[ 58.211773] audit: type=1800 audit(1539231526.241:27): pid=6056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 59.618810] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.880150] random: sshd: uninitialized urandom read (32 bytes read) [ 63.424191] random: sshd: uninitialized urandom read (32 bytes read) [ 66.135118] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. [ 72.009755] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 04:19:02 fuzzer started [ 76.707205] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 04:19:07 dialing manager at 10.128.0.26:39089 2018/10/11 04:19:07 syscalls: 1 2018/10/11 04:19:07 code coverage: enabled 2018/10/11 04:19:07 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 04:19:07 setuid sandbox: enabled 2018/10/11 04:19:07 namespace sandbox: enabled 2018/10/11 04:19:07 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 04:19:07 fault injection: enabled 2018/10/11 04:19:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 04:19:07 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 04:19:07 net device setup: enabled [ 81.690266] random: crng init done 04:21:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x5c) [ 207.772258] IPVS: ftp: loaded support on port[0] = 21 [ 208.721491] ip (6232) used greatest stack depth: 53056 bytes left [ 209.165802] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.172402] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.181069] device bridge_slave_0 entered promiscuous mode [ 209.371245] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.377815] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.386592] device bridge_slave_1 entered promiscuous mode [ 209.556489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.733672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.167848] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.317212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.599087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.606420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:21:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha512_mb\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xc5) sendfile(r1, r3, &(0x7f00000000c0), 0xffffffff000) [ 211.050367] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.059036] team0: Port device team_slave_0 added [ 211.291270] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.299714] team0: Port device team_slave_1 added [ 211.552836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.559921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.569162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.873114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.880187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.912812] IPVS: ftp: loaded support on port[0] = 21 [ 211.913733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.050958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.059046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.068379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.260888] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.268808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.278085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.057667] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.064221] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.072870] device bridge_slave_0 entered promiscuous mode [ 214.316419] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.323041] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.331846] device bridge_slave_1 entered promiscuous mode [ 214.508006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.746077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.839628] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.846212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.853316] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.859779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.869098] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.301404] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.453505] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.622062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.723091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.730167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.975288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.982573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.657558] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.665874] team0: Port device team_slave_0 added [ 216.889729] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 216.898092] team0: Port device team_slave_1 added 04:21:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x10000014e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1000000000001, 0x264) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000005480)=[{{&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000800)="05", 0x1}], 0x1, &(0x7f00000009c0)}}], 0x1, 0x4c000) sendmmsg(r0, &(0x7f0000005a40)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000012c0)='*', 0x1}], 0x1, &(0x7f00000057c0)}}], 0x1, 0x4000000) [ 217.160994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.168690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.177909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.499031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.508434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.519522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.693821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.701458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.711001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.021912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.029672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.039049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.213082] IPVS: ftp: loaded support on port[0] = 21 [ 221.034523] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.040989] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.049725] device bridge_slave_0 entered promiscuous mode [ 221.194777] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.201266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.208385] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.214951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.224082] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.384821] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.391308] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.400007] device bridge_slave_1 entered promiscuous mode [ 