[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.190' (ECDSA) to the list of known hosts. 2020/07/18 15:11:56 fuzzer started 2020/07/18 15:11:56 dialing manager at 10.128.0.26:41463 2020/07/18 15:11:57 syscalls: 2944 2020/07/18 15:11:57 code coverage: enabled 2020/07/18 15:11:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/07/18 15:11:57 extra coverage: enabled 2020/07/18 15:11:57 setuid sandbox: enabled 2020/07/18 15:11:57 namespace sandbox: enabled 2020/07/18 15:11:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/18 15:11:57 fault injection: enabled 2020/07/18 15:11:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/18 15:11:57 net packet injection: enabled 2020/07/18 15:11:57 net device setup: enabled 2020/07/18 15:11:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/18 15:11:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/18 15:11:57 USB emulation: /dev/raw-gadget does not exist 15:15:30 executing program 0: syzkaller login: [ 331.431829][ T8438] IPVS: ftp: loaded support on port[0] = 21 [ 331.700346][ T8438] chnl_net:caif_netlink_parms(): no params data found [ 332.010433][ T8438] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.017780][ T8438] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.027045][ T8438] device bridge_slave_0 entered promiscuous mode [ 332.058310][ T8438] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.065521][ T8438] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.075665][ T8438] device bridge_slave_1 entered promiscuous mode [ 332.137480][ T8438] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 332.151148][ T8438] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 332.205143][ T8438] team0: Port device team_slave_0 added [ 332.216162][ T8438] team0: Port device team_slave_1 added [ 332.267705][ T8438] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 332.274755][ T8438] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 332.301611][ T8438] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 332.336976][ T8438] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 332.343977][ T8438] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 332.370365][ T8438] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 332.492996][ T8438] device hsr_slave_0 entered promiscuous mode [ 332.677936][ T8438] device hsr_slave_1 entered promiscuous mode [ 333.135196][ T8438] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 333.174324][ T8438] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 333.324076][ T8438] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 333.372780][ T8438] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 333.762760][ T8438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.788124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.797103][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.817381][ T8438] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.841833][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.851591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.860920][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.868173][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.877444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.887098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.896336][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.903537][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.914615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.958850][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 333.969738][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 333.980448][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 333.990713][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.000854][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 334.011140][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.040076][ T8438] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 334.051964][ T8438] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 334.071343][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 334.081475][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.091135][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.101779][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.111327][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.153725][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 334.179589][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 334.191003][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 334.224743][ T8438] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 334.271419][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 334.281389][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 334.336903][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 334.346610][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.368687][ T8438] device veth0_vlan entered promiscuous mode [ 334.377424][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.386395][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.421815][ T8438] device veth1_vlan entered promiscuous mode [ 334.473347][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 334.482919][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 