[ 57.046149] audit: type=1800 audit(1538968924.081:27): pid=6058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.654444] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 63.239001] random: sshd: uninitialized urandom read (32 bytes read) [ 63.615654] random: sshd: uninitialized urandom read (32 bytes read) [ 65.868850] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. [ 71.833517] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 03:22:21 fuzzer started [ 76.510494] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 03:22:25 dialing manager at 10.128.0.26:36867 2018/10/08 03:22:25 syscalls: 1 2018/10/08 03:22:25 code coverage: enabled 2018/10/08 03:22:25 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 03:22:25 setuid sandbox: enabled 2018/10/08 03:22:25 namespace sandbox: enabled 2018/10/08 03:22:25 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 03:22:25 fault injection: enabled 2018/10/08 03:22:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 03:22:25 net packed injection: enabled 2018/10/08 03:22:25 net device setup: enabled [ 81.579803] random: crng init done 03:24:25 executing program 0: [ 199.650827] IPVS: ftp: loaded support on port[0] = 21 [ 201.816650] ip (6253) used greatest stack depth: 53056 bytes left [ 202.115345] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.121860] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.130620] device bridge_slave_0 entered promiscuous mode [ 202.273696] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.280199] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.288799] device bridge_slave_1 entered promiscuous mode [ 202.428412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.568985] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 03:24:30 executing program 1: [ 203.018074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.265829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.500307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 203.507522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.645710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.652913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.809684] IPVS: ftp: loaded support on port[0] = 21 [ 204.228082] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.236323] team0: Port device team_slave_0 added [ 204.475561] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.483800] team0: Port device team_slave_1 added [ 204.692728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.699779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.708968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.916638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 204.923872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.932851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.150933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.158721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.167972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.467171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.474941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.484152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.626959] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.633651] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.642271] device bridge_slave_0 entered promiscuous mode [ 207.868980] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.875550] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.884412] device bridge_slave_1 entered promiscuous mode [ 207.960802] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.967401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.974476] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.980935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.990182] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.121742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.341284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.572282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.940466] bond0: Enslaving bond_slave_0 as an active interface with an up link 03:24:36 executing program 2: [ 209.244080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.629254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.636416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.986029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.993258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.349904] IPVS: ftp: loaded support on port[0] = 21 [ 210.856913] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.865134] team0: Port device team_slave_0 added [ 211.149785] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.158026] team0: Port device team_slave_1 added [ 211.541511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.548678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.557968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.774770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 