221.542143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.719817] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.044530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.808326] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.196132] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.458416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.466148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.807070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.815000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.725971] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.734451] team0: Port device team_slave_0 added [ 225.021987] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.030238] team0: Port device team_slave_1 added 04:21:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480802faffffff0000000026db47c70e03414f39c154db60eca9b800000000000000000000000000000000000000000000000000f700000000000000000000000000000000000000fc5ac251162590b125f8aa00a22e2a6035583b32bb13ddd37296a9e8abb1e2278b822410014eebba9c8e4f74488e134bf6"], 0x1}}, 0x0) [ 225.401257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.408459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.417720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.747050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.756493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.765406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.153967] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.175069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.184750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.539374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.547151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.556432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.802157] IPVS: ftp: loaded support on port[0] = 21 [ 226.858443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.174309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.411272] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.418065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.426307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.193688] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.200175] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.209139] device bridge_slave_0 entered promiscuous mode [ 230.537104] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.543768] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.552662] device bridge_slave_1 entered promiscuous mode [ 230.776314] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.782887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.789845] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.796440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.805459] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.882684] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.993745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.360839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.624483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.405180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.789069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.145386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.152604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.515834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.523392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.612436] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.620627] team0: Port device team_slave_0 added [ 235.000221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.008611] team0: Port device team_slave_1 added [ 235.408344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 235.415594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.424798] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.437773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.746690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 235.753959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.763193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:21:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f00000004c0)) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040), &(0x7f0000000340)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000580)={0x0, 0x70}) accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@loopback}, 0x14) pwritev(0xffffffffffffffff, &(0x7f0000002b40), 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) eventfd2(0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) write$binfmt_script(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xff3) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x8}, 0x8) close(r0) [ 236.189461] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.197236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.206222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.674754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.682469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.691391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.998969] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.630364] IPVS: ftp: loaded support on port[0] = 21 [ 238.755424] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.762005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.770172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.419276] 8021q: adding VLAN 0 to HW filter on device team0 04:21:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x200000000000035a) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@empty, @rand_addr}, 0x10) [ 241.513936] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.520420] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.529321] device bridge_slave_0 entered promiscuous mode [ 241.682851] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.689346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.696452] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.702981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.712354] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 04:21:49 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000001700)='fd/3\x00') ppoll(&(0x7f0000000040)=[{r2, 0x10}, {r0, 0x1000}, {r1, 0x140}], 0x3, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)={0x3f}, 0x8) dup2(r0, r1) [ 241.871947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.093868] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.100380] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.109134] device bridge_slave_1 entered promiscuous mode 04:21:50 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000001700)='fd/3\x00') ppoll(&(0x7f0000000040)=[{r2, 0x10}, {r0, 0x1000}, {r1, 0x140}], 0x3, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)={0x3f}, 0x8) dup2(r0, r1) [ 