[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 99.429512] audit: type=1800 audit(1553622265.479:25): pid=10702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 99.448922] audit: type=1800 audit(1553622265.479:26): pid=10702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 99.468529] audit: type=1800 audit(1553622265.499:27): pid=10702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. 2019/03/26 17:44:38 fuzzer started 2019/03/26 17:44:44 dialing manager at 10.128.0.26:36449 2019/03/26 17:44:44 syscalls: 1 2019/03/26 17:44:44 code coverage: enabled 2019/03/26 17:44:44 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/26 17:44:44 extra coverage: extra coverage is not supported by the kernel 2019/03/26 17:44:44 setuid sandbox: enabled 2019/03/26 17:44:44 namespace sandbox: enabled 2019/03/26 17:44:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/26 17:44:44 fault injection: enabled 2019/03/26 17:44:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/26 17:44:44 net packet injection: enabled 2019/03/26 17:44:44 net device setup: enabled 17:48:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000000)) syzkaller login: [ 342.668237] IPVS: ftp: loaded support on port[0] = 21 [ 342.828913] chnl_net:caif_netlink_parms(): no params data found [ 342.903241] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.909851] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.918562] device bridge_slave_0 entered promiscuous mode [ 342.928232] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.934907] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.944555] device bridge_slave_1 entered promiscuous mode [ 342.981469] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 342.994085] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.028036] team0: Port device team_slave_0 added [ 343.037049] team0: Port device team_slave_1 added [ 343.207589] device hsr_slave_0 entered promiscuous mode [ 343.352973] device hsr_slave_1 entered promiscuous mode [ 343.634404] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.641052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.648415] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.655078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.738944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.761234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.775771] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.785747] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.798427] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 343.820853] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.834652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.843348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.851636] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.858393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.903355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.912180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.920356] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.926917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.934832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 343.943978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 343.953851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 343.963054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 343.971985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 343.981167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 343.990233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.998776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.014062] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.022373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.030727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.055574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.108148] 8021q: adding VLAN 0 to HW filter on device batadv0 17:48:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030000000030300007f3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000008100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:48:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) 17:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) socket$inet6(0xa, 0x0, 0x2562) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x190) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_procfs(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x200000, 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f0000000140)='-%\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) 17:48:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1a, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="a9", 0x1}], 0x1, 0x0) 17:48:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sched\x00') writev(r0, &(0x7f0000000500)=[{&(0x7f0000000540)='o', 0x1}], 0x1) 17:48:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7f, 0x2) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000002c0)=0x88) r1 = memfd_create(&(0x7f0000000200)='vboxnet1self(.]