211.804788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.814004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.080390] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.088184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.097324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.321084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.328871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.338207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.346770] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.353352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.360275] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.366849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.375800] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.414118] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.420571] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.429163] device bridge_slave_0 entered promiscuous mode [ 215.647841] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.654551] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.663136] device bridge_slave_1 entered promiscuous mode [ 215.921890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.932287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.266942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.008551] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.257697] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.491331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.498581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.789094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.796295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:24:45 executing program 3: [ 218.827844] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.836126] team0: Port device team_slave_0 added [ 219.194530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.202853] team0: Port device team_slave_1 added [ 219.327390] IPVS: ftp: loaded support on port[0] = 21 [ 219.571020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.578193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.587343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.868210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.875533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.884508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.142131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.237670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.245429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.254564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.620412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.628199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.637344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.475422] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.840766] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.847300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.855543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.254052] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.837337] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.843933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.850845] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.857483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.866688] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.893581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.237963] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.244635] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.253268] device bridge_slave_0 entered promiscuous mode [ 225.607663] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.614310] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.622863] device bridge_slave_1 entered promiscuous mode [ 225.978595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.319243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.455204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.915523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.223001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.230039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.580691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.589653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:24:56 executing program 4: [ 229.674029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.753631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.761599] team0: Port device team_slave_0 added [ 230.208059] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.216305] team0: Port device team_slave_1 added [ 230.614621] IPVS: ftp: loaded support on port[0] = 21 [ 230.637045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.644261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.653633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.086778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.093957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.103047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.260392] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.557473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.565171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.574358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.042118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.049691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.058847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.946582] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.953141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.961269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:25:00 