242.657759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:21:51 executing program 0: socket$unix(0x1, 0x1, 0x0) r0 = socket$inet_sctp(0x2, 0x4, 0x84) r1 = getpgid(0xffffffffffffffff) ptrace$setsig(0x4203, r1, 0x90000000000000, &(0x7f0000000000)={0x37, 0x7fff, 0xfffffffffffffb1b}) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x1ff, 0x1, r1}) sendto$inet(r0, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x408000, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000340)={0x18, 0x0, 0x6, {0x7}}, 0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x6, @local, 0x5}}, 0x0, 0x0, 0x0, 0x10000, 0x34}, 0x98) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r0}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x1dd, 0x1, 0xa431, 0x1fffffffe0000000, 0x2}, 0xc) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x101000, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f00000002c0)={0x4, 0xffffffff, 0x5, 0x8, 0x5, 0x8}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) [ 243.086710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:21:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="14080003150001040000030000000010cf5d993081bba2d5e5e4bb8db1fc7c00"], 0x14}}, 0x0) socket$netlink(0x10, 0x3, 0x228f252df6c77f59) 04:21:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000680)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x400, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000400)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)=0x0) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000a80)={0x200, 0xfffffffffffffff5, 0x1, [{{0x3, 0x3, 0x977, 0x2, 0x4, 0x7, {0x0, 0x9, 0x4, 0x0, 0x101, 0x10001, 0xc0d, 0x4, 0xfff, 0x1, 0x3ff, r4, r5, 0x84, 0x7fffffff}}, {0x1, 0x7fff, 0x4, 0xec, 'proc'}}, {{0x6, 0x0, 0x80, 0x101, 0x2, 0x4, {0x5, 0xffffffffffffffc0, 0xfffffffffffffff8, 0x6, 0x56c80daf, 0x3ff, 0xe3, 0x800000000, 0x1, 0x7, 0x100000000, r6, r7, 0x1, 0x1}}, {0x3, 0x6, 0xa, 0xfffffffffffffc00, '/dev/rtc0\x00'}}, {{0x3, 0x3, 0x10001, 0x4, 0x1, 0x2, {0x4, 0xfffffffffffffffe, 0x1, 0x200, 0xfff, 0x80, 0x7, 0xdb22, 0xad6, 0x1, 0x6, r8, r9, 0x8, 0x7}}, {0x5, 0x9, 0xa, 0x0, '/dev/rtc0\x00'}}]}, 0x200) r10 = syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x7ff, 0x400000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r2, 0x100000000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e20, 0x9, @loopback, 0xff}}}, 0x118) sendfile(r1, r0, &(0x7f0000000040), 0xcf) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000480)=0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x100000000, 0x0, 0x79a67f04, 0x80000000}, &(0x7f0000000540)=0x18) r13 = syz_genetlink_get_family_id$nbd(&(0x7f0000000d40)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r10, &(0x7f0000000e40)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d80)={0x4c, r13, 0xc22, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r10}, {0x8, 0x1, r3}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24004010}, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000580)={r12, 0x7}, &(0x7f00000005c0)=0x8) pipe(&(0x7f0000000e80)={0xffffffffffffffff}) write$FUSE_BMAP(r15, &(0x7f0000000ec0)={0x18, 0x0, 0x6, {0x80}}, 0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000000640)={r14, 0x20, 0x5, 0x0, 0xffffffffffffc217, 0x2}, 0x14) sched_setaffinity(r11, 0x8, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000c80)={0x2, [0x0, 0x0]}, &(0x7f0000000cc0)=0xc) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x9}, 0x28, 0x0) r16 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400800) write$P9_ROPEN(r16, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x9, 0x0, 0x3}, 0x5}}, 0x18) [ 244.536964] bond0: Enslaving bond_slave_0 as an active interface with an up link 04:21:53 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r3, 0x1, 0xa, r3, &(0x7f0000000100)='./file0\x00') [ 244.984692] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.403832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 245.410940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:21:53 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r3, 0x1, 0xa, r3, &(0x7f0000000100)='./file0\x00') [ 245.823903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 245.831154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.050187] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.058849] team0: Port device team_slave_0 added [ 247.387079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.395642] team0: Port device team_slave_1 added [ 247.743617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.750821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.759834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.058620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.169240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.176687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.185666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.481797] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.489611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.498742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.828813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.836974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.846014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.147728] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:21:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 250.484895] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.491487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.500157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.388246] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.748175] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.754853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.762118] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.768633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.777709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.785394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.996226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.868659] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.660765] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.667383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.675380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.860287] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:22:05 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r3, 0x1, 0xa, r3, &(0x7f0000000100)='./file0\x00') [ 257.557996] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.493689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.046023] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.590152] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.596640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.604703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:22:09 