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.405490] team0: Port device team_slave_0 added [ 237.531368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.797960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.806386] team0: Port device team_slave_1 added [ 238.247343] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.254514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.263582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.628661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.636002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.645036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.877013] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.969929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.977962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.987061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.289925] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.297745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.306744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:11:47 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000040)) [ 239.927669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.934267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.942316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.035971] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.947154] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.953764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.960783] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.967414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.976059] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.982854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.561852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.261416] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.030677] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.037374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.045466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:11:54 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000040)=0x80000004, 0x4) [ 246.932889] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.782462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.305677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 10:11:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)=""/4096) [ 250.835342] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.841915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.849966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.148786] 8021q: adding VLAN 0 to HW filter on device team0 10:12:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setxattr$security_evm(&(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)='security.evm\x00', &(0x7f0000000700)=@v2, 0xa, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) write$FUSE_ENTRY(r0, &(0x7f0000000500)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 10:12:01 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x10000) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x401, 0x8000, 0x100000000, 0x3f, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0xfffffffffffffffa}, 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000001c0)={{0x100000000, 0x7fff}, 'port1\x00', 0x40, 0x1, 0x7f, 0x5, 0xfff, 0x8001, 0x5, 0x0, 0x2, 0x7}) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000280)={0xbb, 0x7, 0x8}) bind$vsock_dgram(r1, &(0x7f00000002c0)={0x28, 0x0, 0x2711}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000700)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000840)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}, 0x4e24, 0x6, 0x4e24, 0x2, 0x0, 0x80, 0x20, 0x33, r3, r4}, {0x1, 0x260c, 0x4, 0x3, 0x8, 0x100, 0x6, 0x62fd}, {0x3, 0x278d, 0x4, 0x6}, 0x1, 0x6e6bb4, 0x2, 0x0, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x20}, 0x4d3, 0xff}, 0xa, @in=@multicast1, 0x0, 0x4, 0x3, 0x3, 0xffffffffffff0001, 0x3, 0x9}}, 0xe8) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000940)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000980)='./cgroup.net/syz0\x00', 0x200002, 0x0) bind$vsock_dgram(r1, &(0x7f00000009c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000c00)={r0, &(0x7f0000000b40)="d781b31ef312dc8488662bebe62c2b5074ad3420fdbf6414ade97921109d0b95faaed1bd1402b0931bd62693706b4f92ebcbf51f725cfff1a314a2d0e4a6706c80e92062067284728b8bdd327b362fd9b76743d4fddd2785b78b6ba6780231a42569cf75d4edb2e8bb27781250dc648937fc970630c0650251ee80fcd0622403a13a49090b7d036979718bc4bc3060cf74cb65218b551db5ade4b4e61ee9"}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/zero\x00', 0x84100, 0x0) io_setup(0x0, &(0x7f0000000c80)=0x0) io_cancel(r6, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0xf, 0x1, r1, &(0x7f0000000cc0)="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", 0x1000, 0x2fa, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000001d00)) fsetxattr(r5, &(0x7f0000001d40)=@random={'os2.', '/dev/vcs#\x00'}, &(0x7f0000001d80)='nodev$nodev\x00', 0xc, 0x3) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0xe6) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000001dc0)={'ip_vti0\x00', {0x2, 0x4e21}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001e00)='./cgroup/syz1\x00', 0x200002, 0x0) r7 = semget(0x3, 0x6, 0x8) semctl$GETZCNT(r7, 0x1, 0xf, &(0x7f0000001e40)=""/89) syz_open_dev$sndpcmp(&(0x7f0000001ec0)='/dev/snd/pcmC#D#p\x00', 0x100, 0x119400) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000001f00)={@local}, &(0x7f0000001f40)=0x14) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x20) 10:12:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000002100050c00000000000000000a00140000000000000000000900000008001700000000001400020000ff0000000000000000000000000000"], 0x1}}, 0x0) dup2(r0, r0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000140)) 10:12:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x8000008004500b, &(0x7f0000000040)) 10:12:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000380)=0xffffffffffffff82) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, &(0x7f0000000200)='$keyring$md5sum.