executing program 0: 03:25:01 executing program 0: r0 = socket$packet(0x11, 0x20000000004, 0x300) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x4) 03:25:01 executing program 0: add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000300), &(0x7f0000000080), 0x0, 0xfffffffffffffffe) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10400, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x3}}, 0x18) [ 234.849661] 8021q: adding VLAN 0 to HW filter on device team0 03:25:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/28, 0x27c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x8c1, @time}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0x80}, 'port1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000efb000)='/dev/sequencer2\x00', 0x0, 0x0) 03:25:02 executing program 0: r0 = memfd_create(&(0x7f00000001c0)="23656d31232b00946ae5bf51f898f0871e69e88d72c744575c37d5591bd30057d1401601822e0d953173370445ec34c2c99af005298c5282f11523e4c7e98b32d9059d825cb14a67e2dddd8f2bd26b035e5b3c9adc5319c21070714ebfc700623a7116c4ff007696a882795db9f55bf42e013d5d9e642e540f8966c6ab1855bca254e80915abdaac7a2891920fda6405dc8d92c5772b626c63ee1aee240571635d9301754b86e3576d", 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000000c0)={r1, r2/1000+30000}, 0x10) write(r0, &(0x7f0000000040)='\b\x00', 0x2) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000640)="e052af2b05950eb5d9f4e546dc96c1a4e2706618708edb503d46bb01bd2aa4d557c4b55849bcd080a96c640d28994caa1c98bb3b7aca461a067c56aabd2f40841f658154c63371878d1953e68104e03ddc4771daca7eea60a93dd2f3b206de29dc1b856c9e480d9af65e5b893db19b9dff50c250cd89ad3df026b3f0f6ec3d688bd632bd6561b9e3fa4cf6e704326303c304ab31a9833e6854f27a8356e04fc3f52e434641191352ad97d7d34f255153610198", 0xb3}], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) userfaultfd(0x80000) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000), 0x10) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:25:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) timer_create(0x3, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) [ 236.486513] kauditd_printk_skb: 3 callbacks suppressed [ 236.486549] audit: type=1326 audit(1538969103.531:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6989 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 [ 236.960842] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.967417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.974464] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.980938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.989656] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.003567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.228270] audit: type=1326 audit(1538969104.271:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6989 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 03:25:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xfffffffffffffffa, 0x8000000000003, 0x1000006, 0x400000000000004, 0x0, 0xffffffffffffffff, 0xb8c}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 03:25:05 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) read$FUSE(r0, &(0x7f00000025c0), 0x1000) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0xc453, 0x9, 0x8002, 0x5, 0x1, 0x4, 0x3f, 0x80000000, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="9f8c020104000000"], &(0x7f0000000180)=0xc) ioctl$int_in(r0, 0x5421, &(0x7f00000002c0)) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) [ 238.385046] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.391529] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.399960] device bridge_slave_0 entered promiscuous mode [ 238.800687] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.807401] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.815966] device bridge_slave_1 entered promiscuous mode [ 239.158080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.538921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.864554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 241.200432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.349089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.636716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.643972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.935609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.942804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.577708] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.811345] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.820220] team0: Port device team_slave_0 added [ 243.046253] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.054587] team0: Port device team_slave_1 added [ 243.309228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.320882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.329710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.620654] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.627884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.636686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.687947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 