executing program 3: [ 261.164607] 8021q: adding VLAN 0 to HW filter on device team0 04:22:11 executing program 4: 04:22:11 executing program 2: 04:22:11 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ptrace(0xffffffffffffffff, r0) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x80000) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f00000000c0)=0x5) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000100)={r3, 0x7, 0x7ff, "efd0db402730f0230fdc05441e5c18bb9e2e5a77e6a53d1b0861b6844830f0a100d0575a4ce0d8cf9b05249df20557580d754b1be2a0707535d6a2ea0a1650adcccd573b59c0aa6342b647c62b420479403b476d2f02c57d05208d0fa84dadae9bdfed9e85851af3b7074b451b254ef36eee5517db438a54679abb4eb476dec8f51dd56892b5ef059465ee836af2d40ea30a2c418eed2982677ddb99b973311bbe4a3d1b483a201c300b7871c3468f9a65f67c66a0aade10270c32"}) r4 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x4, 0x6000) r5 = dup3(r4, r4, 0x80000) getsockopt$inet_tcp_buf(r5, 0x6, 0x1f, &(0x7f0000000240)=""/246, &(0x7f0000000340)=0xf6) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f00000003c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f0000000380)=[{}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000004c0)={0x6, 0x9, 0x3}) getsockname$inet(r3, &(0x7f0000000500)={0x2, 0x0, @rand_addr}, &(0x7f0000000540)=0x10) lsetxattr$system_posix_acl(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x7, r1}, {0x2, 0x3, r1}, {0x2, 0x5, r1}, {0x2, 0x7, r1}, {0x2, 0x1, r1}, {0x2, 0x2, r1}, {0x2, 0x4, r1}], {0x4, 0x2}, [{0x8, 0x4, r2}, {0x8, 0x2, r2}, {0x8, 0x4, r2}, {0x8, 0x1, r2}, {0x8, 0x7, r2}, {0x8, 0x2, r2}, {0x8, 0x5, r2}, {0x8, 0x1, r2}], {0x10, 0x7}, {0x20, 0x5}}, 0xa4, 0x3) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f00000006c0), &(0x7f0000000700)=0x4) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000740)='trusted.overlay.redirect\x00', &(0x7f0000000780)='./file0\x00', 0x8, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000840)={0x8, 0x120, 0xfa00, {0x0, {0xaf, 0x0, "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", 0xc, 0x6, 0x0, 0x0, 0x3, 0x1, 0x4, 0x1}, r6}}, 0x128) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000980)={0x0, 0x3, 0x0, 0x0, 0x7, 0x8001, 0x8, 0x3, {0x0, @in6={{0xa, 0x4e20, 0x7fe000000000000, @local, 0x4}}, 0x783, 0x8001, 0x5, 0x3, 0x7}}, &(0x7f0000000a40)=0xb0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000a80)={r7, 0x2}, &(0x7f0000000ac0)=0x8) sendto$inet(r3, &(0x7f0000000b00)="b7c1d38cf2e7b79059b84d591ab8894503e18abeb5e5fd32e8b77ded995b6562ab5a0f258d5abcd154296c9132d89af703ffad4f2f49d0ecad121f3cf098c5562068ec2959bc", 0x46, 0x4004010, &(0x7f0000000b80)={0x2, 0x4e20}, 0x10) ptrace(0x420f, r0) ioctl$KDMKTONE(r5, 0x4b30, 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000bc0)={0x9, 0xa, 0x0, 0x1, r7}, &(0x7f0000000c00)=0x10) rt_sigaction(0x2c, &(0x7f0000000d00)={&(0x7f0000000c40)="f36541e64a26640f7ec4d9e8c46191ed94ef60f5f4e8c441e1fe74082bc4e27932fac481dddea47e0a0000002e660f3a420440f23664420fe3490ec42265366300", {0x9779}, 0x10000000, &(0x7f0000000cc0)="fe800010000026410f2ab137b30000f2436c2e26363e360fdec8c4c15df9d48fe818a6e465c4a209bc5e05c4a165ddf0f2410fb6e7360f0def"}, &(0x7f0000000dc0)={&(0x7f0000000d40)="c4810c59ec47d232c44242f7fbc401fdebeff26cdaddc4a2daf54ee2c4618df92577bb00000fd40f64476690", {}, 0x0, &(0x7f0000000d80)="660f5d6f9926660f3a0e1a67c461b9d3af04000000c4817850e167f30f2c33c4413173ff003ef30fbdd7c4827d186700c441e1d936c4c17e127dc0"}, 0x8, &(0x7f0000000e00)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000e40)={0x0}) r9 = mmap$binder(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0xa, 0x150013, r5, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000fc0)={0x30, 0x0, &(0x7f0000000e80)=[@dead_binder_done={0x40086310, 0x2}, @exit_looper, @acquire_done={0x40106309, r8, 0x2}, @free_buffer={0x40086303, r9}], 0xfb, 0x0, &(0x7f0000000ec0)="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"}) ioctl$KIOCSOUND(r3, 0x4b2f, 0x8) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000001100)={&(0x7f0000001000), 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x3c, r10, 0x14, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7b23}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x10) 04:22:11 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r3, 0x1, 0xa, r3, &(0x7f0000000100)='./file0\x00') 04:22:11 executing program 3: 04:22:11 executing program 1: 04:22:11 executing program 1: 04:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x200000000000035a) connect$unix(r1, &(0x7f0000000000)=@file={0x0, '.\x00'}, 0x6e) 04:22:11 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:11 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) fanotify_mark(0xffffffffffffffff, 0x1, 0xa, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 04:22:11 executing program 4: rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000400)=0x6e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') lseek(r0, 0xfffffffffffffffd, 0x3) 04:22:12 executing program 1: clone(0x40000000000200, &(0x7f0000000180), &(0x7f00000004c0), &(0x7f0000000040), &(0x7f0000000200)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000d00), &(0x7f0000775000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='io\x00') pread64(r0, &(0x7f00009f3000), 0x352, 0x0) lseek(r0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x0) 04:22:12 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}]}) 04:22:12 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) fanotify_mark(0xffffffffffffffff, 0x1, 0xa, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 264.560687] binder: 7536:7539 transaction failed 29189/-22, size 0-0 line 2855 [ 264.595081] binder: undelivered TRANSACTION_ERROR: 29189 [ 265.089696] IPVS: ftp: loaded support on port[0] = 21 [ 265.837895] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.844414] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.852953] device bridge_slave_0 entered promiscuous mode [ 265.937339] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.943898] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.951764] device bridge_slave_1 entered promiscuous mode [ 266.030683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 266.108919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 266.351372] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.435462] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.517128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 266.524144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.604713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 