\x00') 10:12:01 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = dup2(r0, r1) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='stack\x00') exit(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x3) geteuid() 10:12:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setxattr$security_evm(&(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)='security.evm\x00', &(0x7f0000000700)=@v2, 0xa, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) write$FUSE_ENTRY(r0, &(0x7f0000000500)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 253.791733] hrtimer: interrupt took 236649 ns 10:12:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000040)=0x100040000) 10:12:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setxattr$security_evm(&(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)='security.evm\x00', &(0x7f0000000700)=@v2, 0xa, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) write$FUSE_ENTRY(r0, &(0x7f0000000500)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 10:12:02 executing program 1: 10:12:02 executing program 2: 10:12:02 executing program 0: 10:12:02 executing program 4: [ 255.191006] IPVS: ftp: loaded support on port[0] = 21 [ 255.943940] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.950363] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.959009] device bridge_slave_0 entered promiscuous mode [ 256.041840] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.048256] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.056506] device bridge_slave_1 entered promiscuous mode [ 256.135727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.214766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.461367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 256.545793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 256.630263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.637356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.718481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.725536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.968872] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 256.976785] team0: Port device team_slave_0 added [ 257.055531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.063211] team0: Port device team_slave_1 added [ 257.142615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.224796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.305649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.313003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.322117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.400841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 257.408289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.417564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.310378] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.316847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.323831] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.330296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.340301] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.582088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.579737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.886309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.188467] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.194857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.202931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.499942] 8021q: adding VLAN 0 to HW filter on device team0 10:12:12 executing program 5: 10:12:12 executing program 3: 10:12:12 executing program 1: 10:12:12 executing program 0: 10:12:12 executing program 2: 10:12:12 executing program 4: 10:12:12 executing program 0: 10:12:12 executing program 2: 10:12:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0x8001, 0x0) execve(&(0x7f0000000680)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000280)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) 10:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 10:12:13 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 10:12:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x1ff, 0x0, 0x2, 0x5, 0x0, 0x1, 0x0, 0x8, 0x3, 0x0, 0x9a8, 0x0, 0x4fb, 0x7f, 0x2, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xa884, 0x2f03b3fb, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1b9c3383, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x14, 0x0, 0x0, 0x0, 