243.694572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.702647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.916555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.924290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.933281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 03:25:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 244.319946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.327696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.336691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.712051] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.894291] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.900788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.907843] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.914419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.923353] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 246.929986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.020703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.773038] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 03:25:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x1738) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 250.405304] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.411698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.419935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.992727] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.096494] 8021q: adding VLAN 0 to HW filter on device bond0 03:25:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000140)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x2e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000601000/0x600000)=nil, 0x600000, &(0x7f0000000080)=""/144) [ 254.589099] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.915649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.922085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.929816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.219086] 8021q: adding VLAN 0 to HW filter on device team0 03:25:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000240), 0xc, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="1c0000001900050000000a00000000000a00000000000500c2660000"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:25:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind(r0, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80) 03:25:24 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 03:25:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x0, 0x10000}) 03:25:24 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff010000070000000600000000000000d01e00000000000000800000000000000700000000000000000000000000000000000000000000000000000000000000ffff0000000800000000000000000000ff070000000000000100000000000000feffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000044049400000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}}, &(0x7f00000001c0)=0xb0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ifreq(r1, 0x8917, &(0x7f0000000080)={'bond0\x00', @ifru_addrs=@can={0x1d, r2}}) close(r0) 03:25:24 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x440, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x3) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, {0x0, @in6={{0xa, 0x4e20, 0x7, @mcast2, 0x1c0000}}, 0x9, 0x7fff, 0x20, 0x8, 0x5}}, &(0x7f0000000580)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000005c0)={0x0, 0xae, 0x20}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0x4, @mcast2, 0x1ff}}, [0xff, 0x1, 0x81, 0x4, 0xfffffffffffffff7, 0x2000000, 0x81, 0x1, 0xffffffffffffffff, 0x4, 0x6, 0x2, 0x7967b7ea, 0x7, 0x8]}, &(0x7f0000000740)=0x100) sendmmsg$inet_sctp(r0, &(0x7f00000008c0)=[{&(0x7f0000000080)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000440)=[{&(0x7f00000000c0)="8ddbae78e54d622aaf7bb6b2e3c3e275cdd3b0296cb2a02a2ef0948b6f357437f7db299c2a7cdda5250c51d4880ccfe7f91e2256e239d8cf78620b502a158a67e43521225645e84fd26da9f00b15e091fc6caea5987843a3bd939b8a00c8e66fc173fa509f8ff8a2f4c0bfdafc25bd9a4a626cb50b8b13a87e604c2419886b515b4b84bfb08b489fd97d87520e4ce162595f485d0722c754d96e4bc97f8d770eb23a5bc5e9", 0xa5}, {&(0x7f0000000180)="cfdb09a3edf82c48388a6bbce03e6d5e31bbd9e0c62bbbc1e288559a7e494bea0375ae0163805a152a2df59c4bfc0d8d58719996caca898a15402ebc2e71eb9777effc0c2e4bad955b4c97b20535bd181475684c37d6c223d0efa01d5b135f7cdc223cd55ec0ee18fc956c87b9c5464340fa50f5458a904775bd73efbef3ec6dc73366886825881200aa4b12acc4b34a0a4dd9f4", 0x94}, {&(0x7f0000000240)="d5e0da8dd7113ee01e72a926f8dabb43ce1de98130e705ef4ef86c15d74ed71e5c6d32954565fbbf9abe4e15d041d3f311dd949285ffd6218044848bf163c3d49d0ada6074b6c78cd9d43789bd013fca3bba49636774b339ed6a4a2f136762d40b76d7f1f0a0c0f05c635c28c46e20b32afb6e02ea30c5720b3a3dc46a863fe27d571022b3154c23", 0x88}, {&(0x7f0000000300)="accccaf5779515d4525d6569251f11a2130c6f655e1964752336e3f13e5d728253d777548b515ca4a68784a3ec70490945c2fa015ec219c8720312a352c745f54c4083db4391947e1ea7adc27e1ac1242d0c385e32cf91aa8a4519788ebff5cdd2a8cf3be0efa6b5acc86e06fe0896bc476ee8ec8e92bae0e2d269b4c4cc332b1151f56b05e0e188a0de462a4a59ca9b7dfc2c7e61d1a9cb62677e492f9fcaaf1ff89a314ceb301e5b01f80525ed8a53d98506b60bebed0631bc", 0xba}, {&(0x7f00000003c0)="468d955913fd33abcdbc2d3043ae8e97053ce087b3d38ba7ae70dc6cb9ac5d030c5a143b3a2848f4d177247c8a68e364aeefffe6298d5590749df5bfa27a286766cbfa18c09044d92cdfc4c52d3f28f5a1d77fdec5543646d2e1999403e8ad09ff9c98f5225950c8b879acd32a58ab4617cbbd4bd365ef633d8bb8", 