266.611927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.850453] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.858239] team0: Port device team_slave_0 added [ 266.935711] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.943422] team0: Port device team_slave_1 added [ 267.022755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.107071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.188747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.196241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.205623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.284900] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.292661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.301553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.209403] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.215892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.222912] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.229400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.238346] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.532310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.491916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.793186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.091254] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.097721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.106103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.400887] 8021q: adding VLAN 0 to HW filter on device team0 04:22:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000003c0)) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f00000002c0)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x1578) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x3}, 0x20) ioctl(r1, 0xffffffffffffffff, &(0x7f0000000040)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 04:22:22 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:22 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=""/153}, 0x18) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000580)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x0, 0xde3}, 0xc) 04:22:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000300), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x7f}], 0xd8) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) 04:22:22 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) memfd_create(&(0x7f0000000040)='\x00', 0x1) fanotify_mark(0xffffffffffffffff, 0x1, 0xa, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 04:22:22 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) io_setup(0x3, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000580)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x3, r0}]) 04:22:22 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)="02527ee86cfffa2749c3f07867c37e3967", 0x11}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) [ 274.671706] hrtimer: interrupt took 134061 ns 04:22:22 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) io_setup(0x3, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000580)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x3, r0}]) 04:22:23 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f00000001c0)=@hci={0x1f, r2, 0x1}, 0x80) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r3, 0x1, 0xa, r3, &(0x7f0000000100)='./file0\x00') 04:22:23 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:23 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r2, 0x1, 0xa, r2, &(0x7f0000000100)='./file0\x00') 04:22:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000000)={0x14, 0x15, 0x5, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 04:22:23 executing program 3: getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x4000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x0) 04:22:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket(0x0, 0x3, 0xff) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x3c, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x2}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:22:23 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=""/153}, 0x18) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000580)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x0, 0xde3}, 0xc) 04:22:24 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r2, 0x1, 0xa, r2, &(0x7f0000000100)='./file0\x00') [ 276.083378] binder: 7847:7857 transaction failed 29189/-22, size 24-8 line 2855 [ 276.194219] binder: 7847:7852 transaction failed 29189/-22, size 24-8 line 2855 04:22:24 executing program 3: getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:24 executing program 4: socket$xdp(0x2c, 0x3, 0x0) io_setup(0x101, &(0x7f0000000080)=0x0) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x1}]) 04:22:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x61) read(r0, &(0x7f0000000000)=""/11, 0x1049a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000300)=""/156) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) 04:22:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x22102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x200000000000035a) read(r1, &(0x7f00000001c0)=""/74, 0x4a) 04:22:24 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev}}}, 0xa0) 04:22:24 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r1, 0x1, 0xa, r1, &(0x7f0000000100)='./file0\x00') 04:22:24 executing program 3: getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:25 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000bd4000/0x18000)=nil, &(0x7f0000000400)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x2, &(0x7f00000002c0)=[@dstype0={0x6, 0x8}], 0x1000000000000180) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 04:22:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 04:22:25 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16]], 0xfffffffffffffff0}}, 0x8000) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r1, 0x1, 0xa, r1, &(0x7f0000000100)='./file0\x00') 04:22:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)="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", 0x229}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) 04:22:25 executing program 3: socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) [ 277.352302] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:22:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000000140)='pstore\x00', 0x0, 0x0) 04:22:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 04:22:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)="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", 0x229}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) 04:22:25 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r0, 0x1, 