[ 56.473870] audit: type=1800 audit(1538691569.521:27): pid=6082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.127923] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 61.388981] random: sshd: uninitialized urandom read (32 bytes read) [ 61.810907] random: sshd: uninitialized urandom read (32 bytes read) [ 63.954974] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. [ 69.674558] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/04 22:19:44 fuzzer started [ 74.267843] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/04 22:19:49 dialing manager at 10.128.0.26:36867 2018/10/04 22:19:49 syscalls: 1 2018/10/04 22:19:49 code coverage: enabled 2018/10/04 22:19:49 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/04 22:19:49 setuid sandbox: enabled 2018/10/04 22:19:49 namespace sandbox: enabled 2018/10/04 22:19:49 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/04 22:19:49 fault injection: enabled 2018/10/04 22:19:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/04 22:19:49 net packed injection: enabled 2018/10/04 22:19:49 net device setup: enabled [ 78.735800] random: crng init done 22:21:44 executing program 0: [ 192.249706] IPVS: ftp: loaded support on port[0] = 21 [ 194.602631] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.609124] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.617811] device bridge_slave_0 entered promiscuous mode [ 194.782465] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.788977] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.798115] device bridge_slave_1 entered promiscuous mode [ 194.937950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.075401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 22:21:48 executing program 1: [ 195.559625] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.777219] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.063192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 196.070300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.156378] IPVS: ftp: loaded support on port[0] = 21 [ 196.335766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.342989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.196515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 197.205081] team0: Port device team_slave_0 added [ 197.418340] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 197.426549] team0: Port device team_slave_1 added [ 197.621575] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.628797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.638090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.910852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.918165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.927192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.136403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 198.144250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.153585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.351997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 198.359648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.368976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.277756] ip (6355) used greatest stack depth: 53056 bytes left [ 199.837095] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.844347] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.853072] device bridge_slave_0 entered promiscuous mode [ 200.145374] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.152211] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.160718] device bridge_slave_1 entered promiscuous mode [ 200.393216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.615246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 22:21:53 executing program 2: [ 200.863717] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.870226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.877319] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.883862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.892804] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.092231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.328208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.637968] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.703578] IPVS: ftp: loaded support on port[0] = 21 [ 201.954687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 201.961921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.257090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.264486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.053909] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.062351] team0: Port device team_slave_0 added [ 203.259509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.267710] team0: Port device team_slave_1 added [ 203.576067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.583477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.592515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.834461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.842398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.851228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.176599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.184319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.193545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.401541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.409435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.418669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.466773] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.473408] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.481966] device