&)\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) syslog(0x9, &(0x7f0000000240)=""/84, 0x54) write$vhci(0xffffffffffffffff, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r3 = dup2(r2, r1) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'ip6tnl0\x00', 0x3}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 17:48:31 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)={0x0, 0x0, 0x2c}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10000, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) [ 345.504309] Unknown ioctl -1072143302 [ 345.513277] Unknown ioctl -1072143302 17:48:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='U\'\x97A\xa0Y\xa2\x93\xa6\x03\x9a`9\xd6\x00', 0x1ff) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x2, 0xfffffffffffffffb}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000280)={0xffffffff, r3}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f00000000c0)) fcntl$notify(r0, 0x402, 0x4118e0ebc1b856b8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x19) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 17:48:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffd) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f00000001c0)="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", 0x18d) read(r0, &(0x7f0000000440)=""/60, 0x3c) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = dup2(r0, r2) tkill(r1, 0x14) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000080)="05cbdba550e7ae42e6dca4448cf4406f15cd41c1684a0b24f2d7f7093d03f0a1371c309f2f44194be78e7971f0b7cebbd56f6b3e99f0ff537180ac10e9c622d34d201f6efbc63f98030841a8cd74af76aec51613b1962388c818387858c1a0fec2aa25c6b4d9574bebfdb3112c67a97c3b36dfcd27e7ae406ae3163f7462614227f0dc44ba274bbf703f136b8fd94928df2996bb869b691ef8f914367a7ec68c64", 0xa1) openat$cgroup_subtree(r3, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'security\x00', 0xdd, "03b37cc227147bab1ccb98a9a1fc670c7365c4995290a1762843e73605050b8ebbbe2586d719096f73740986334d6452b96a6a68d94493ca7b72a4419ec74ec77c1d10b7005124a113e588da89b9431f18f58eafa4f4a16e3b35e35362bacb4c38b9f33c3cc3a4cfb8b63a4da26f0b9ed2305fd2aca266d71f747a0856539f21411eee2e71208c069a45b516a4e818baf7834419578a184c2342bb905ac24f53e58732953c438d786503cc3106de6d4331f9d142b7b83d1b9b81bf339e0695efe3a0c736d7b172151e9d4a1d457167b4774151c6a8af1d14ee9a48e465"}, &(0x7f0000000180)=0x101) 17:48:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000140)=0x60) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x7}, 0x5c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 17:48:32 executing program 0: r0 = socket(0x10, 0x6, 0x7) write(r0, &(0x7f0000000240)="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", 0xfc) 17:48:32 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x2db0, 0x4202) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000580)=[0x0, 0xee01, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0]) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x2000000, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x401}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}]}}) r3 = socket$inet6(0xa, 0x6, 0x0) close(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4\xc4H\xdb \x1aa\x1b\x85\xc2O\x18\x1d\xf5kFA\x14\xaa\xfbsa\x10\x9eyF\xf6\xb7O\xd8wV\n\x1f\x94\xb1\x8e\x04\x9dSiWf\xf5\xc3\xbd\xa9\xa5v)m\xddbL\x9f\x048\xa7\xc8\x18\n\x9e\xef\xfc\xa0\x0f\xa9\x9a_!\xc3?\xa10xffffffffffffffff}) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040000}, 0x0) socket$isdn_base(0x22, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000200)=""/246) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0xc0000) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000080)={'hwsim0\x00', @link_local}) add_key(0xffffffffffffffff, 0x0, &(0x7f0000000180)="70b179891ddd88b4c00ea679d131ca9918ad5062ded382cb7f7bd95407acc58968d4fe7a41710fbca761cf8289278ccc9645", 0x32, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000005880)='/dev/mixer\x00', 0x100, 0x0) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f00000058c0)={0xfffffffffffff582, 0x100200000}, 