0xa, r0, &(0x7f0000000100)='./file0\x00') 04:22:26 executing program 3: socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x500100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[{}, {0x3, 0x80}], 0x200000000000035a) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) 04:22:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x404c534a, &(0x7f00000004c0)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000015) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 04:22:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)="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", 0x229}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) 04:22:26 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r0, 0x1, 0xa, r0, &(0x7f0000000100)='./file0\x00') 04:22:26 executing program 3: socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)=0x199) 04:22:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 04:22:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)="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", 0x229}], 0x1, &(0x7f0000000140)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) 04:22:26 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r0, 0x1, 0xa, r0, &(0x7f0000000100)='./file0\x00') 04:22:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") munmap(&(0x7f0000000000/0xd000)=nil, 0xd000) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) read(r2, &(0x7f0000000400)=""/91, 0x214) 04:22:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 04:22:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000000)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0xf000) 04:22:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(blowfish-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005a00)=[{{&(0x7f0000001bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c40)=""/180, 0x34000}], 0x1, &(0x7f0000001e40)=""/213, 0xd5}}], 0x1c5, 0x0, &(0x7f0000005c00)={0x77359400}) [ 279.313788] ================================================================== [ 279.322534] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 279.330468] CPU: 1 PID: 7974 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #66 [ 279.337681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.347070] Call Trace: [ 279.349694] dump_stack+0x306/0x460 [ 279.353356] ? vmx_set_constant_host_state+0x1778/0x1830 [ 279.358856] kmsan_report+0x1a2/0x2e0 [ 279.362700] __msan_warning+0x7c/0xe0 [ 279.366547] vmx_set_constant_host_state+0x1778/0x1830 [ 279.371863] vmx_create_vcpu+0x3e6f/0x7870 [ 279.376130] ? kmsan_set_origin_inline+0x6b/0x120 [ 279.381015] ? __msan_poison_alloca+0x17a/0x210 [ 279.385993] ? vmx_vm_init+0x340/0x340 [ 279.390176] kvm_arch_vcpu_create+0x25d/0x2f0 [ 279.394712] kvm_vm_ioctl+0x13fd/0x33d0 [ 279.398740] ? __msan_poison_alloca+0x17a/0x210 [ 279.403866] ? do_vfs_ioctl+0x18a/0x2810 [ 279.407967] ? __se_sys_ioctl+0x1da/0x270 04:22:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000240)=""/46, 0x2e}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{}], 0x18) [ 279.412280] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 279.417165] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 279.422043] do_vfs_ioctl+0xcf3/0x2810 [ 279.425988] ? security_file_ioctl+0x92/0x200 [ 279.430536] __se_sys_ioctl+0x1da/0x270 [ 279.434561] __x64_sys_ioctl+0x4a/0x70 [ 279.438495] do_syscall_64+0xbe/0x100 [ 279.442332] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 279.447544] RIP: 0033:0x457519 [ 279.450768] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.471018] RSP: 002b:00007fb7dfb2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.479049] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 279.486341] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 279.493644] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 279.500952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7dfb2b6d4 [ 279.508550] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 279.515859] [ 279.517507] Local variable description: ----dt@vmx_set_constant_host_state [ 279.524529] Variable was created at: [ 279.528283] vmx_set_constant_host_state+0x2b0/0x1830 [ 279.533508] vmx_create_vcpu+0x3e6f/0x7870 [ 279.537751] ================================================================== [ 279.545123] Disabling lock debugging due to kernel taint [ 279.550599] Kernel panic - not syncing: panic_on_warn set ... [ 279.550599] [ 279.558017] CPU: 1 PID: 7974 Comm: syz-executor2 Tainted: G B 4.19.0-rc4+ #66 [ 279.567162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.576538] Call Trace: [ 279.579170] dump_stack+0x306/0x460 [ 279.582851] panic+0x54c/0xafa [ 279.586114] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 279.591615] kmsan_report+0x2d3/0x2e0 [ 279.595473] __msan_warning+0x7c/0xe0 [ 279.599320] vmx_set_constant_host_state+0x1778/0x1830 [ 279.604673] vmx_create_vcpu+0x3e6f/0x7870 [ 279.609035] ? kmsan_set_origin_inline+0x6b/0x120 [ 279.613913] ? __msan_poison_alloca+0x17a/0x210 [ 279.618647] ? vmx_vm_init+0x340/0x340 [ 279.622581] kvm_arch_vcpu_create+0x25d/0x2f0 [ 279.627135] kvm_vm_ioctl+0x13fd/0x33d0 [ 279.631153] ? __msan_poison_alloca+0x17a/0x210 [ 279.635869] ? do_vfs_ioctl+0x18a/0x2810 [ 279.639957] ? __se_sys_ioctl+0x1da/0x270 [ 279.644167] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 279.649040] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 279.654180] do_vfs_ioctl+0xcf3/0x2810 [ 279.658117] ? security_file_ioctl+0x92/0x200 04:22:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x404c534a, &(0x7f00000004c0)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc0105303, &(0x7f00000002c0)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000015) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 04:22:27 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x800) fanotify_mark(r0, 0x1, 0xa, r0, &(0x7f0000000100)='./file0\x00') 04:22:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) [ 279.662664] __se_sys_ioctl+0x1da/0x270 [ 279.666685] __x64_sys_ioctl+0x4a/0x70 [ 279.670601] do_syscall_64+0xbe/0x100 [ 279.674446] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 279.679661] RIP: 0033:0x457519 [ 279.682873] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.701810] RSP: 002b:00007fb7dfb2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.709556] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 279.716860] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 279.724154] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 279.731443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7dfb2b6d4 [ 279.738740] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 279.747065] Kernel Offset: disabled [ 279.750703] Rebooting in 86400 seconds..