bridge_slave_0 entered promiscuous mode [ 206.814556] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.821068] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.829955] device bridge_slave_1 entered promiscuous mode [ 207.186881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.505218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.651538] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.658114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.665252] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.671792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.680756] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.217286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.288744] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.538781] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.891549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 208.899071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.134054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.141117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 22:22:02 executing program 3: [ 210.053120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.061225] team0: Port device team_slave_0 added [ 210.350867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.359105] team0: Port device team_slave_1 added [ 210.736928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.744175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.753008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.823811] IPVS: ftp: loaded support on port[0] = 21 [ 211.106580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.113864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.123038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.476048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.483876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.492971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.851725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.859292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.868630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.156704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.302588] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.615156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.621508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.629621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.780039] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.786640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.793685] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.800130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.808889] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.181933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.791778] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.066569] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.073139] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.081760] device bridge_slave_0 entered promiscuous mode [ 217.426506] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.433238] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.441949] device bridge_slave_1 entered promiscuous mode [ 217.745197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.039207] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.040666] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.390103] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.745963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.753223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:22:13 executing program 4: [ 220.115908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.123091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.336915] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.345142] team0: Port device team_slave_0 added [ 221.428362] IPVS: ftp: loaded support on port[0] = 21 [ 221.680834] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.689713] team0: Port device team_slave_1 added [ 221.909396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.004108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.011206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.020399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.366299] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.375204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.384201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.819927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.828357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.838238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.236285] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.244178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.253920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.623212] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.236023] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 225.242611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.250589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:22:19 executing program 0: [ 226.778519] 8021q: adding VLAN 0 to HW filter on device team0 