0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe2000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="080026bd7000fedbdf250c0000005c0007000c000300fdffffffffffffff0c000400ff0300000000000008000200f9ffffff0c000400ff0f0000000000000c000400010000000000000008000100000400000c000300ffff0000000000000c0004002a2a0000000000000c0009000800010077810000100007000c000400000000000000000020000200080001000400000004000400080002000300000008000100010000004c00070008000100ff03000008000200fdffffff0c000300080000000000000008000100000000800800010003000000080001000000000008000100ea0000000c00040049be000000000000"], 0xf8}, 0x1, 0x0, 0x0, 0x20000085}, 0x20000000) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000140)=0x3001) write$UHID_CREATE2(r5, &(0x7f0000000300)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x8c, 0x7b163454, 0x40, 0x400, 0xa0000, 0x167, "2c3de57dec8a68f4272c531e8f355f31cfe9f7f8741d28630b8b3130a86d174a9cf9e15a88c0d3ff32bd323b1a3731e6c9fb56312a4a6c5288cf09a39d01c8d78a43d7363dc68a4c9450d69c0cf248c1364d06cb51ae045577095729341a46d59dabd81ca982c4a41205d7a642220b3894fbbf51453303ef10979bcafa139b34fb482d686a623d537b1c8630"}, 0x1a4) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000006c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x2, 0x7, "ca2e65d2087998c71ff2023a30474c31c22db94fe853711067ab0e906f6e7991fdb325d9b2033aa3675b38be57847deb860530a01f7884c6739ab89ae37606fce4b344f0abf2479f4a1b213a077ad791e41a517b5fc1ab3c6ee9f56f9870557d4cec22fb2c67f3871d02fc84e56874ce20de9ac8164fe1f57f634e17d9df6b0e8f17fce38aa85fe6f2497b8736cba6e043c1be22df78287aef3e033acdfaf22c4a3d7064b32c623f23f07e16c9d53616adf14e8f8bc52cf76426a68d3318dc639e3b11ad8571be536a02fe7c239c9a8c1212f73231661db927adfc4f73dfd3eb5e621e9d208b79f46e27b46940c56e6c32a3e8f8211ce175a60af29a6ac8d799", 0xff, 0x0, 0x3, 0x1, 0x2, 0x8, 0x9, 0x1}, r7}}, 0x120) [ 346.256848] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 17:48:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x2840) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000040)=0x4) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0x6) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0x13, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "d53ab01df283e4d56fb56f6de7dfc37ae6bf3465656cb58ce6e1f8c9b407690d338413dad7cff42af4f36ead5fe7e28094c1e091133b38330b7922474e1a3d7d55a71fa8a4ae7991eee0d46449b4dfe3"}, 0xd8) close(r2) dup3(r0, r3, 0x0) 17:48:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2000000000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x19a5) ioctl$EVIOCGKEYCODE(r0, 0x80084503, &(0x7f0000000080)=""/181) 17:48:32 executing program 1: keyctl$join(0x1, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5) r1 = getegid() mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000f, 0x20010, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='@.\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20001, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000000c0)={0xaf, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2, 'wlc\x00', 0x14, 0x6587, 0x7e}, 0x2c) ioctl$int_out(r0, 0x5460, &(0x7f0000000100)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200000, 0x0) write$P9_RSTAT(r2, &(0x7f0000000180)={0x51, 0x7d, 0x101, {0x0, 0x4a, 0x0, 0x7fff, {0x8, 0x2, 0x6}, 0x10000000, 0x5, 0x6, 0x8000, 0x1, '&', 0x4, 'wlc\x00', 0x2, '@]', 0x10, '/dev/sequencer2\x00'}}, 0x51) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000200)={{0x5}, 'port1\x00', 0x2, 0x11000, 0x30, 0x3, 0x80000000, 0x20, 0x1ff, 0x0, 0x5, 0xfffffffffffffffe}) write$P9_RFSYNC(r2, &(0x7f00000002c0)={0x7, 0x33, 0x1}, 0x7) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x47, 0x4}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2413b5fa8dd50801}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x70, r4, 0xf, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcdd6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc19}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x41}, 0x4) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x54000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000500)={0x7, 0x2, 0x200, 0x1, 0x80000001, 0xf3, 0xfffffffffffffffe, 0x8, 0x0}, &(0x7f0000000540)=0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000580)={r6, 0x1}, 0x8) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{0x3b2, 0x7ff, 0x200, 0x63}, 'syz0\x00', 0x54}) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x100, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x1) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) r8 = dup2(r0, r7) setgroups(0x2, &(0x7f0000000680)=[r1, r1]) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f00000006c0)={0x81, 