[info] Using makefile-style concurrent boot in runlevel 2. [ 26.674728] audit: type=1800 audit(1545645821.577:21): pid=5905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.109' (ECDSA) to the list of known hosts. 2018/12/24 10:03:54 fuzzer started 2018/12/24 10:03:56 dialing manager at 10.128.0.26:34681 2018/12/24 10:03:56 syscalls: 1 2018/12/24 10:03:56 code coverage: enabled 2018/12/24 10:03:56 comparison tracing: enabled 2018/12/24 10:03:56 setuid sandbox: enabled 2018/12/24 10:03:56 namespace sandbox: enabled 2018/12/24 10:03:56 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/24 10:03:56 fault injection: enabled 2018/12/24 10:03:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/24 10:03:56 net packet injection: enabled 2018/12/24 10:03:56 net device setup: enabled 10:06:10 executing program 0: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd50) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) syzkaller login: [ 175.756971] IPVS: ftp: loaded support on port[0] = 21 10:06:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) [ 176.036630] IPVS: ftp: loaded support on port[0] = 21 10:06:11 executing program 2: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) [ 176.403031] IPVS: ftp: loaded support on port[0] = 21 10:06:11 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 176.657391] IPVS: ftp: loaded support on port[0] = 21 10:06:11 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick=0x5, {}, {}, @time}], 0x1c) [ 177.130490] IPVS: ftp: loaded support on port[0] = 21 10:06:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) [ 177.708754] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.745619] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.753475] device bridge_slave_0 entered promiscuous mode [ 177.859837] IPVS: ftp: loaded support on port[0] = 21 [ 177.869691] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.890185] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.898195] device bridge_slave_1 entered promiscuous mode [ 178.053033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.194532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.303338] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.329112] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.337216] device bridge_slave_0 entered promiscuous mode [ 178.472095] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.485253] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.500814] device bridge_slave_1 entered promiscuous mode [ 178.594864] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.611293] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.626394] device bridge_slave_0 entered promiscuous mode [ 178.637094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.716016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.756405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.827572] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.834084] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.842668] device bridge_slave_1 entered promiscuous mode [ 178.885676] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.965476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.093739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.119662] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.128578] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.137538] device bridge_slave_0 entered promiscuous mode [ 179.155835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.162769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.235734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.388266] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.396859] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.411534] device bridge_slave_1 entered promiscuous mode [ 179.442044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.467661] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.474058] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.498112] device bridge_slave_0 entered promiscuous mode [ 179.559179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.569185] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.586138] team0: Port device team_slave_0 added [ 179.593504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.626838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.657458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.668440] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.679878] team0: Port device team_slave_1 added [ 179.689169] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.724765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.751170] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.766645] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.774656] device bridge_slave_1 entered promiscuous mode [ 179.790260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.820496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.848793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.897977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.926814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.013105] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.052182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.074945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.120808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.138188] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.144581] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.176420] device bridge_slave_0 entered promiscuous mode [ 180.189262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.204369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.214472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.226823] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.234453] team0: Port device team_slave_0 added [ 180.311397] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.341284] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.349284] device bridge_slave_1 entered promiscuous mode [ 180.387347] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.396394] team0: Port device team_slave_0 added [ 180.415908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.427741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 180.445775] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.453445] team0: Port device team_slave_1 added [ 180.507344] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.528736] team0: Port device team_slave_1 added [ 180.539047] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.571000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.601737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.629242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.644672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.655615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.679653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.698432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.712191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.729078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.745291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 180.763553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.784379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.815876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.823948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.879298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.907079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.915246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.926964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.035615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.046175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.066307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.076778] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.087472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.145993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.154404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.186023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.208997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.217170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.240923] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.366028] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.378408] team0: Port device team_slave_0 added [ 181.390518] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.406016] team0: Port device team_slave_0 added [ 181.413877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 181.430511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.506824] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.514558] team0: Port device team_slave_1 added [ 181.539897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 181.562837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.585156] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.606559] team0: Port device team_slave_1 added [ 181.655488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 181.677086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.700466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.733879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 181.759080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.805173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.835415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 181.850721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.896530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.904472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.970680] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.977291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.984433] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.990907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.006380] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.021944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.050596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.066283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.096405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.105621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.113693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.149787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.158137] team0: Port device team_slave_0 added [ 182.182754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.196862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.204773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.226133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.275560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.300686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.309083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.320350] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.327949] team0: Port device team_slave_1 added [ 182.415451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.422376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.453374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.538866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 182.562602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.579552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.646084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.653379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.662405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.761910] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.768389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.775176] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.781584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.798837] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.808920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.835730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.886332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.911717] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.918190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.924912] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.931394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.940098] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.315254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.323650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.687651] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.694114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.700914] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.707368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.737369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.854171] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.860622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.867412] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.873789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.894582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.325386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.332732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.433707] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.440169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.446931] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.453325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.461322] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.355424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.986817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.048206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.251058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.509661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.524472] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.835484] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.875241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.957698] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.964251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.975849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.062335] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.076364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.086090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.288420] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.381389] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.397380] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.405187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.412285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.598435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.686118] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.696156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.707946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.739672] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.885314] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.948734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.131637] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.164746] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.479168] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.599191] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 190.622730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.665791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.013542] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.023026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.039238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.180848] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.566183] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.339085] hrtimer: interrupt took 45479 ns 10:06:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 10:06:27 executing program 2: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) 