22:22:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="0000000000000000000485960b96e23a4f2e05259b37b95abfafe0a9c1f839074fc611ac952523c1ef22df3a30144b088540891a7fc08d47ce602adab5770c76736a66b9dc95467c276baf48c7e8a26adfb4834e81b9ebfc43f957b0d3e5d5b57f4e57b34a657cc35d0aa62e4ab60a8e9144d2c1530d03ec66b7fa48138499d1dcb13aead071d7a431b79576ae17910ad85146d430c6a229e450195942e197e987f1b336fc8badb83c91ca885eb33978d60d7d67af486823b7501645c457bed142afad00e7a226bd466ded927bc5de83bf778f4d00827a1fc4ff9b25cfb34c5bbfd363581c4b18728d8dfe2f19") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) syz_open_procfs(r1, &(0x7f0000000180)='maps\x00') setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64MMAP\x00', &(0x7f0000000340)=']\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000440)=0x4) getdents64(r0, &(0x7f0000000380)=""/78, 0x1c) getdents64(r0, &(0x7f0000000000)=""/116, 0x26) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x6, 0x3f, 0x9, 0x32e, 0x6, 0x9, 0x6, 0x3, 0x81], 0xa, 0x1, 0x57d, 0x7, 0x2, 0xadf5, {0x5, 0x2, 0x1, 0x3f, 0x91, 0x8, 0x6329, 0x3ff, 0x8, 0x7ff, 0xed, 0xfffffffffffffffa, 0xfffffffffffffff7, 0x2, "8ece1ffdffcbf40210358f8426c2d08cd5532063de05eb5320614894deaf5c8e"}}) 22:22:20 executing program 0: syz_extract_tcp_res(&(0x7f0000000000), 0xffffffffffffff01, 0xffffffffffff0001) r0 = socket(0x10, 0x4000000000002, 0x0) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f00000004c0)={"73697430001f8000000001e000000e02", @ifru_data=&(0x7f0000000480)="466089c53cbb4e76b918a0dedbcb179294e6f31baaa23d897a3369635292f3b6"}) 22:22:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x208440, 0xc0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e20, @broadcast}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x82, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x0, 0x0, 0x54fca8a0505bc126) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x6, 0x1, 0xffffffffffff26a1, 0x1, 0x2, 0x3f, 0x2, 0x19a, 0x38, 0x2ad, 0x0, 0x9, 0x20, 0x1, 0x81, 0x180, 0x8}, [{0x70000000, 0x10001, 0x6, 0x6, 0x100, 0x8, 0x6ed6, 0x132800}], "e2f3b081bec39503425b026c12e2b04714f12cb99deaf30c6de043b0ed1d8483e2c943a17f81c24e70f07061bcba7d3b6c9855263c621e8d2d454d8dbb40096602579fbb54acf9adffa1325c7f01fb9cc9a0f67cea0550f568a04fe5f8969ea9a59ce1a0d269a9be3e8944f90e6cf0e2e15df054fee5391e929ae0ff1e34137f016a05a44b482377fe3bf6007afd3220d10719eaf14163578868b12c43df6a3b8e3bd8", [[], [], []]}, 0x3fb) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x4, @random="14614e6ded4a", 'bond_slave_1\x00'}}, 0x1e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}]}) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x2, 0x8}]}, 0xc, 0x3) [ 227.843272] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 228.027278] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.033883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.040824] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.047459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.056365] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.563139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.706738] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.713456] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.722392] device bridge_slave_0 entered promiscuous mode 22:22:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x208440, 0xc0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e20, @broadcast}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x82, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x0, 0x0, 0x54fca8a0505bc126) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x6, 0x1, 0xffffffffffff26a1, 0x1, 0x2, 0x3f, 0x2, 0x19a, 0x38, 0x2ad, 0x0, 0x9, 0x20, 0x1, 0x81, 0x180, 0x8}, [{0x70000000, 0x10001, 0x6, 0x6, 0x100, 0x8, 0x6ed6, 0x132800}], "e2f3b081bec39503425b026c12e2b04714f12cb99deaf30c6de043b0ed1d8483e2c943a17f81c24e70f07061bcba7d3b6c9855263c621e8d2d454d8dbb40096602579fbb54acf9adffa1325c7f01fb9cc9a0f67cea0550f568a04fe5f8969ea9a59ce1a0d269a9be3e8944f90e6cf0e2e15df054fee5391e929ae0ff1e34137f016a05a44b482377fe3bf6007afd3220d10719eaf14163578868b12c43df6a3b8e3bd8", [[], [], []]}, 0x3fb) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x4, @random="14614e6ded4a", 'bond_slave_1\x00'}}, 0x1e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}]}) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x2, 0x8}]}, 0xc, 0x3) [ 229.099081] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.105824] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.114458] device bridge_slave_1 entered promiscuous mode [ 229.633192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.035891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 22:22:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x208440, 0xc0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e20, @broadcast}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x82, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240)=0x3, 0x4) recvfrom(r0, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x0, 0x0, 0x54fca8a0505bc126) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x6, 0x1, 0xffffffffffff26a1, 0x1, 0x2, 0x3f, 0x2, 0x19a, 0x38, 0x2ad, 0x0, 0x9, 0x20, 0x1, 0x81, 0x180, 0x8}, [{0x70000000, 0x10001, 0x6, 0x6, 0x100, 0x8, 0x6ed6, 