0x7b}], 0x5, &(0x7f0000000780)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x7, 0x8, 0x1, 0x6c9c, 0x6, 0x5, 0x8, r2}}, @authinfo={0x18, 0x84, 0x6, {0x1000}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xf}}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x3f62, 0x8000, 0x0, 0x400, 0x0, 0x5, 0x1, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xed}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @init={0x18, 0x84, 0x0, {0x8000, 0x7fffffff, 0x5, 0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x6b, 0x201, 0x1, 0x7ff, r4}}], 0x108, 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000900)={0x4, 0x5, 0x3f, 0x7, 'syz1\x00', 0x3}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000940)={0x781f, 0x9, 0x3, 0x0, 0x0, [{r0, 0x0, 0x3}, {r0}, {r0, 0x0, 0x401}]}) ioctl$KDSKBLED(r0, 0x4b65, 0x8) fsetxattr$security_evm(r0, &(0x7f00000009c0)='security.evm\x00', &(0x7f0000000a00)=@sha1={0x1, "ec7e9bf3e236424469e9af30329d113783e70b8c"}, 0x15, 0x3) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000a40), &(0x7f0000000a80)=0xb) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000ac0)=r0) r5 = fcntl$getown(r0, 0x9) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000b00)={0x3, 0x8000, 0x1, 0x1000, r1}, 0x10) r6 = inotify_add_watch(r0, &(0x7f0000000b40)='./file0\x00', 0x20000008) inotify_rm_watch(r0, r6) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000b80)=0x7, 0x1) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() getgroups(0x5, &(0x7f0000001600)=[0x0, 0x0, 0xee00, 0xee01, 0xee01]) fstat(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001740)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001840)=0xe8) r13 = getegid() r14 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0, 0x0}, &(0x7f00000018c0)=0xc) sendmsg$netlink(r0, &(0x7f0000001a00)={&(0x7f0000000bc0)=@kern={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000015c0)=[{&(0x7f0000000c00)={0x458, 0x3f, 0x1, 0x70bd28, 0x25dfdbfe, "", [@typed={0xc, 0x55, @u64=0x10001}, @typed={0x14, 0x12, @str='security.evm\x00'}, @typed={0x8, 0x8, @str='\x00'}, @typed={0x24, 0x28, @str='ppp0]selinuxsystemvmnet0$]em0^\x00'}, @generic="502b5fd5924ffbecb13420db798e7a02475b9936f9511a3565a714028d8d186e34c279759ecdb5036fb8bcdae615790476b8967fa184c28327c77166d4ecdcbd4a12b6a665730f171b4adb02dfceef7a2dd573f5fc78811a8f77f197e7d029a9b86b690d74598c54b15930cfc39fe99145c65fdf2df3fdfa604851d2fb4c982852c883618003", @generic="41ff33", @nested={0x11c, 0x42, [@generic="4ce4e4b2e8c57d9ebb628f2adb25f560e2ab906556135ad245fd1bc31d9f1e43ab290f738ed254ed8f32652a16f35407338ce9891d086d7b8e1d18100b39797ef8367888f42051deaecd9fa5e922f1375731b04cd5532b24eb6f9672eb53d124134e828ec923950d0189af7c3f0d91c2", @generic="9f35417750a940d4ae9c40", @generic="4fcc559730e50a9bf63465439e5815496e872a007b990faab3b61d2b1b584d91a2d5a2d0220e60e6d15e2f3cac008aa25310cb02612e787aac8688613dcef9cb764d1f5b62ed31d72543dde9cd874e6023fccc66d1d44ec49d9ba2ac51de423b85e3f741064686f51e17050a3f42046aa72e2a305bf9fafde280bd0be686d71bc4021464408428708757d6606561c580d0729b0753f59b607885ad"]}, @generic="42d82e7314cbc3afd396da04e8783b945f1afadfc5bf1e43841a9f491a822fb92aedf3300f0fc35483529bb56845c19145494d73ae63f986f81b65afb4de169200221ae0556d0df9c349784f07a58ef6185ed4e2e79b37aeb05a6c7bff54b14832fff455f34f850715e343e389c13e488e9001a9164a80608ddf595f1902b67d716efa9088ff7fdbadb80ad17b13540a3a85fc160b0e8a652851fac5c2ad53b41bac198060e6e577b4c8a60b5c1ab038baaa00962898e9dcf07833be79d73be7bcb40737ff5af3ea4282871611407906e2b1f341bdde57804bfcadb497a78f02c52c311995ff1c38b745109826237ef69df3659f05f3", @generic="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", @generic="cb98fa64f277c2144085fa67e16307249923e31b5a2847a051c428db5726423cef6d8fe40034b4d0d729a0491ff0a25f2f6245235871a337ee8e7d0cba06b44e57a02d90205dc1c82f4357a4235b4c123a07b4260fc1b1ae9cca07b0697cf8badf5728"]}, 0x458}, {&(0x7f0000001140)={0x228, 0x11, 0x110, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x4, 0x6d}, @nested={0x14, 0x56, [@typed={0x8, 0x3b, @uid=r7}, @typed={0x8, 0x4e, @u32=0x2}]}, @typed={0x8, 0x88, @u32=0x2}, @nested={0x100, 0x2f, [@generic="e5ff05d5b48d9faeb80bd3d145c69bb994a2bf2bbcc431b756a1bb9fc7b5b99637d34c949b93a59b45150961e21d8b44f8c2c6bd999de3006ee35d596f28b3aa9cad22c2ab691ee343d1dc3ae212fa1e0317dc4ed8501f1cc599a9ca5200ae08ebe2e6a8119408f8ca6bed5014c709d4251d9dd450848d9944714bc4e77ec4ab87be51266835378ad322b2910d88db8e0d8b16a971a54ddf2d08d0c49d727919f01b0a820162a0b4a859b3d353a86320e1cbe350e8d3f41245694c22ffd6759f67b100d6635397c111dd238585a91295e031a9348e952bce30ffef2405950eb2d542a0c46ebbdd", @generic="ae527ad9fde51e6640453adca8163d1c39b36bc0"]}, @typed={0x30, 0x40, @str='loQ&mime_typeproccgroup^(#em1-vmnet0system\x00'}, @generic="0ad8e7edcb5af1e77e764f3e423590d8fbae18c5241e71b89918d9c29cd7bab788d4e52a2a6f3342188010cb131f5a8fe26f942d48cf84666d3f2374f4b13188482d050ab0eeca36dbd16b7bbc2ef7d5165de1e2b72349d291ab629c19eedb464cb4f0a335b6542c676e9981a4057044c0322c57794da5ebe2aca2acc0a54ab9e33699cbbc918402d2de66dfaf18f9b8a4c22c6796fc287a301abaf7bb1c5ef05e8d39cf215692e045ff9545944a29b9ce7c2d0ddec925e4bf8db8b6f517cb2d729f2e813909"]}, 0x228}, {&(0x7f0000001380)={0x210, 0x1d, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x14, 0x13, @ipv6}, @typed={0x14, 0x67, @str='v+md5sum..