0x1, 0xf522, 0x40}, 0x8) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000700)={{0x1, 0x3ff, 0x5, 0x100000000}, 'syz1\x00', 0x34}) ioctl$BLKROSET(r8, 0x125d, &(0x7f0000000780)=0xfffffffffffffffd) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000800)={{0xa, 0x3, 0x2, 0x8, '\x00', 0x73e}, 0x1, [0x2, 0x80000000, 0x6, 0x8, 0xfffffffffffffff8, 0x3, 0x3, 0x8, 0x0, 0x0, 0x8b1, 0xf5ee, 0x10000, 0x1ff, 0x35ba, 0x80000000, 0x6, 0x7, 0x80, 0x7, 0x8, 0x872, 0x5, 0x10001, 0x24, 0x5, 0x8000, 0xfff, 0x3ff, 0x485, 0x3ff, 0x8, 0x100000000, 0x0, 0x8, 0x1ff, 0x5, 0x1, 0x4, 0x4, 0x1f800000000, 0x0, 0xffffffffffff7fff, 0x80000001, 0x0, 0x3, 0x8000, 0x2, 0x1, 0x7, 0x80, 0x6, 0x2, 0x1, 0x200, 0x8fbf, 0xffff000000000000, 0x2, 0x4, 0x3, 0x0, 0x8, 0x1, 0x1, 0x5, 0xc56, 0xffffffff, 0x6, 0x2, 0xb7c, 0x101, 0x7, 0x548, 0x10000, 0x5, 0x80000000, 0x6, 0x1, 0x9, 0x0, 0x0, 0x8, 0x80000001, 0x4e, 0x400, 0x200, 0x2cb000000, 0x6, 0xe6, 0xab, 0x2, 0xfaa, 0x9, 0x3ff, 0x2f8, 0x4, 0x8, 0xb2, 0x6, 0x5, 0x100, 0x364f, 0x4, 0x4135, 0xd0e, 0x800, 0x81, 0xf1d, 0x2, 0x108, 0x6, 0x8000, 0x6bb, 0x1000, 0x8001, 0x100000001, 0x6, 0x2, 0x6, 0x4, 0xfff, 0x6, 0xc4, 0xffff, 0x1, 0xe03, 0x1, 0x6], {r9, r10+30000000}}) 17:48:32 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x56, 0x1, 0x7}}, 0x14) write$P9_RLERRORu(r0, 0x0, 0x21) 17:48:33 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'veth1_to_team\x00', 0x1f}) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) write$UHID_DESTROY(r1, &(0x7f0000000100), 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000049c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @multicast1}, 0x148, 0x0, 0x0, 0x0, 0x531, &(0x7f00000021c0)='veth1_to_team\x00', 0x6, 0x80000000, 0x9}) write$UHID_CREATE(r1, &(0x7f0000000680)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x0}, 0x120) write$UHID_INPUT(r1, &(0x7f0000002200)={0x8, "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", 0xd1}, 0x1006) socket$can_raw(0x1d, 0x3, 0x1) [ 347.028862] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.035898] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.042868] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.049716] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.056677] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.063612] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.070429] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.077380] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.084326] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.091146] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.098112] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 347.130367] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 347.196615] IPVS: ftp: loaded support on port[0] = 21 17:48:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x0, 0x2, 0x80) semop(r2, &(0x7f00000003c0)=[{0x4, 0x3, 0x800}], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000003aa7d713867cabed0000000000000000ec580079f68247a0fe9b5adfab6b2e59e8291f964f893ad1172f3ee5747cb774156bd130b62c164f5e01792e335aef25416f5648cf68d0b2572dd499ef8f3ee582f270bf31b29d245e494fe2e7f7f3de43c5c67cbbc71043f9a865091b388c5f7aba00", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000001020000"], 0x48}}, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0xfffffffffffff7f2, 0x3ff, 0xb2, 0x0, 0x617, 0x1101e, 0x2, 0xf, 0x2, 0x5, 0xe4f, 0x100000000, 0x9, 0x5, 0x7, 0x9ef3, 0x9, 0x3, 0x93d0, 0xfffffffffffffffe, 0x3, 0x0, 0x101, 0x4, 0x9, 0x5, 0x20, 0x2, 0x2, 0x3, 0xffffffff, 0x7, 0xfffffffffffffff8, 0x0, 0x7b6, 0x0, 0x0, 0x4, @perf_bp, 0x400, 0x901, 0x2, 0x7, 0x0, 0x4, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x3) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80041, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'nlmon0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000280)={@rand_addr="1d676a6ff17a770e1ace6c08f23d8490", @empty, @dev={0xfe, 0x80, [], 0xf}, 0x3, 0xffffffffaaf17946, 0x0, 0x0, 0x20, 0xc0110, r6}) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180)=[0xffffffff00000000, 0x4, 0x6, 0x5, 0xff, 0x7, 0x8b3], 0x7, 0xffffffffffffff80, 0x1, 0x8, 0x2, 0xfffffffffffff495, {0xff, 0x7, 0x2, 0x800, 0x10000000000, 0x3f, 0x5, 0x0, 0x5, 0x9, 0xa1, 0x8000000000000009, 0x3ff, 0x7, "b9c7894ea4c485ca08000a78b27700064f837d7c9b098c41474a24d1165d11e1"}}) [ 347.403834] chnl_net:caif_netlink_parms(): no params data found 17:48:33 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xfffffffffffffff7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) [ 