0x132800}], "e2f3b081bec39503425b026c12e2b04714f12cb99deaf30c6de043b0ed1d8483e2c943a17f81c24e70f07061bcba7d3b6c9855263c621e8d2d454d8dbb40096602579fbb54acf9adffa1325c7f01fb9cc9a0f67cea0550f568a04fe5f8969ea9a59ce1a0d269a9be3e8944f90e6cf0e2e15df054fee5391e929ae0ff1e34137f016a05a44b482377fe3bf6007afd3220d10719eaf14163578868b12c43df6a3b8e3bd8", [[], [], []]}, 0x3fb) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x4, @random="14614e6ded4a", 'bond_slave_1\x00'}}, 0x1e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}]}) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x2, 0x8}]}, 0xc, 0x3) [ 231.202105] bond0: Enslaving bond_slave_0 as an active interface with an up link 22:22:24 executing program 0: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)="6e657d2f6e75746c696e6b00cbfb60f335931190d64570817447d29b3deb1b3238846446") preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000040)=""/18, 0x12}, {&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000180)=""/235, 0xeb}, {&(0x7f0000000100)=""/62, 0x3e}], 0x4, 0x1a) [ 231.628862] bond0: Enslaving bond_slave_1 as an active interface with an up link 22:22:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0xfffffffffffffe24) dup2(r1, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 232.088338] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 232.095601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.255433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.450206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.457390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.346217] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.354486] team0: Port device team_slave_0 added [ 233.454350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.642528] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.650592] team0: Port device team_slave_1 added [ 233.931554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 233.938885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.947880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.295705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.303083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.312063] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.449390] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.455953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.464201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.675767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.683608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.692622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.071565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.079463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.088470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.550610] 8021q: adding VLAN 0 to HW filter on device team0 22:22:28 executing program 1: inotify_init() preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6664696e666f2f3300138ee9e4b65dcb63ea88e675a2acff65b2381d162691a6a0c346382b82ef73ea22fbe7f461519916db81ef865710a5b4ffb84efce27284") preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0xf0ff7f) [ 237.855134] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.861757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.868672] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.875208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.883673] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.890352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.929020] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.610628] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 22:22:33 executing program 2: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000000000000, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x1, 0x26c, [0x0, 0x20001000, 0x20001030, 0x2000123c], 0x0, &(0x7f0000000580), &(0x7f0000001000)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x19, 0x0, 0x0, 'vcan0\x00', 'erspan0\x00', 'bridge_slave_1\x00', 'ip6tnl0\x00', @link_local, [], @dev, [], 0x194, 0x194, 0x1dc, [@comment={'comment\x00', 0x100}]}}, @common=@log={'log\x00', 0x24, {{0x0, "46aefdc2eedaf8ff6fcbbfa67ee31e6bfa4cf9f0761ffdac96c7d300bc1d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x2f0) [ 240.884746] kernel msg: ebtables bug: please report to author: Wrong len argument [ 240.902347] hrtimer: interrupt took 34524 ns [ 241.312106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.318566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.326555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.862314] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.785548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.251148] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 22:22:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) socketpair(0x1f, 0xa, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000000c0)=r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='0\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3d2) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000400)}, 0xfffffffffffffed8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000300)='0\x00') [ 245.690940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.697320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.705280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.992938] 8021q: adding VLAN 0 to HW filter on device team0 22:22:41 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000002c0)=""/221, 0xdd}, 0x0) socketpair(0x3, 0x80000, 