}+.^\x00'}, @generic="22c500aa2323466d26b8887ba8aa8bfd4e709fbfcc2f5efeddb1c822b5dbf95697292b641b1c180101e4bfba0abb936b66b9490273b488cf78b46ce99f8c50453f108c7f64450c7dfbc945dfeaca15295eaf0fa64d93a304b88eb5463eae3a97c1e135435c334efd77b49a772b939acdaa3f6df1d92f5853566cff242164bea02286d7ef544e4fe2655245cbddcfeffde768c7dcad6d3c51eb4c74739d1bed5741f546fefad4a8e6222d6d5e4ecb9f811a", @nested={0x124, 0x1a, [@typed={0x8, 0x4e, @ipv4}, @typed={0x14, 0x86, @ipv6=@mcast2}, @generic="8de7576f7ae04393f01a1c81bfac41079460c311247dc68432a4eb8af79bd6055e24edb1dd2b80a4ed5bd1bdd8dbebb4fe180e9b6e6e494d", @generic="265d64ad780b16a5d1e831a5c0ebf496420ffd5c8c50004728120ed1217e0d243f74e516da1cc839b97872377dc42ef367d0c56b535484a3f35a32fe1fb6f7a27a7787ff5e0434abf01dde2557bd661c9aa252ea0e89d97eda90ab241584a1d5a1cd91a92cee2905c7c2a18d20eba94ba8b4dcc8d2b5f05cbb100b29bed1282e1cf77a1b81053dfa3927dffb44026b33a6231ba4ee8b9e7e31d9d4aaeb6cf17ae3e1dc1f83996f94a3e6b65588cfee12a807afd51ae6bfe0e607be3a52141c6da9c77b6224a39b2012"]}]}, 0x210}], 0x3, &(0x7f0000001900)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r8, r9}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r10, r11}, @cred={0x20, 0x1, 0x2, r5, r12, r13}, @cred={0x20, 0x1, 0x2, r5, r14, r15}], 0x100, 0x40000}, 0x40) openat$cgroup(r0, &(0x7f0000001a40)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001a80)=@assoc_value={r4}, &(0x7f0000001ac0)=0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c00)={'bond0\x00', &(0x7f0000001b00)=@ethtool_rxnfc={0x32, 0x0, 0xfffffffffffffff7, {0xf, @ah_ip6_spec={@empty, @ipv4={[], [], @remote}, 0x9, 0x836}, {'k>', @local, 0x9, 0x3, [0x8, 0x1]}, @sctp_ip4_spec={@dev={0xac, 0x14, 0x14, 0x19}, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e24, 0x4e20, 0x9}, {"1ec4", @local, 0x2011, 0x0, [0x3, 0x40]}, 0xe0dc}, 0x2, [0x6, 0x5]}}) 03:25:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x2, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="09b3"], 0x0, 0x0, &(0x7f00000000c0)}) 03:25:24 executing program 3: perf_event_open(&(0x7f0000001040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/111, 0x6f) [ 257.583909] binder: 7577:7580 unknown command 45833 [ 257.589154] binder: 7577:7580 ioctl c0306201 200003c0 returned -22 03:25:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000340)="7fb148d1c57802b0b14c58eb3465daa7", 0x10}], 0x1, &(0x7f0000001940)}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 03:25:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)) [ 257.671146] binder_alloc: binder_alloc_mmap_handler: 7577 20001000-20004000 already mapped failed -16 03:25:24 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f0000000400)=""/70, 0x20b, &(0x7f0000000480)=""/123}}, 0xfffffcf6) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000010000/0x4000)=nil, 0x4000}) [ 257.714349] binder: BINDER_SET_CONTEXT_MGR already set [ 257.719815] binder: 7577:7580 ioctl 40046207 0 returned -16 [ 257.822987] binder: 7577:7591 unknown command 45833 [ 257.828223] binder: 7577:7591 ioctl c0306201 200003c0 returned -22 03:25:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c000200080001000000ffff"], 0x1}}, 0x0) 03:25:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000140)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x2e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000180)="76626f786e6574302776626f786e657430cf6c6f2e2f3a00") mincore(&(0x7f0000601000/0x600000)=nil, 0x600000, &(0x7f0000000080)=""/144) 03:25:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") flistxattr(r0, &(0x7f0000000040)=""/89, 0x1b9) 03:25:25 executing program 2: r0 = socket(0xa, 0x3, 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1f, 0x80) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000000c0)={0x1, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32], &(0x7f00000001c0)=0x1) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000070100"}) fstat(0xffffffffffffffff, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) sched_getattr(r3, &(0x7f0000000100), 0x30, 0x0) 03:25:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234418dc25d766070") ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[], 0x1}) 03:25:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(r1, r3) tkill(r2, 0x1000000000016) [ 258.676450] hrtimer: interrupt took 58153 ns [ 258.889466] IPVS: ftp: loaded support on port[0] = 21 [ 258.988924] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 259.045950] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.070329] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.038292] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.044808] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.052860] device bridge_slave_0 entered promiscuous mode [ 261.135565] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.142098] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.149666] device bridge_slave_1 entered promiscuous mode [ 261.226473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.303544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.538036] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 261.621207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 