347.508529] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.515232] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.523807] device bridge_slave_0 entered promiscuous mode [ 347.533663] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.540197] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.548859] device bridge_slave_1 entered promiscuous mode [ 347.605419] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 347.617377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 347.652523] team0: Port device team_slave_0 added [ 347.661387] team0: Port device team_slave_1 added [ 347.738578] device hsr_slave_0 entered promiscuous mode [ 347.783035] device hsr_slave_1 entered promiscuous mode [ 347.857693] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.864363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.871597] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.878322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.978060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.002932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.014028] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.023218] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.036653] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 348.057876] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.078254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.086810] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.093458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.139933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.148402] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.155072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.166117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.181223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.190245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.208182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.227877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.242139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.288173] 8021q: adding VLAN 0 to HW filter on device batadv0 17:48:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80000, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000280)=0x24, 0x4) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0004060b0bb20550829b38000000161797079a45e7ade34ccbd23f99b182a90f3d2ed9e3b4c50920515e4c33bb98394c9f7fb50000cdf5424294335b7189c3003b2c040000710e13"], 0x48) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101002, 0x0) fcntl$setpipe(r0, 0x407, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r2, &(0x7f0000000140)="bcc710ef9a1a787d8af0907c77a99d9934e277c2cb1449", &(0x7f0000000180)=""/104}, 0x18) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x5, [0x6, 0x0, 0x1f, 0x3, 0x111]}, 0xe) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0x0, 0xffffffff8c2777d5}) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000002c0)={'syz_tun\x00', {0x2, 0x4e22, @multicast2}}) 17:48:34 executing program 1: clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) wait4(r0, &(0x7f0000000040), 0xf0b286f2c27dd17d, &(0x7f0000000240)) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fcntl$getownex(r2, 0x10, &(0x7f0000000300)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x4204, r1, 0x2, 0xa05000) r3 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0xaba9, 0x6, [0x8, 0x986, 0xffffffffffffff01, 0x3, 0x2, 0x1]}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000180)={r4, @in={{0x2, 0x4e24, @empty}}}, 0x84) 17:48:34 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dhcp_state_t:s0\x00', 0x22, 0x0) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00', 0xe, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x94) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0x71) 17:48:34 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) prlimit64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x800, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x800) sendfile(r0, r1, &(0x7f0000000080), 0x101) 17:48:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000040)=0x6c) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4004400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x20, 0x5, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4000) [ 349.143464] ================================================================== [ 349.150967] BUG: KMSAN: uninit-value in gue_err+0x514/0xfa0 [ 349.156735] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.0.0+ #17 [ 