0xfe, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'veth1_to_team\x00', 0x200}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000500)=""/35, 0x23}], 0x2, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) getpid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89a1, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) 22:22:41 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x121000) r1 = accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) fchmod(r1, 0x88) r2 = semget$private(0x0, 0x2, 0xa418c29738cd8d49) semctl$GETZCNT(r2, 0x6, 0xf, &(0x7f00000000c0)=""/211) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@get={0x1, &(0x7f00000001c0), 0x8b7}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'bond_slave_1\x00', 0x8ebf}) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1e) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e24, @broadcast}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r3, 0x4) preadv(r0, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/226, 0xe2}, {&(0x7f00000004c0)=""/81, 0x51}], 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000700)={0x3, 0x0, &(0x7f0000000580)=""/49, &(0x7f00000005c0), &(0x7f0000000600)=""/246, 0x3000}) r4 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000740)={r3, 0x0, 0x10, 0xfff, 0x800}, &(0x7f0000000780)=0x18) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000007c0)={r3, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x7}}}, 0x84) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000940)={0x5, &(0x7f0000000880)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000a40)={r3, 0x90, &(0x7f0000000980)=[@in6={0xa, 0x4e22, 0x5, @mcast1, 0x5}, @in6={0xa, 0x4e22, 0x1000, @dev={0xfe, 0x80, [], 0xa}, 0x7e00000}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @loopback}, 0x10001}, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x1d}, 0x6}]}, &(0x7f0000000a80)=0x10) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000ac0)=0x0) tkill(r5, 0xa) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r6 = syz_open_dev$vcsa(&(0x7f0000000b00)='/dev/vcsa#\x00', 0x80, 0x408c0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000b40)="1f60239c8b70c5988cbb59fcbe8c584baa47fce3bc42db92dbcac5a0c550096aae49beb1a5510d06065e495d386f17c0d98fd5c431b43ee7b1a6c1c90bd46d555aca4ee6eaf0b5ae9c4cedb64ae90d1cd26474f34ab8c9981389e8bcc44855fee3835efad027a11d663d9e3d5bcdca6de273652ccf49e49efbad7971ddb56c3a30138560a17ea963083cf19a3f2d53e5c9348d7ebfdf5280b5fb67", 0x9b) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000c00)=0x2, 0x4) times(&(0x7f0000000c40)) ioctl$BLKROGET(r6, 0x125e, &(0x7f0000000c80)) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000cc0)=0x20) syz_open_dev$loop(&(0x7f0000000d00)='/dev/loop#\x00', 0x75ef, 0x40242) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f0000000e80)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x6c, r7, 0xc00, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4d92}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xd8000}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000ec0)={0xbeee, {{0x2, 0x4e20, @broadcast}}}, 0x88) 22:22:41 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x60ed, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cgroup.events\x00', 0x0, 0x0) r3 = gettid() ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x6, 0x5a, 0x5, 0x0, 0x2, 0x8000, 0xd, 0x51c8, 0xe536, 0xffffffffffff7fff, 0x5, 0xffffffff, 0x7, 0x8, 0x0, 0xfffffffeffffffff, 0x7, 0x6, 0x3, 0x0, 0x80000000, 0x6, 0x0, 0x400000000000, 0xfffffffffffffffe, 0xc00000000000, 0x8, 0x3, 0x6, 0x7, 0x40, 0x5, 0x800, 0x1ff, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x101, 0x80000000}, 0x0, 0x2, 0x1ff, 0x7, 0x1, 0x41a, 0x7}, r3, 0x1, r1, 0x1) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf01) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0xfc00000, 0x2, 0x800, 0x101, 0x0, 0x0, 0x80000, 0x5, 0x8, 0x6, 0x51, 0x0, 0x0, 0x0, 0x1f, 0x8000, 0x0, 0x7fffffff, 0x99f, 0x4, 0x0, 0xfffffffffffffffa, 0x2, 0xc0000, 0x81, 0x7, 0x8, 0x3, 0x8000, 0x200, 0x7fff, 0xffffffff, 0x9, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x4, @perf_config_ext={0x6, 0x3}, 0x8, 0xffffffff, 0xffffffffffffa370, 0x7, 0x53, 0x0, 0x285cac41}, r3, 0x9, 0xffffffffffffffff, 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 22:22:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000005) recvmsg(r0, &(0x7f0000006dc0)={&(0x7f00000059c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006c80), 0x0, &(0x7f0000006cc0)=""/206, 0xce}, 0x40) 22:22:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x2a93627) r1 = dup2(r0, r0) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000003c0)=""/126) write$P9_RLOPEN(r1, &(0x7f0000000080)={0xfffffffffffffefb}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 22:22:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={"76657468300000000000000000000001"}) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000500), 0xc, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="081c72010c9f0014d94e1ff97b568c00224b1bdadd4cd492dfc9aa31bde2ecb8ce1e6b4c4ff7a2bbab6c773a28250324dd0c02a3c03627874571590d046c9b94"], 0x1}}, 0x0) 22:22:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x80, &(0x7f0000000640)={0x11, 0x0, r0}, 0x14) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0x5101, &(0x7f0000000040)) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2}, 