334.492210][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.501984][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.519034][ T8438] device veth0_macvtap entered promiscuous mode [ 334.533970][ T8438] device veth1_macvtap entered promiscuous mode [ 334.570219][ T8438] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.579438][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 334.591275][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.600505][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.610172][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.631070][ T8438] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.638607][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.648854][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:15:34 executing program 0: 15:15:34 executing program 0: 15:15:34 executing program 0: 15:15:35 executing program 0: 15:15:35 executing program 0: 15:15:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x1, 0x3a1000) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x105000, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, [0x800, 0x0, 0x2, 0x2]}) socket$netlink(0x10, 0x3, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) [ 335.717900][ C0] hrtimer: interrupt took 62320 ns 15:15:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x1, 0x3a1000) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x105000, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x0, 0x0, [0x800, 0x0, 0x2, 0x2]}) socket$netlink(0x10, 0x3, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) 15:15:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) uname(&(0x7f0000000040)=""/105) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r2, r1, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000000c0)=""/182) 15:15:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r1, r0, 0x0, 0x2) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) write(r2, &(0x7f0000000040)="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", 0xfc) [ 336.911466][ T8670] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.0'. 15:15:36 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x2a, 0x0, &(0x7f0000000a80)="8b63539ea97594740dbc415e4ed54b3a8f4c06149e6b6b70f8bbcf329240ceda862bfe2d58da7e7556d2"}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r1) r6 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r0, 0x0, r1, 0x0, 0x7fffffff, 0x0) 15:15:37 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8800, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001180)={0x3, 0x0, &(0x7f0000000040)=""/54, &(0x7f0000000080)=""/219, &(0x7f0000000180)=""/4096, 0x2}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000011c0)=0x5) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000001200)=0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001240)='/dev/sequencer2\x00', 0x10241, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_TIMERSLACK(0x1e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @dev, @initdev}, &(0x7f0000001480)=0xc) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001540)={'syztnl2\x00', &(0x7f00000014c0)={'syztnl2\x00', r2, 0x8, 0x8000, 0x6, 0x1000, {{0x14, 0x4, 0x0, 0x5, 0x50, 0x68, 0x0, 0x7, 0x2f, 0x0, @multicast1, @rand_addr=0x64010102, {[@cipso={0x86, 0x16, 0xffffffffffffffff, [{0x0, 0x9, "68f9891e358b7d"}, {0x0, 0x7, "eb2e042a9c"}]}, @rr={0x7, 0xf, 0x6a, [@private=0xa010101, @loopback, @remote]}, @timestamp_addr={0x44, 0x14, 0xc0, 0x1, 0x5, [{@remote, 0xfffffffa}, {@private=0xa010100, 0x12}]}]}}}}}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000001580)={{0x3, 0x3, 0x10000, 0x3, 0x9}, 0x5, 0x3, 0x8}) r3 = syz_open_dev$mouse(&(0x7f0000001600)='/dev/input/mouse#\x00', 0x7, 0x88c01) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000001640)) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/nvram\x00', 0xb4100, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001700)={'vcan0\x00', 0x2020}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001740)='/dev/btrfs-control\x00', 0x181000, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000001780)={0x3ff, 0x8, 0x0, r5}) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) fsmount(r6, 0x1, 0x0) [ 337.811936][ T8675] syz-executor.0 (8675) used greatest stack depth: 3104 bytes left 15:15:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000140)=ANY=[@ANYBLOB="8b474fc30be2aaaaaaaaaabb86dd6000000000383a00fea000000000000000000000000000000000000101049078000000006001170000002f00fe800000000000000000000000000000fc01002a5fcd1b578e89cc00000000000000006a21a7e5ee24f6c41b9bca000000000000000000000000000000f7d07d169c2795962a64a6cebe17d728fabde88c016739e4d255621be15c014ff9ff160eedc4496c682ff81b7633a482247011c1c5ce2a9a71ded55b20322162a307258f38a9a702074dd0ae3ecb22eba09e3f5633e8faec1e67"], 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r1, r0, 0x0, 0x2) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r3, r2, 0x0, 0x2) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6gre0\x00', r4, 0x2f, 0x2, 0x81, 0x0, 0x20, @empty, @mcast1, 0x8000, 0x20, 0x1f, 0x7fff}}) 15:15:37 executing program 0: pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x6040, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x48f5ade13c961614}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)=0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0x1}) r2 = getpid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/892], 0x5ac) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x40d, 0x70bd26, 0x0, {}, [@IFLA_MAP={0x24}]}, 0x44}}, 0x0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={0x0, 0xdc, 0xa6}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-avx2\x00'}}, &(0x7f00000003c0)="e5f965ee10ba483d48d8bb4e5967a2b0a287eb5063237cd458d2a6bc71b4297dafc1623eded22f6f580f4b57f0f56af0b000f835e40bb03f8420d031c6cae1fb1d9be41505dc9d9bc5361e120ac711f2251b5b4c4a40fe4575f39834e9dadae59398808b2c0df4102504268cd5934a2af573999ba8c6334bbe1cd95eca002632b00232e7cc264f729c8f1ca70e73024b82336fc892a3b30ddfb053aa671657a938e2bee3f2ad36472e326cdd79b059ac5aee2ff1cee842f5598ebf7b8ba386743fdfd12f6e2bb3efa87321c0d829ac87c34e3c9d75ddf86fd0c1c009", &(0x7f0000000240)=""/166) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x400800, 0x20, 0x3}, 0x18) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) [ 338.256888][ T8684] IPVS: ftp: loaded support on port[0] = 21 [ 338.727325][ T8684] chnl_net:caif_netlink_parms(): no params data found [ 339.039662][ T8684] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.047001][ T8684] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.056349][ T8684] device bridge_slave_0 entered promiscuous mode [ 339.114629][ T8684] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.122034][ T8684] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.131284][ T8684] device bridge_slave_1 entered promiscuous mode [ 339.258213][ T8684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 339.272461][ T8684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 339.316499][ T8684] team0: Port device team_slave_0 added [ 339.326865][ T8684] team0: Port device team_slave_1 added [ 339.367683][ T8684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 339.374741][ T8684] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 339.401493][ T8684] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 339.440553][ T8684] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 339.448888][ T8684] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 339.475775][ T8684] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:15:39 executing program 0: socket$packet(0x11, 0xa, 0x300) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000100)=ANY=[], 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getpgid(r0) syz_emit_ethernet(0xe, &(0x7f0000000100)={@local, @dev, @void}, 0x0) [ 339.612726][ T8684] device hsr_slave_0 entered promiscuous mode [ 339.657075][ T8684] device hsr_slave_1 entered promiscuous mode [ 339.706156][ T8684] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 339.713817][ T8684] Cannot create hsr debugfs directory [ 340.052689][ T8684] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 340.105306][ T8684] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 340.144458][ T8684] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 340.193493][ T8684] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 340.495255][ T8684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.551309][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.560329][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.582341][ T8684] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.639571][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.649317][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.658621][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.665892][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.749193][ T8684] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 340.759853][ T8684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 340.778224][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.787311][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.797321][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.806548][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.813728][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.824001][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.834805][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.845340][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 340.855566][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.865635][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 340.875669][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.886017][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.895294][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.905295][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.914745][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.927463][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.937107][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 341.008948][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 341.016766][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 341.035186][ T8684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 341.173445][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.183748][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.261855][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.271274][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.289213][ T8684] device veth0_vlan entered promiscuous mode [ 341.329402][ T8595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.339203][ T8595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.374541][ T8684] device veth1_vlan entered promiscuous mode [ 341.482705][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 341.491952][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 341.501419][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 341.511305][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.526945][ T8684] device veth0_macvtap entered promiscuous mode [ 341.561656][ T8684] device veth1_macvtap entered promiscuous mode [ 341.606995][ T8684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.617907][ T8684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.631197][ T8684] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 341.650447][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 341.660184][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.669596][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.679678][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.730995][ T8684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.741626][ T8684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.755196][ T8684] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 341.778597][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.788827][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:15:41 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000400)="31eae61a93a798d52835f2b393c4d05c99060b6b4e7fd147755afb8fb356b05ff22f84b32de22c72d5bdd671968385bb3aa6f64d6af62c02f86d040b0997d64842b59b9ba5", 0x45}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003240)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/162, 0xa2}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_SET_CPUID(r4, 0xae80, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r6, r5, 0x0, 0x2) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000080)=0x8, 0x4) [ 342.323527][ T8908] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 342.384531][ T8909] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:15:42 executing program 1: r0 = socket$inet6(0xa, 0x400000000005, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x800, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xfffffffc}, 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, ',\x00', "b8d5e838ab7cb1d02b30a05c6eb8391f0920126148d3f0d32c95b2b7a139c441", "b54782a9", "b10245002c00"}, 0x38) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r0, r4, 0x0, 0x80001d00c0d0) 15:15:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) syz_emit_ethernet(0x11, &(0x7f00000003c0)={@local, @multicast, @void, {@llc_tr={0x11, {@llc={0x0, 0x0, 'Y'}}}}}, 0x0) 15:15:42 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x6710, 0x4, 0x0, 0xc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x3, 0x2) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0xfffffffa, 0x9, 0x800, 0x4, 0x1b, "820f1bfddf18ed2c2310f4000400000b22c24c"}) ioctl$KDDISABIO(r1, 0x4b37) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000200)={0x80000000, 0x1, {0x2, 0x2, 0x0, 0x2, 0x1}, 0x2}) write$binfmt_misc(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x1c2) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x4, 0x2, r3, &(0x7f0000000080)='./file0\x00') sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14, 0x23, 0x829, 0x0, 0x0, {0x2804, 0xe00000000000000}}, 0x14}, 0x1, 0x60}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000d36ff4)={0xfc147812c6696267}) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000100)={0xff, 0x8, 0x400, 0x1, 0x0, "82ddd6811343fab52c1b94d19db7a28baaf5e8"}) [ 343.370263][ C0] sd 0:0:1:0: [sg0] tag#1728 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 343.380882][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB: Test Unit Ready [ 343.387665][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.397479][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.407291][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.417150][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.426947][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.436742][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.446539][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.456342][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.466143][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.475943][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.485679][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.495480][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 343.505278][ C0] sd 0:0:1:0: [sg0] tag#1728 CDB[c0]: 00 00 00 00 00 00 00 00 [ 343.642500][ T8928] sg_write: process 15 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. 