0x32, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000600)="5b747275737465642400f5b1e52dcaff4e7cb79262670cab4e2fb3dd108872225b2fb5eb9922f343f031a821308670854bcb83ab5ac5108d75ec2a4b21bde72dcb9d3629b4c5a17bfaf8c3d17fce33ed4787f000d8ec4ec4aaa0be13402b391d65f2d481e707e084ae13e294f19c3023405d438d41675cc21ccdfa7939ef586988820daf6cac71f7b0b195d3338856ab271247cccc9519c0c1b04e10ef55dc5233f1438eb47e68e180cad6318a28f20d436cbee73576da90b15792e2b9fe25cfcc27e14952bf6ac7bdbd2d6357f12fe85aaa14237fb8ca2c1cf223a8b5054c524c293e0f025eee413f", 0x100000000) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000300)={{0x4}, {0x0, 0x3}}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000540)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000780)=0xfffffe45) mlockall(0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240), 0x20000102000007) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 10:12:13 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x1109}], 0x2, 0x26872f83) 10:12:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000380)={0x10001, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendmmsg(r0, &(0x7f0000006700), 0x0, 0x880) 10:12:13 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61c3"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 265.947171] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.955155] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 265.986221] 8021q: adding VLAN 0 to HW filter on device team0 10:12:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) capset(&(0x7f0000000000), &(0x7f0000000180)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@ipv4={[], [], @broadcast}}, 0x20) 10:12:14 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:14 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getpeername(r1, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000380)=0xffffffffffffff82) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 10:12:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000180)}, 0x0) mount(&(0x7f0000000100)=@sg0='/dev/sg0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x40, &(0x7f00000004c0)="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") [ 266.433476] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.468824] 8021q: adding VLAN 0 to HW filter on device team0 10:12:14 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}, {r0, 0x1109}], 0x2, 0x26872f83) 10:12:14 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x200000000000035a) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000000), 0x4) 10:12:14 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={"6c6f000000000200", 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x1, @dev}, 0x10) [ 266.908450] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.983214] 8021q: adding VLAN 0 to HW filter on device team0 10:12:15 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:15 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) 10:12:15 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000040)=""/13, 0x3}], 0x2) 10:12:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x9000000000002, 0x0) ioctl(r0, 0x73, &(0x7f0000000340)="025cd90700145f8f764070") clone(0x0, &(0x7f0000000180), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000600)='fou\x00') ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000640)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x5, 0x4, 0x4, 0x1e, r5}) write$P9_RRENAME(r2, &(0x7f0000000580)={0x27d, 0x15, 0x1}, 0x7) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000200)=""/134, 0x86) getsockopt$sock_buf(r4, 0x1, 0x37, &(0x7f0000000440)=""/244, &(0x7f00000002c0)=0xf4) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000880)={'vcan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000300)={0x2, 'team_slave_1\x00'}, 0x18) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000380)={'broute\x00'}, &(0x7f0000000540)=0x78) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000900)=ANY=[@ANYBLOB="080000dcd3e0e71d62c0d221fab849212e4328850da341809b96a5e826a1efa9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000005c0)=0x9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000007c0)={r6, 0x1}, &(0x7f0000000800)=0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000840)={0x2, 'bcsh0\x00', 0x2}, 0x18) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 267.438840] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.458113] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.570940] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.577881] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.584909] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.591814] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.598633] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.605558] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.612419] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.619182] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.626078] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.632931] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 267.639692] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 10:12:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000800000064c1ba37cb645a947ec0"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:12:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB='a']) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:12:15 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xc201}) [ 267.919583] ================================================================== [ 267.927026] BUG: KMSAN: uninit-value in