0x4) pipe2(&(0x7f0000000100), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) 22:22:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x24, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) syz_open_dev$dmmidi(&(0x7f0000001240)='/dev/dmmidi#\x00', 0x0, 0x0) 22:22:41 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x60ed, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cgroup.events\x00', 0x0, 0x0) r3 = gettid() ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x6, 0x5a, 0x5, 0x0, 0x2, 0x8000, 0xd, 0x51c8, 0xe536, 0xffffffffffff7fff, 0x5, 0xffffffff, 0x7, 0x8, 0x0, 0xfffffffeffffffff, 0x7, 0x6, 0x3, 0x0, 0x80000000, 0x6, 0x0, 0x400000000000, 0xfffffffffffffffe, 0xc00000000000, 0x8, 0x3, 0x6, 0x7, 0x40, 0x5, 0x800, 0x1ff, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x101, 0x80000000}, 0x0, 0x2, 0x1ff, 0x7, 0x1, 0x41a, 0x7}, r3, 0x1, r1, 0x1) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0xb, 0x297ef) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf01) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0xfc00000, 0x2, 0x800, 0x101, 0x0, 0x0, 0x80000, 0x5, 0x8, 0x6, 0x51, 0x0, 0x0, 0x0, 0x1f, 0x8000, 0x0, 0x7fffffff, 0x99f, 0x4, 0x0, 0xfffffffffffffffa, 0x2, 0xc0000, 0x81, 0x7, 0x8, 0x3, 0x8000, 0x200, 0x7fff, 0xffffffff, 0x9, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x4, @perf_config_ext={0x6, 0x3}, 0x8, 0xffffffff, 0xffffffffffffa370, 0x7, 0x0, 0x0, 0x285cac41}, r3, 0x9, 0xffffffffffffffff, 0x9) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) [ 250.186974] IPVS: ftp: loaded support on port[0] = 21 22:22:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)=""/230, 0xe6}], 0x1}}], 0x624, 0x0, &(0x7f0000008bc0)={0x0, 0x989680}) 22:22:42 executing program 3: gettid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$cgroup_int(r0, &(0x7f0000000100), 0x12) 22:22:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0x189c40, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") read$FUSE(r0, &(0x7f0000005000), 0x170e) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) dup3(r1, r0, 0x0) 22:22:43 executing program 4: gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 251.662302] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 251.673801] clocksource: 'acpi_pm' wd_now: 3e828 wd_last: 3bf861 mask: ffffff [ 251.683511] clocksource: 'tsc' cs_now: 8c7abb52e3 cs_last: 8a84e82c8c mask: ffffffffffffffff [ 251.694380] tsc: Marking TSC unstable due to clocksource watchdog [ 251.710765] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 251.720015] sched_clock: Marking unstable (251779166450, -68426801)<-(251835199781, -124459582) [ 251.734230] clocksource: Switched to clocksource acpi_pm [ 252.588051] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.594614] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.602689] device bridge_slave_0 entered promiscuous mode [ 252.680929] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.687530] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.695799] device bridge_slave_1 entered promiscuous mode [ 252.774154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.853225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.089933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.174199] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.334236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.341185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.576608] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.584293] team0: Port device team_slave_0 added [ 253.660953] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.668616] team0: Port device team_slave_1 added [ 253.745340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.826136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.909151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.916550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.925710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.005017] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 254.012700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.021333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.887598] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.894106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.900855] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.907450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.915276] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.282133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.300735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.614804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.917291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.923717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.931304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.233007] 8021q: adding VLAN 0 to HW filter on device team0 22:22:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cgroup.events\x00', 0x0, 0x0) gettid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 22:22:54 executing program 1: socket$inet(0x2, 0xa, 0x0) r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x8000}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup2(r0, 0xffffffffffffffff) 22:22:54 executing program 3: gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 