15:15:43 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='geneve0\x00', 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007fc0), 0x2aa83cb574579c5, 0x0) 15:15:44 executing program 1: syz_emit_ethernet(0x12b, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0xf5, 0x2b, 0x0, @private0, @dev={0xfe, 0x80, [], 0x36}, {[@srh={0x87, 0x4, 0x4, 0x2, 0x7, 0x48, 0x0, [@private2, @mcast2]}], {0x0, 0x0, 0xcd, 0x0, @gue={{0x2, 0x1, 0x2, 0x2}, "8c62ab2f3ca0ce912df6437251df8d519122ec5ddbb9a84f0f44a80ac52d0649dbd12e750f380e7f5c3fa28df9199b6e7cc4c0929db927d7e8bd0b3b5e4ccb2fe90b5999312f48b6979309b302fdb9fa50974ace056a2507e2e8a5e033b32a7a9fc246fd1557885b6ebc054bccd9699b9f58e5ce18e32c3b69511808cc7a2899533144c4e7756f9d7fc5060727961f1103dfdbdc26680a81914e3064154514c8fb7424ad6b93222fef4849d711972b51917431915359f1cb41d8b97e45"}}}}}}}, 0x0) 15:15:44 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x5, 0x0) r3 = accept4$unix(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000001c0)=0x6e, 0x80000) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x70, 0x4, 0x81, 0x9c, 0x2, 0x0, 0x2, 0x40800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f00000003c0), 0x4}, 0x8050, 0x1, 0x4e, 0x6, 0xc0000000000000, 0x0, 0x3}, r0, 0x7, 0xffffffffffffffff, 0x1) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r4, 0x405c5503, &(0x7f0000000000)) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000240)={0x9b0000, 0x80000001, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x9a091d, 0x8001, [], @value64=0x1}}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r6, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="e02793a866c461c814e7eba57d43834ae56c3d710537", @ANYRES16=r7, @ANYBLOB="00082cfbfe000000050008000a0004000000080011000000000008001900ac1414bb05006100000000007a54433d99b815480d034ebd15564ffbff9aa41878aa587e890b10235ee3"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="5459a080f87469a99a5b72d516e643a955ddaa50a0794843d47219b9eeb6f17e819302", 0x23}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d0014", 0x1f}], 0x1) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000300)=0x3) splice(r5, 0x0, r1, 0x0, 0xffffffffffffffff, 0x0) 15:15:44 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000024000b0f0000000000000000000000000a3b674f2efec9f593b7a409e35267b1c14cb725d8d1764c2d74135dfc84d3bfcfa7f59aa0d5256a4ddcc6b39149f33c252318a98d8e28ca6289d6d26ca2a8015b6cc2d6166c12d4ef6fb6bf9453e80fb602bbfba19f6e28f2fdfdf3cbeb33ed29704ff5194a175e5b96f7dcd8e1e0cb8c37d48847d58a", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010063616b6500000000180002000c00020006000000000000000800030001000000"], 0x48}}, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000a56000)=0x1, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) keyctl$get_persistent(0x3, r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x15) sendmsg(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000002141008000800040012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r9 = socket$netlink(0x10, 0x3, 0x15) sendmsg(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000002141008000800040012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)="19645968f268467b1196780f7441c78e5cd90974edbcd743995e61129ff68befb845f6310336b6dae3b3f70ce293a0776699f22c36964e8ee634ea617ef5da06260f7342e1", 0x45}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000010000001af17d1f", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r8, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYRES32], 0x88, 0x4040}, 0x80) keyctl$chown(0x4, 0x0, 0x0, r8) sendfile(r4, r3, 0x0, 0x2) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000100)={0x1}) [ 344.909677][ T8965] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 15:15:44 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x8000) sendmsg$inet6(r0, &(0x7f0000001840)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@rthdr_2292={{0x18}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}}}}], 0x40}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000012c0)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x9, 0x8}, 0xc) 15:15:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="340000001800800500000010c31a219500000000", @ANYRES32=0x0, @ANYBLOB="000000000000000014001280090001007866726d0000000004000280"], 0x34}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 15:15:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffffffffffff2167) socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r4, r3, 0x0, 0x2) setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x5, 0x4) connect$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x4, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) 15:15:44 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/221, 0xdd}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10064}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x12c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x8080}, 0x4081) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x18001, 0x0) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000400)) ioctl$int_in(r0, 0xc0045002, &(0x7f0000000040)) 15:15:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="8c0000000001ff050000000000000000000000003c0001002c000100140003000000000000000000000000000000000114000400fe8000000000000000000000000000bb0c0002000500010000000000240002000c000200050001000000000014000100080001000000000008000200e00000010800070008"], 0x8c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="8c0000000001ff050000000000000000000000003c0001002c000100140003000000000000000000000000000000000114000400fe8000000000000000000000000000bb0c0002000500010000000000240002000c000200050001000000001a14000100080001000000000008000200e000000108000700000000000800150000000000080008"], 