349.163075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.172889] Call Trace: [ 349.175589] dump_stack+0x173/0x1d0 [ 349.179254] kmsan_report+0x131/0x2a0 [ 349.183519] __msan_warning+0x7a/0xf0 [ 349.187342] gue_err+0x514/0xfa0 [ 349.190793] ? fou_build_header+0x690/0x690 [ 349.195154] __udp4_lib_err+0x12e6/0x1d40 [ 349.199370] udp_err+0x74/0x90 [ 349.202582] ? __udp4_lib_err+0x1d40/0x1d40 [ 349.206927] icmp_unreach+0xb65/0x1070 [ 349.210856] ? icmp_discard+0x30/0x30 [ 349.214674] icmp_rcv+0x11a1/0x1950 [ 349.218340] ? local_bh_enable+0x40/0x40 [ 349.222430] ? local_bh_enable+0x40/0x40 [ 349.226580] ip_protocol_deliver_rcu+0x584/0xbb0 [ 349.231474] ip_local_deliver+0x624/0x7b0 [ 349.235664] ? ip_local_deliver+0x7b0/0x7b0 [ 349.240011] ? ip_protocol_deliver_rcu+0xbb0/0xbb0 [ 349.244973] ip_rcv+0x6bd/0x740 [ 349.248290] ? ip_rcv_core+0x11d0/0x11d0 [ 349.252445] process_backlog+0x756/0x10e0 [ 349.256647] ? ip_local_deliver_finish+0x320/0x320 [ 349.261606] ? rps_trigger_softirq+0x2e0/0x2e0 [ 349.266222] net_rx_action+0x78b/0x1a60 [ 349.270244] ? net_tx_action+0xca0/0xca0 [ 349.274476] __do_softirq+0x53f/0x93a [ 349.278316] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 349.283657] ? ksoftirqd_should_run+0x30/0x30 [ 349.288183] run_ksoftirqd+0x26/0x50 [ 349.291917] smpboot_thread_fn+0x4d0/0x9f0 [ 349.296287] kthread+0x4a1/0x4e0 [ 349.299675] ? cpu_report_death+0x190/0x190 [ 349.304017] ? schedule_tail+0x1b2/0x410 [ 349.308120] ? kthread_blkcg+0xf0/0xf0 [ 349.312096] ret_from_fork+0x35/0x40 [ 349.315854] [ 349.317483] Uninit was created at: [ 349.321052] kmsan_internal_poison_shadow+0x92/0x150 [ 349.326178] kmsan_kmalloc+0xa6/0x130 [ 349.330037] kmsan_slab_alloc+0xe/0x10 [ 349.333954] __kmalloc_node_track_caller+0xe9e/0xff0 [ 349.339132] __alloc_skb+0x309/0xa20 [ 349.342877] alloc_skb_with_frags+0x186/0xa60 [ 349.347907] sock_alloc_send_pskb+0xafd/0x10a0 [ 349.352504] sock_alloc_send_skb+0xca/0xe0 [ 349.357061] __ip_append_data+0x34cd/0x5000 [ 349.361401] ip_append_data+0x324/0x480 [ 349.365395] icmp_push_reply+0x23d/0x7e0 [ 349.369514] __icmp_send+0x2ea3/0x30f0 [ 349.373426] __udp4_lib_rcv+0x36d7/0x4b80 [ 349.377594] udp_rcv+0x5c/0x70 [ 349.380816] ip_protocol_deliver_rcu+0x584/0xbb0 [ 349.385593] ip_local_deliver+0x624/0x7b0 [ 349.389778] ip_rcv+0x6bd/0x740 [ 349.393090] process_backlog+0x756/0x10e0 [ 349.397266] net_rx_action+0x78b/0x1a60 [ 349.401255] __do_softirq+0x53f/0x93a [ 349.405061] ================================================================== [ 349.412429] Disabling lock debugging due to kernel taint [ 349.418096] Kernel panic - not syncing: panic_on_warn set ... [ 349.424014] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.0.0+ #17 [ 349.431755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.441129] Call Trace: [ 349.443750] dump_stack+0x173/0x1d0 [ 349.447411] panic+0x3d1/0xb01 [ 349.450674] kmsan_report+0x29a/0x2a0 [ 349.454515] __msan_warning+0x7a/0xf0 [ 349.458345] gue_err+0x514/0xfa0 [ 349.461758] ? fou_build_header+0x690/0x690 [ 349.466101] __udp4_lib_err+0x12e6/0x1d40 [ 349.470318] udp_err+0x74/0x90 [ 349.473536] ? __udp4_lib_err+0x1d40/0x1d40 [ 349.477887] icmp_unreach+0xb65/0x1070 [ 349.481815] ? icmp_discard+0x30/0x30 [ 349.485631] icmp_rcv+0x11a1/0x1950 [ 349.489293] ? local_bh_enable+0x40/0x40 17:48:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@mcast2, 0x0, r1}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40080, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000140)={0x4}, 0x4) ptrace$getenv(0x4201, r2, 0x847, &(0x7f00000000c0)) [ 349.493392] ? local_bh_enable+0x40/0x40 [ 349.497487] ip_protocol_deliver_rcu+0x584/0xbb0 [ 349.502281] ip_local_deliver+0x624/0x7b0 [ 349.506479] ? ip_local_deliver+0x7b0/0x7b0 [ 349.510829] ? ip_protocol_deliver_rcu+0xbb0/0xbb0 [ 349.515783] ip_rcv+0x6bd/0x740 [ 349.519100] ? ip_rcv_core+0x11d0/0x11d0 [ 349.523190] process_backlog+0x756/0x10e0 [ 349.527383] ? ip_local_deliver_finish+0x320/0x320 [ 349.532359] ? rps_trigger_softirq+0x2e0/0x2e0 [ 349.536969] net_rx_action+0x78b/0x1a60 [ 349.541029] ? net_tx_action+0xca0/0xca0 [ 349.545123] __do_softirq+0x53f/0x93a [ 349.548962] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 349.554178] ? ksoftirqd_should_run+0x30/0x30 [ 349.558697] run_ksoftirqd+0x26/0x50 [ 349.562428] smpboot_thread_fn+0x4d0/0x9f0 [ 349.566713] kthread+0x4a1/0x4e0 [ 349.570100] ? cpu_report_death+0x190/0x190 [ 349.574443] ? schedule_tail+0x1b2/0x410 [ 349.578575] ? kthread_blkcg+0xf0/0xf0 [ 349.582488] ret_from_fork+0x35/0x40 [ 349.587215] Kernel Offset: disabled [ 349.590845] Rebooting in 86400 seconds..