22:22:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0x189c40, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") read$FUSE(r0, &(0x7f0000005000), 0x170e) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) dup3(r1, r0, 0x0) 22:22:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) 22:22:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 261.322255] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) [ 261.399076] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 261.445983] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 261.491093] ================================================================== [ 261.491822] BUG: KMSAN: uninit-value in __vmx_flush_tlb+0x755/0x790 [ 261.491822] CPU: 1 PID: 7914 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #63 [ 261.491822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.491822] Call Trace: [ 261.491822] dump_stack+0x306/0x460 [ 261.491822] ? __vmx_flush_tlb+0x755/0x790 [ 261.491822] kmsan_report+0x1a3/0x2d0 [ 261.491822] __msan_warning+0x7c/0xe0 [ 261.491822] __vmx_flush_tlb+0x755/0x790 [ 261.491822] vmx_flush_tlb+0x94/0xb0 [ 261.491822] ? vmx_set_rflags+0x740/0x740 [ 261.491822] kvm_mmu_load+0x1656/0x3460 [ 261.491822] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 261.491822] ? kvm_hv_setup_tsc_page+0x9f/0x890 [ 261.491822] ? vmx_set_cr0+0x3510/0x3510 [ 261.491822] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 261.491822] ? update_cfs_rq_load_avg+0x5df/0xa00 [ 261.491822] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 261.491822] ? __list_add_valid+0xb8/0x450 [ 261.491822] ? kmsan_set_origin+0x83/0x140 [ 261.491822] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 261.491822] ? __msan_get_context_state+0x9/0x30 [ 261.491822] ? INIT_BOOL+0xc/0x30 [ 261.491822] ? mutex_lock_killable+0x2c5/0x420 [ 261.491822] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 261.491822] ? do_vfs_ioctl+0x18a/0x2810 [ 261.491822] ? __se_sys_ioctl+0x1da/0x270 [ 261.491822] ? kvm_vm_release+0x90/0x90 [ 261.491822] do_vfs_ioctl+0xcf3/0x2810 [ 261.631466] ? security_file_ioctl+0x92/0x200 [ 261.631466] __se_sys_ioctl+0x1da/0x270 [ 261.640191] __x64_sys_ioctl+0x4a/0x70 [ 261.640191] do_syscall_64+0xbe/0x100 [ 261.647841] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 261.647841] RIP: 0033:0x457579 [ 261.647841] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.647841] RSP: 002b:00007ff49f73ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.684243] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 261.684243] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 261.684243] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 261.684243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff49f73f6d4 [ 261.684243] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 261.684243] [ 261.684243] Local variable description: ----error.i.i.i@__vmx_flush_tlb [ 261.729856] Variable was created at: [ 261.731065] __vmx_flush_tlb+0x103/0x790 [ 261.731065] vmx_flush_tlb+0x94/0xb0 [ 261.731065] ================================================================== [ 261.731065] Disabling lock debugging due to kernel taint [ 261.754391] Kernel panic - not syncing: panic_on_warn set ... [ 261.754391] [ 261.754391] CPU: 1 PID: 7914 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #63 [ 261.754391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.754391] Call Trace: [ 261.754391] dump_stack+0x306/0x460 [ 261.782687] panic+0x54c/0xafa [ 261.782687] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 261.782687] kmsan_report+0x2cd/0x2d0 [ 261.782687] __msan_warning+0x7c/0xe0 [ 261.782687] __vmx_flush_tlb+0x755/0x790 [ 261.782687] vmx_flush_tlb+0x94/0xb0 [ 261.782687] ? vmx_set_rflags+0x740/0x740 [ 261.782687] kvm_mmu_load+0x1656/0x3460 [ 261.782687] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 261.782687] ? kvm_hv_setup_tsc_page+0x9f/0x890 [ 261.782687] ? vmx_set_cr0+0x3510/0x3510 [ 261.782687] kvm_arch_vcpu_ioctl_run+0x879e/0x10a20 [ 261.782687] ? update_cfs_rq_load_avg+0x5df/0xa00 [ 261.782687] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 261.782687] ? __list_add_valid+0xb8/0x450 [ 261.782687] ? kmsan_set_origin+0x83/0x140 [ 261.782687] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 261.782687] ? __msan_get_context_state+0x9/0x30 [ 261.782687] ? INIT_BOOL+0xc/0x30 [ 261.782687] ? mutex_lock_killable+0x2c5/0x420 [ 261.782687] kvm_vcpu_ioctl+0x11a7/0x20b0 [ 261.782687] ? do_vfs_ioctl+0x18a/0x2810 [ 261.782687] ? __se_sys_ioctl+0x1da/0x270 [ 261.782687] ? kvm_vm_release+0x90/0x90 [ 261.782687] do_vfs_ioctl+0xcf3/0x2810 [ 261.782687] ? security_file_ioctl+0x92/0x200 [ 261.782687] __se_sys_ioctl+0x1da/0x270 [ 261.782687] __x64_sys_ioctl+0x4a/0x70 [ 261.782687] do_syscall_64+0xbe/0x100 [ 261.782687] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 261.782687] RIP: 0033:0x457579 [ 261.782687] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.782687] RSP: 002b:00007ff49f73ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.782687] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 261.950687] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 261.950687] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 261.950687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff49f73f6d4 [ 261.950687] R13: 00000000004c003b R14: 00000000004d0108 R15: 00000000ffffffff [ 261.950687] Kernel Offset: disabled [ 261.950687] Rebooting in 86400 seconds..