0x8c}}, 0x0) [ 345.412675][ T8982] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 15:15:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e21, @empty}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xfc) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0xa808) r3 = semget$private(0x0, 0x7, 0x0) r4 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x2) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101001, 0x0) sendfile(r6, r5, 0x0, 0x2) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000180)={0xf000, &(0x7f0000000100), 0x4, r5, 0x1}) semtimedop(r3, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000003c0)) semop(r3, &(0x7f00000000c0)=[{0x3, 0x6, 0x1000}, {0x3, 0x200, 0x800}, {0x3, 0x6df, 0x800}, {0x4, 0x0, 0x1800}, {0x4, 0x1f, 0x800}], 0x5) 15:15:45 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(0xffffffffffffffff, 0x800000000000401) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = fsopen(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@migrate={0xec, 0x21, 0xd39, 0x4, 0x0, {{@in=@loopback, @in6=@empty}}, [@migrate={0x9c, 0x11, [{@in6=@mcast1, @in=@broadcast, @in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2}, {@in6=@mcast1, @in=@broadcast, @in6=@remote, @in6=@remote}]}]}, 0xec}}, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000380)={0x79e9, 0x0, 0x4, 0x40000000, 0xb00d, {0x77359400}, {0x3, 0xc, 0x5, 0x6a, 0x40, 0x6, "63122a3c"}, 0x0, 0x4, @userptr=0x800, 0x0, 0x0, r1}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x48) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000000)) sendfile(r1, r0, &(0x7f0000000080)=0x10001, 0x620d99d) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000abaff9)={0x77359400}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x40400000}, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) set_mempolicy(0x4002, &(0x7f0000000140)=0x10000101, 0x2) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 15:15:45 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_STATE={0x5}]}}}]}, 0x44}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 346.294869][ T8993] IPVS: ftp: loaded support on port[0] = 21 [ 346.725733][ T9021] IPVS: ftp: loaded support on port[0] = 21 15:15:46 executing program 1: seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2000, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000a56000)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) keyctl$get_persistent(0x3, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x15) sendmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000002141008000800040012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r6 = socket$netlink(0x10, 0x3, 0x15) sendmsg(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000002141008000800040012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)="19645968f268467b1196780f7441c78e5cd90974edbcd743995e61129ff68befb845f6310336b6dae3b3f70ce293a0776699f22c36964e8ee634ea617ef5da06260f7342e1", 0x45}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000010000001af17d1f", @ANYRES32=0x0, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r1], 0x88, 0x4040}, 0x80) getgroups(0x1, &(0x7f0000000240)=[r5]) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x6}, {0x2, 0x3}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x7}, {0x8, 0x3, 0xee01}, {0x8, 0x4, r7}], {}, {0x20, 0x4}}, 0x74, 0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r8, 0x0, 0xedc0) [ 346.932907][ T32] audit: type=1326 audit(1595085346.656:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=9037 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 [ 347.013017][ T9047] ===================================================== [ 347.019996][ T9047] BUG: KMSAN: uninit-value in __skb_checksum_complete+0x37f/0x540 [ 347.027803][ T9047] CPU: 1 PID: 9047 Comm: syz-executor.1 Not tainted 5.8.0-rc5-syzkaller #0 [ 347.036379][ T9047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.046426][ T9047] Call Trace: [ 347.049719][ T9047] dump_stack+0x1df/0x240 [ 347.054054][ T9047] kmsan_report+0xf7/0x1e0 [ 347.058474][ T9047] __msan_warning+0x58/0xa0 [ 347.062978][ T9047] __skb_checksum_complete+0x37f/0x540 [ 347.068439][ T9047] ? __skb_checksum+0x12a0/0x12a0 [ 347.073470][ T9047] ? csum_partial_ext+0xa0/0xa0 [ 347.078327][ T9047] nf_ip6_checksum+0x501/0x610 [ 347.083105][ T9047] nf_nat_icmpv6_reply_translation+0x24b/0x10c0 [ 347.089374][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 347.094493][ T9047] nf_nat_ipv6_fn+0x394/0x4d0 [ 347.099180][ T9047] nf_nat_ipv6_local_fn+0xb0/0x690 [ 347.104307][ T9047] ? nf_nat_ipv6_out+0x5d0/0x5d0 [ 347.109243][ T9047] nf_hook_slow+0x16e/0x400 [ 347.113752][ T9047] __ip6_local_out+0x56d/0x750 [ 347.118531][ T9047] ? __ip6_local_out+0x750/0x750 [ 347.123467][ T9047] ip6_local_out+0xa4/0x1d0 [ 347.127980][ T9047] ip6_push_pending_frames+0x213/0x4f0 [ 347.133445][ T9047] icmpv6_push_pending_frames+0x674/0x6b0 [ 347.139176][ T9047] icmp6_send+0x32c7/0x3a00 [ 347.143717][ T9047] ? icmpv6_param_prob+0xc0/0xc0 [ 347.148653][ T9047] icmpv6_send+0xe4/0x110 [ 347.152991][ T9047] ip6_pkt_drop+0x83f/0x930 [ 347.157513][ T9047] ip6_pkt_discard_out+0xbb/0x130 [ 347.162535][ T9047] ? ip6_pkt_prohibit+0x70/0x70 [ 347.167383][ T9047] ip6_local_out+0x164/0x1d0 [ 347.171978][ T9047] ip6_send_skb+0xfa/0x390 [ 347.176404][ T9047] udp_v6_send_skb+0x1834/0x1e80 [ 347.181368][ T9047] udpv6_sendmsg+0x4570/0x4940 [ 347.186133][ T9047] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.192317][ T9047] ? aa_label_sk_perm+0x767/0x930 [ 347.197366][ T9047] ? ip_do_fragment+0x3570/0x3570 [ 347.202407][ T9047] ? kmsan_get_metadata+0x11d/0x180 [ 347.207604][ T9047] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.213429][ T9047] ? udpv6_rcv+0x70/0x70 [ 347.217671][ T9047] ? udpv6_rcv+0x70/0x70 [ 347.223050][ T9047] inet6_sendmsg+0x276/0x2e0 [ 347.227645][ T9047] kernel_sendmsg+0x24a/0x440 [ 347.232329][ T9047] sock_no_sendpage+0x235/0x300 [ 347.237195][ T9047] ? sock_no_mmap+0x30/0x30 [ 347.241697][ T9047] sock_sendpage+0x1e1/0x2c0 [ 347.246295][ T9047] pipe_to_sendpage+0x38c/0x4c0 [ 347.251145][ T9047] ? sock_fasync+0x250/0x250 [ 347.255745][ T9047] __splice_from_pipe+0x565/0xf00 [ 347.260768][ T9047] ? generic_splice_sendpage+0x2d0/0x2d0 [ 347.266415][ T9047] generic_splice_sendpage+0x1d5/0x2d0 [ 347.271883][ T9047] ? iter_file_splice_write+0x1800/0x1800 [ 347.277603][ T9047] direct_splice_actor+0x1fd/0x580 [ 347.282720][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 347.287838][ T9047] splice_direct_to_actor+0x6b2/0xf50 [ 347.293208][ T9047] ? do_splice_direct+0x580/0x580 [ 347.298249][ T9047] do_splice_direct+0x342/0x580 [ 347.303111][ T9047] do_sendfile+0x101b/0x1d40 [ 347.307719][ T9047] __se_sys_sendfile64+0x2bb/0x360 [ 347.312844][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 347.317960][ T9047] __x64_sys_sendfile64+0x56/0x70 [ 347.322984][ T9047] do_syscall_64+0xb0/0x150 [ 347.327491][ T9047] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.333377][ T9047] RIP: 0033:0x45c1d9 [ 347.337260][ T9047] Code: Bad RIP value. [ 347.341316][ T9047] RSP: 002b:00007fa0f9a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 347.349819][ T9047] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 347.357888][ T9047] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000003 [ 347.365857][ T9047] RBP: 000000000078bfe8 R08: 0000000000000000 R09: 0000000000000000 [ 347.373834][ T9047] R10: 000000000000edc0 R11: 0000000000000246 R12: 000000000078bfac [ 347.381808][ T9047] R13: 0000000000c9fb6f R14: 00007fa0f9a999c0 R15: 000000000078bfac [ 347.389796][ T9047] [ 347.392118][ T9047] Uninit was stored to memory at: [ 347.397145][ T9047] kmsan_internal_chain_origin+0xad/0x130 [ 347.402862][ T9047] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 347.408838][ T9047] kmsan_memcpy_metadata+0xb/0x10 [ 347.413858][ T9047] __msan_memcpy+0x43/0x50 [ 347.418276][ T9047] csum_partial_copy+0xae/0x100 [ 347.423127][ T9047] skb_copy_and_csum_bits+0x227/0x1130 [ 347.428582][ T9047] icmpv6_getfrag+0x15f/0x350 [ 347.433268][ T9047] __ip6_append_data+0x507b/0x6320 [ 347.438382][ T9047] ip6_append_data+0x3cb/0x660 [ 347.443140][ T9047] icmp6_send+0x308e/0x3a00 [ 347.447635][ T9047] icmpv6_send+0xe4/0x110 [ 347.451963][ T9047] ip6_pkt_drop+0x83f/0x930 [ 347.456461][ T9047] ip6_pkt_discard_out+0xbb/0x130 [ 347.461486][ T9047] ip6_local_out+0x164/0x1d0 [ 347.466186][ T9047] ip6_send_skb+0xfa/0x390 [ 347.470604][ T9047] udp_v6_send_skb+0x1834/0x1e80 [ 347.475543][ T9047] udpv6_sendmsg+0x4570/0x4940 [ 347.480302][ T9047] inet6_sendmsg+0x276/0x2e0 [ 347.484894][ T9047] kernel_sendmsg+0x24a/0x440 [ 347.489574][ T9047] sock_no_sendpage+0x235/0x300 [ 347.494429][ T9047] sock_sendpage+0x1e1/0x2c0 [ 347.499019][ T9047] pipe_to_sendpage+0x38c/0x4c0 [ 347.503867][ T9047] __splice_from_pipe+0x565/0xf00 [ 347.508888][ T9047] generic_splice_sendpage+0x1d5/0x2d0 [ 347.514340][ T9047] direct_splice_actor+0x1fd/0x580 [ 347.519445][ T9047] splice_direct_to_actor+0x6b2/0xf50 [ 347.524828][ T9047] do_splice_direct+0x342/0x580 [ 347.529676][ T9047] do_sendfile+0x101b/0x1d40 [ 347.534262][ T9047] __se_sys_sendfile64+0x2bb/0x360 [ 347.539365][ T9047] __x64_sys_sendfile64+0x56/0x70 [ 347.544384][ T9047] do_syscall_64+0xb0/0x150 [ 347.548885][ T9047] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.554761][ T9047] [ 347.557081][ T9047] Uninit was stored to memory at: [ 347.562103][ T9047] kmsan_internal_chain_origin+0xad/0x130 [ 347.567813][ T9047] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 347.573786][ T9047] kmsan_memcpy_metadata+0xb/0x10 [ 347.578802][ T9047] __msan_memcpy+0x43/0x50 [ 347.583215][ T9047] _copy_from_iter_full+0xbfe/0x13b0 [ 347.588495][ T9047] ip_generic_getfrag+0x14a/0x3c0 [ 347.593521][ T9047] __ip6_append_data+0x507b/0x6320 [ 347.598630][ T9047] ip6_make_skb+0x6ce/0xcf0 [ 347.603128][ T9047] udpv6_sendmsg+0x42f4/0x4940 [ 347.607886][ T9047] inet6_sendmsg+0x276/0x2e0 [ 347.612484][ T9047] kernel_sendmsg+0x24a/0x440 [ 347.617163][ T9047] sock_no_sendpage+0x235/0x300 [ 347.622009][ T9047] sock_sendpage+0x1e1/0x2c0 [ 347.626599][ T9047] pipe_to_sendpage+0x38c/0x4c0 [ 347.631443][ T9047] __splice_from_pipe+0x565/0xf00 [ 347.636464][ T9047] generic_splice_sendpage+0x1d5/0x2d0 [ 347.641919][ T9047] direct_splice_actor+0x1fd/0x580 [ 347.647024][ T9047] splice_direct_to_actor+0x6b2/0xf50 [ 347.652387][ T9047] do_splice_direct+0x342/0x580 [ 347.657230][ T9047] do_sendfile+0x101b/0x1d40 [ 347.661819][ T9047] __se_sys_sendfile64+0x2bb/0x360 [ 347.667008][ T9047] __x64_sys_sendfile64+0x56/0x70 [ 347.672026][ T9047] do_syscall_64+0xb0/0x150 [ 347.676533][ T9047] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.682409][ T9047] [ 347.684726][ T9047] Uninit was created at: [ 347.688963][ T9047] kmsan_save_stack_with_flags+0x3c/0x90 [ 347.694591][ T9047] kmsan_alloc_page+0xb9/0x180 [ 347.699348][ T9047] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 347.704887][ T9047] alloc_pages_current+0x672/0x990 [ 347.709989][ T9047] push_pipe+0x605/0xb70 [ 347.714224][ T9047] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 347.719938][ T9047] do_splice_to+0x4fc/0x14f0 [ 347.724527][ T9047] splice_direct_to_actor+0x45c/0xf50 [ 347.729902][ T9047] do_splice_direct+0x342/0x580 [ 347.734747][ T9047] do_sendfile+0x101b/0x1d40 [ 347.739329][ T9047] __se_sys_sendfile64+0x2bb/0x360 [ 347.744434][ T9047] __x64_sys_sendfile64+0x56/0x70 [ 347.749456][ T9047] do_syscall_64+0xb0/0x150 [ 347.753957][ T9047] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.759856][ T9047] ===================================================== [ 347.766775][ T9047] Disabling lock debugging due to kernel taint [ 347.772916][ T9047] Kernel panic - not syncing: panic_on_warn set ... [ 347.779544][ T9047] CPU: 1 PID: 9047 Comm: syz-executor.1 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 347.789506][ T9047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.799561][ T9047] Call Trace: [ 347.802854][ T9047] dump_stack+0x1df/0x240 [ 347.807186][ T9047] panic+0x3d5/0xc3e [ 347.811099][ T9047] kmsan_report+0x1df/0x1e0 [ 347.815603][ T9047] __msan_warning+0x58/0xa0 [ 347.820109][ T9047] __skb_checksum_complete+0x37f/0x540 [ 347.825583][ T9047] ? __skb_checksum+0x12a0/0x12a0 [ 347.830599][ T9047] ? csum_partial_ext+0xa0/0xa0 [ 347.835454][ T9047] nf_ip6_checksum+0x501/0x610 [ 347.840228][ T9047] nf_nat_icmpv6_reply_translation+0x24b/0x10c0 [ 347.846477][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 347.851593][ T9047] nf_nat_ipv6_fn+0x394/0x4d0 [ 347.856284][ T9047] nf_nat_ipv6_local_fn+0xb0/0x690 [ 347.861432][ T9047] ? nf_nat_ipv6_out+0x5d0/0x5d0 [ 347.866368][ T9047] nf_hook_slow+0x16e/0x400 [ 347.870879][ T9047] __ip6_local_out+0x56d/0x750 [ 347.875646][ T9047] ? __ip6_local_out+0x750/0x750 [ 347.880580][ T9047] ip6_local_out+0xa4/0x1d0 [ 347.885100][ T9047] ip6_push_pending_frames+0x213/0x4f0 [ 347.890580][ T9047] icmpv6_push_pending_frames+0x674/0x6b0 [ 347.896319][ T9047] icmp6_send+0x32c7/0x3a00 [ 347.900869][ T9047] ? icmpv6_param_prob+0xc0/0xc0 [ 347.905807][ T9047] icmpv6_send+0xe4/0x110 [ 347.910138][ T9047] ip6_pkt_drop+0x83f/0x930 [ 347.914653][ T9047] ip6_pkt_discard_out+0xbb/0x130 [ 347.919678][ T9047] ? ip6_pkt_prohibit+0x70/0x70 [ 347.924530][ T9047] ip6_local_out+0x164/0x1d0 [ 347.929123][ T9047] ip6_send_skb+0xfa/0x390 [ 347.933545][ T9047] udp_v6_send_skb+0x1834/0x1e80 [ 347.938513][ T9047] udpv6_sendmsg+0x4570/0x4940 [ 347.943278][ T9047] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.949348][ T9047] ? aa_label_sk_perm+0x767/0x930 [ 347.954378][ T9047] ? ip_do_fragment+0x3570/0x3570 [ 347.959426][ T9047] ? kmsan_get_metadata+0x11d/0x180 [ 347.964624][ T9047] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.970456][ T9047] ? udpv6_rcv+0x70/0x70 [ 347.974698][ T9047] ? udpv6_rcv+0x70/0x70 [ 347.978948][ T9047] inet6_sendmsg+0x276/0x2e0 [ 347.983545][ T9047] kernel_sendmsg+0x24a/0x440 [ 347.988229][ T9047] sock_no_sendpage+0x235/0x300 [ 347.993090][ T9047] ? sock_no_mmap+0x30/0x30 [ 347.997595][ T9047] sock_sendpage+0x1e1/0x2c0 [ 348.002194][ T9047] pipe_to_sendpage+0x38c/0x4c0 [ 348.007042][ T9047] ? sock_fasync+0x250/0x250 [ 348.011649][ T9047] __splice_from_pipe+0x565/0xf00 [ 348.016675][ T9047] ? generic_splice_sendpage+0x2d0/0x2d0 [ 348.022326][ T9047] generic_splice_sendpage+0x1d5/0x2d0 [ 348.027802][ T9047] ? iter_file_splice_write+0x1800/0x1800 [ 348.033545][ T9047] direct_splice_actor+0x1fd/0x580 [ 348.038663][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 348.043779][ T9047] splice_direct_to_actor+0x6b2/0xf50 [ 348.049148][ T9047] ? do_splice_direct+0x580/0x580 [ 348.054190][ T9047] do_splice_direct+0x342/0x580 [ 348.059051][ T9047] do_sendfile+0x101b/0x1d40 [ 348.063661][ T9047] __se_sys_sendfile64+0x2bb/0x360 [ 348.068771][ T9047] ? kmsan_get_metadata+0x4f/0x180 [ 348.073885][ T9047] __x64_sys_sendfile64+0x56/0x70 [ 348.079042][ T9047] do_syscall_64+0xb0/0x150 [ 348.083548][ T9047] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 348.089433][ T9047] RIP: 0033:0x45c1d9 [ 348.093314][ T9047] Code: Bad RIP value. [ 348.097379][ T9047] RSP: 002b:00007fa0f9a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 348.105784][ T9047] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 348.113751][ T9047] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000003 [ 348.121718][ T9047] RBP: 000000000078bfe8 R08: 0000000000000000 R09: 0000000000000000 [ 348.129685][ T9047] R10: 000000000000edc0 R11: 0000000000000246 R12: 000000000078bfac [ 348.137651][ T9047] R13: 0000000000c9fb6f R14: 00007fa0f9a999c0 R15: 000000000078bfac [ 348.146875][ T9047] Kernel Offset: 0xea00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 348.158399][ T9047] Rebooting in 86400 seconds..