261.700878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 261.707914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 261.785377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 261.792430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.027630] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 262.035410] team0: Port device team_slave_0 added [ 262.113588] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 262.121120] team0: Port device team_slave_1 added [ 262.201524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.281071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.360985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.368338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.377415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.452991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.460289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.469202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.353770] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.360220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.367238] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.373731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.381500] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 263.712930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.546422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.836552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.126118] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 267.132465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.140073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.432348] 8021q: adding VLAN 0 to HW filter on device team0 03:25:36 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[]}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x10000000000000ea) ioctl$EVIOCSFF(0xffffffffffffffff, 0x402c4580, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x7}, {0x0, 0x6d}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000100)}}) io_setup(0x0, &(0x7f0000000100)) 03:25:36 executing program 3: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}, 0x0, 0xe1}}, &(0x7f00000001c0)=0xb0) r0 = getpid() clock_gettime(0x0, &(0x7f0000000340)={0x0}) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000400)={r1}, 0x8) ptrace(0x10, r0) ptrace(0xffffffffffffffff, r0) 03:25:36 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount(&(0x7f00000003c0)=@sr0='/dev/sr0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000400), 0x4) 03:25:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x40) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x405}, 0x7) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 03:25:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x408173}, 0x3e) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:25:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/79}, 0x20000120, 0x0, 0xa4a3ad41a879dde0) [ 269.484815] 9pnet_virtio: no channels available for device /dev/sr0 [ 269.521794] 9pnet_virtio: no channels available for device /dev/sr0 03:25:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x7ba) 03:25:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100), 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0), 0x0, &(0x7f0000001bc0)}, 0x0) 03:25:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000001340)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) 03:25:37 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[]}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x10000000000000ea) ioctl$EVIOCSFF(0xffffffffffffffff, 0x402c4580, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x7}, {0x0, 0x6d}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000100)}}) io_setup(0x0, &(0x7f0000000100)) 03:25:37 executing program 2: perf_event_open(&(0x7f0000001040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xacdbf90f7b4ecd63, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) 03:25:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) sendto$inet(r0, &(0x7f0000000080)='\v0', 0x2, 0x4810, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 03:25:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 270.257684] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:25:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffc}) 03:25:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/79}, 0x20000120, 0x0, 0xa4a3ad41a879dde0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 03:25:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df4cf1cdd8b55", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000340)="7f", 0x1}], 0x1, &(0x7f0000001940)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) 03:25:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) sendto$inet(r0, &(0x7f0000000080)='\v0', 0x2, 0x4810, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 03:25:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='timers\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:25:38 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4000800c0884113, &(0x7f0000000000)) 03:25:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) sendto$inet(r0, &(0x7f0000000080)='\v0', 0x2, 0x4810, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 03:25:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) 