vmap_page_range_noflush+0x975/0xed0 [ 267.934191] CPU: 1 PID: 7942 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 267.941395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.950756] Call Trace: [ 267.953370] dump_stack+0x306/0x460 [ 267.957041] ? vmap_page_range_noflush+0x975/0xed0 [ 267.962041] kmsan_report+0x1a2/0x2e0 [ 267.964189] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 267.965883] __msan_warning+0x7c/0xe0 [ 267.965923] vmap_page_range_noflush+0x975/0xed0 [ 267.966042] map_vm_area+0x17d/0x1f0 [ 267.966094] kmsan_vmap+0xf2/0x180 [ 267.990761] vmap+0x3a1/0x510 [ 267.993897] ? relay_open_buf+0x81e/0x19d0 [ 267.998174] relay_open_buf+0x81e/0x19d0 [ 268.002283] relay_open+0xabb/0x1370 [ 268.006047] do_blk_trace_setup+0xaf7/0x1780 [ 268.010523] __blk_trace_setup+0x20b/0x380 [ 268.014798] blk_trace_ioctl+0x274/0x970 [ 268.018904] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.023784] ? __msan_poison_alloca+0x17a/0x210 [ 268.028495] ? blkdev_ioctl+0x327/0x55e0 [ 268.032572] ? block_ioctl+0x16f/0x1d0 [ 268.036486] blkdev_ioctl+0x1aaa/0x55e0 [ 268.040497] ? task_kmsan_context_state+0x6b/0x120 [ 268.045450] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 268.050832] ? vmalloc_to_page+0x57d/0x6b0 [ 268.055097] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.059960] block_ioctl+0x16f/0x1d0 [ 268.063694] ? block_llseek+0x190/0x190 [ 268.067691] do_vfs_ioctl+0xcf3/0x2810 [ 268.071618] ? security_file_ioctl+0x92/0x200 [ 268.076147] __se_sys_ioctl+0x1da/0x270 [ 268.080149] __x64_sys_ioctl+0x4a/0x70 [ 268.084080] do_syscall_64+0xbe/0x100 [ 268.087909] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.093111] RIP: 0033:0x457519 [ 268.096318] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.115251] RSP: 002b:00007fb9fff7cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.122986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 268.130262] RDX: 0000000020000040 RSI: 00000000c0481273 RDI: 0000000000000005 [ 268.137538] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.144822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9fff7d6d4 [ 268.152101] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 268.159398] [ 268.161026] Uninit was created at: [ 268.164595] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 268.169713] kmsan_kmalloc+0xa4/0x120 [ 268.173529] __kmalloc+0x14b/0x440 [ 268.177104] kmsan_vmap+0x9b/0x180 [ 268.180654] vmap+0x3a1/0x510 [ 268.183770] relay_open_buf+0x81e/0x19d0 [ 268.187847] relay_open+0xabb/0x1370 [ 268.191614] do_blk_trace_setup+0xaf7/0x1780 [ 268.196075] __blk_trace_setup+0x20b/0x380 [ 268.200336] blk_trace_ioctl+0x274/0x970 [ 268.204415] blkdev_ioctl+0x1aaa/0x55e0 [ 268.208404] block_ioctl+0x16f/0x1d0 [ 268.212134] do_vfs_ioctl+0xcf3/0x2810 [ 268.216046] __se_sys_ioctl+0x1da/0x270 [ 268.220042] __x64_sys_ioctl+0x4a/0x70 [ 268.223946] do_syscall_64+0xbe/0x100 [ 268.227795] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.232992] ================================================================== [ 268.240371] Disabling lock debugging due to kernel taint [ 268.245827] Kernel panic - not syncing: panic_on_warn set ... [ 268.245827] [ 268.253215] CPU: 1 PID: 7942 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #66 [ 268.261796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.271177] Call Trace: [ 268.273793] dump_stack+0x306/0x460 [ 268.277463] panic+0x54c/0xafa [ 268.280713] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 268.286190] kmsan_report+0x2d3/0x2e0 [ 268.290015] __msan_warning+0x7c/0xe0 [ 268.293861] vmap_page_range_noflush+0x975/0xed0 [ 268.298699] map_vm_area+0x17d/0x1f0 [ 268.302458] kmsan_vmap+0xf2/0x180 [ 268.306028] vmap+0x3a1/0x510 [ 268.309169] ? relay_open_buf+0x81e/0x19d0 [ 268.313436] relay_open_buf+0x81e/0x19d0 [ 268.317546] relay_open+0xabb/0x1370 [ 268.321302] do_blk_trace_setup+0xaf7/0x1780 [ 268.325759] __blk_trace_setup+0x20b/0x380 [ 268.330074] blk_trace_ioctl+0x274/0x970 [ 268.334174] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.339048] ? __msan_poison_alloca+0x17a/0x210 [ 268.343747] ? blkdev_ioctl+0x327/0x55e0 [ 268.347825] ? block_ioctl+0x16f/0x1d0 [ 268.351743] blkdev_ioctl+0x1aaa/0x55e0 [ 268.355757] ? task_kmsan_context_state+0x6b/0x120 [ 268.360710] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 268.366104] ? vmalloc_to_page+0x57d/0x6b0 [ 268.370376] ? kmsan_set_origin_inline+0x6b/0x120 [ 268.375249] block_ioctl+0x16f/0x1d0 [ 268.378990] ? block_llseek+0x190/0x190 [ 268.382994] do_vfs_ioctl+0xcf3/0x2810 [ 268.386926] ? security_file_ioctl+0x92/0x200 [ 268.391450] __se_sys_ioctl+0x1da/0x270 [ 268.395472] __x64_sys_ioctl+0x4a/0x70 [ 268.399379] do_syscall_64+0xbe/0x100 [ 268.403206] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.408410] RIP: 0033:0x457519 [ 268.411620] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.430551] RSP: 002b:00007fb9fff7cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.438283] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 268.445561] RDX: 0000000020000040 RSI: 00000000c0481273 RDI: 0000000000000005 [ 268.452841] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.460122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9fff7d6d4 [ 268.467403] R13: 00000000004be982 R14: 00000000004ce680 R15: 00000000ffffffff [ 268.475705] Kernel Offset: disabled [ 268.479347] Rebooting in 86400 seconds..