03:25:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup2(r1, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") 03:25:38 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8082) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000280)={0xe, 0x0, 0x0, 0x0, 0x3f0, "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"}, 0x3fc) 03:25:38 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8000000008b0f, &(0x7f0000000440)={'veth0_to_bridge\x00', @ifru_names='team_slave_1\x00'}) 03:25:38 executing program 1: perf_event_open(&(0x7f0000001040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x531003, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)="6e756d615f6d61707300206976c52a5ffc253201da1c2ee47520aed058fd2b6e37627394d738b5bee9cdf6119790d8f732076ef77c4bc80d3b6a70ad0b9c0035def13bfc90ee7054f1f6310dc8fd7842b2a8437cec3b6d096d0a470c2d0dc3556f67e29b1d07191f49aac2debee9e7846906335dcea89df52e4b0e9fdacc6d009cdc4b9eeba4af5f1e7eb2166fb75c7860b12cbcf34451253c11a6e825540fdc95c0d392bccf464aa8a598b9d4ff37f34d974288332720250fbe0af1fe78bbd988e00cf38824c976e1b7f9b84293d3fa3a39") sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xacdbf90f7b4ecd63, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) [ 271.564810] ================================================================== [ 271.572260] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 271.578868] CPU: 1 PID: 7989 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #63 [ 271.586081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.595455] Call Trace: [ 271.598084] dump_stack+0x306/0x460 [ 271.601741] ? _raw_spin_lock_irqsave+0x227/0x340 [ 271.606609] ? vmx_create_vcpu+0x10df/0x7920 [ 271.611069] kmsan_report+0x1a3/0x2d0 [ 271.614934] __msan_warning+0x7c/0xe0 [ 271.618780] vmx_create_vcpu+0x10df/0x7920 [ 271.623045] ? kmsan_set_origin_inline+0x6b/0x120 [ 271.627930] ? __msan_poison_alloca+0x17a/0x210 [ 271.632648] ? vmx_vm_init+0x340/0x340 [ 271.636569] kvm_arch_vcpu_create+0x25d/0x2f0 [ 271.641106] kvm_vm_ioctl+0x13fd/0x33d0 [ 271.645127] ? __msan_poison_alloca+0x17a/0x210 [ 271.649843] ? do_vfs_ioctl+0x18a/0x2810 [ 271.653951] ? __se_sys_ioctl+0x1da/0x270 [ 271.658142] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 271.663018] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 271.667931] do_vfs_ioctl+0xcf3/0x2810 [ 271.671874] ? security_file_ioctl+0x92/0x200 [ 271.676438] __se_sys_ioctl+0x1da/0x270 [ 271.680473] __x64_sys_ioctl+0x4a/0x70 [ 271.684397] do_syscall_64+0xbe/0x100 [ 271.688276] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.693490] RIP: 0033:0x457579 [ 271.696709] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.715672] RSP: 002b:00007f90465fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.715698] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 271.715712] RDX: 0000000000000002 RSI: 000000000000ae41 RDI: 0000000000000004 [ 271.715728] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 271.715743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90465fc6d4 [ 271.715758] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 271.715790] [ 271.715802] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 271.715810] Variable was created at: [ 271.715832] vmx_create_vcpu+0xd5/0x7920 [ 271.715854] kvm_arch_vcpu_create+0x25d/0x2f0 [ 271.715863] ================================================================== [ 271.715872] Disabling lock debugging due to kernel taint [ 271.715885] Kernel panic - not syncing: panic_on_warn set ... [ 271.715885] [ 271.715921] CPU: 1 PID: 7989 Comm: syz-executor2 Tainted: G B 4.19.0-rc4+ #63 [ 271.715936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.715946] Call Trace: [ 271.715978] dump_stack+0x306/0x460 [ 271.716027] panic+0x54c/0xafa [ 271.716116] kmsan_report+0x2cd/0x2d0 [ 271.716153] __msan_warning+0x7c/0xe0 [ 271.716187] vmx_create_vcpu+0x10df/0x7920 [ 271.716216] ? kmsan_set_origin_inline+0x6b/0x120 [ 271.716245] ? __msan_poison_alloca+0x17a/0x210 [ 271.716287] ? vmx_vm_init+0x340/0x340 [ 271.716329] kvm_arch_vcpu_create+0x25d/0x2f0 [ 271.716378] kvm_vm_ioctl+0x13fd/0x33d0 [ 271.716447] ? __msan_poison_alloca+0x17a/0x210 [ 271.716491] ? do_vfs_ioctl+0x18a/0x2810 [ 271.716515] ? __se_sys_ioctl+0x1da/0x270 [ 271.716542] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 271.716566] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 271.716593] do_vfs_ioctl+0xcf3/0x2810 [ 271.716637] ? security_file_ioctl+0x92/0x200 [ 271.716675] __se_sys_ioctl+0x1da/0x270 [ 271.716714] __x64_sys_ioctl+0x4a/0x70 [ 271.716739] do_syscall_64+0xbe/0x100 [ 271.716771] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.716791] RIP: 0033:0x457579 [ 271.716815] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.716830] RSP: 002b:00007f90465fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.716873] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 271.716921] RDX: 0000000000000002 RSI: 000000000000ae41 RDI: 0000000000000004 [ 271.716935] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 271.716949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90465fc6d4 [ 271.716965] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 271.725698] Kernel Offset: disabled [ 271.980714] Rebooting in 86400 seconds..