10:06:27 executing program 1: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) 10:06:28 executing program 0: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) 10:06:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) [ 193.234214] kauditd_printk_skb: 9 callbacks suppressed [ 193.234229] audit: type=1326 audit(1545645988.137:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x7ffc0000 10:06:28 executing program 2: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) 10:06:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='timers\x00') lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/216, 0xd8}], 0x1) 10:06:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x11a, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) shutdown(r3, 0x1) r4 = accept4(r2, 0x0, 0x0, 0x0) dup2(r0, r4) [ 193.339715] audit: type=1326 audit(1545645988.137:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457669 code=0x7ffc0000 10:06:28 executing program 0: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000240)=""/145, &(0x7f0000695ffc)=0x15) getsockopt$inet_tcp_int(r0, 0x6, 0x2000000000000d, 0x0, &(0x7f0000000480)=0x1bf) [ 193.466244] audit: type=1326 audit(1545645988.137:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x7ffc0000 [ 193.504832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 193.513755] audit: type=1326 audit(1545645988.147:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x457669 code=0x7ffc0000 [ 193.551924] audit: type=1326 audit(1545645988.147:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x7ffc0000 [ 193.578094] audit: type=1326 audit(1545645988.147:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457669 code=0x7ffc0000 [ 193.704165] audit: type=1326 audit(1545645988.167:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x7ffc0000 [ 193.749976] audit: type=1326 audit(1545645988.167:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=317 compat=0 ip=0x457669 code=0x7ffc0000 [ 193.772354] audit: type=1326 audit(1545645988.177:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x7ffc0000 [ 193.794607] audit: type=1326 audit(1545645988.177:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7600 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457669 code=0x7ffc0000 10:06:29 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 10:06:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x49249249249251a, 0x0) readv(r0, &(0x7f0000002180)=[{&(0x7f00000020c0)=""/159, 0x9f}], 0x1) 10:06:29 executing program 0: r0 = gettid() mount$9p_rdma(0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREADDIR(r1, 0x0, 0x24f) semget$private(0x0, 0x0, 0x0) geteuid() setuid(0x0) fsync(0xffffffffffffffff) tkill(r0, 0x1000000000016) 10:06:29 executing program 2: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) socket$inet6(0xa, 0x4000020800a2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0x229) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x5, &(0x7f00000001c0)) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r3, 0x1) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\'u\xca\x1eV\xb8*k,\x96\x104[\xf0\x84\x1f\x9c\x01\x02\xea\x83\x17\xe1\xc2\xfdz\xd8\x19\xa4\xe09', 0x1ff) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800000000000, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0xffffffffffffffff, 0x100000000, 0x4, 0x9, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8}, 0x0, 0xc, 0xffffffffffffffff, 0xfffffffffffffffe) ioctl(r1, 0x0, &(0x7f0000000000)="0a5cc80700315f85715070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000740)={{}, {{@in=@remote}}}, &(0x7f0000000600)=0xe8) fstat(r5, &(0x7f0000000940)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000b40)) getuid() getgroups(0x2, &(0x7f0000000b80)=[0xee01, 0xee00]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) 10:06:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 10:06:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x40) 10:06:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:30 executing program 0: getpeername(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000003ec0)=ANY=[@ANYBLOB="af00000004000000d3d74c09c2fa018b851828ddabda1156c36358f09cb4c75c28e4d8a1fe6834041d0431e734ced236511c4929a80bcd88d6e6e7aa03999b4699b3d78e91d34c260f6c67be609477992b36ffeafee34aa6718bfc87491766ff18bb58812c5faed1b676bc2347e7e9a9f6a11d4fd5ebe7fff4a8b0ba3576db378da057e8c6631bbd1060b269baa6627b013614c5a1bb23044643866832381f7907420d6b02867051cbd5ce529bead76db3cb9bcd342488800eca731b2893b9be3841d3b752fd61a441f4a51c5eca99a24f1af8ff391eedb53150755900"], 0x10201) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x22080, 0x0) mkdirat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x1ff) r1 = shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="3f000000000000000a004e20ffffffffff010000000000000000000000000001010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a004e242ee5173ffe8000000000000000000000000000aa080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) r2 = dup(0xffffffffffffffff) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000400)={{0x2, 0x4e21, @local}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x68, {0x2, 0x4e20, @multicast1}, 'ip6tnl0\x00'}) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) semctl$IPC_RMID(r1, 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000580)={@multicast1, @dev={0xac, 0x14, 0x14, 0x14}}, 0x8) 10:06:30 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:06:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a040007000000ebdec0df333f220005001a0005000000000500061fd4a354d806000018a7c61400eb6a0c6c02d3e0d28df8fe2c8ce6ae96b306000ac30cccb31815"], 0x43}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) 10:06:30 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 10:06:30 executing program 0: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000240)=""/145, &(0x7f0000695ffc)=0x15) getsockopt$inet_tcp_int(r0, 0x6, 0x2000000000000b, 0x0, &(0x7f0000000080)) 10:06:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 10:06:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000200)='\x00\x00\x00,*3U\xbd\xdd\xf0\r\r\xc1\xecB\x85\x00\x00\x003\xd2fF!\x87\"\'\v\xde\xc4\xba\xf4\b\x11\xd8+\x9a\x8c\xe2\x91yf9\xbc\x10i\xc0\xea+B@\xad\x9c\xcb\xdf\xb9\x02\x97\x9d\xe3hS\x8aq\xb1V\xa6\xe9\'\xd5\x8c\x18\xc2\xd1\xcfR\xe1_\xeceDzb\xccB:\xf7\n\xc3\x13\xfa\xa9\x06pi\xf1\x92\xed\xf9\xb9\xbbVa\xa5\xac\x88C\xc6D\xc5\xca\x82\x14\xb5\x9b\x01\x1f\x88\xbdT\x87\xec:w\xa3', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000003}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x2, 0x11, r1, 0x0) mincore(&(0x7f0000006000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/15) 10:06:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 10:06:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x9000aea4, &(0x7f0000000000)={0x0, 0x0, [], [0xc1]}) 10:06:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) [ 196.110056] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 196.237436] ================================================================== [ 196.244987] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 196.251585] Write of size 832 at addr ffff8881c1a1abc0 by task syz-executor2/7744 [ 196.259205] [ 196.260852] CPU: 0 PID: 7744 Comm: syz-executor2 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 196.269350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.278713] Call Trace: [ 196.281326] dump_stack+0x244/0x39d [ 196.284968] ? dump_stack_print_info.cold.1+0x20/0x20 [ 196.290167] ? printk+0xa7/0xcf [ 196.293459] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 196.298239] print_address_description.cold.4+0x9/0x1ff [ 196.303626] ? fpstate_init+0x50/0x160 [ 196.307527] kasan_report.cold.5+0x1b/0x39 [ 196.311778] ? fpstate_init+0x50/0x160 [ 196.315681] ? fpstate_init+0x50/0x160 [ 196.319599] check_memory_region+0x13e/0x1b0 [ 196.324020] memset+0x23/0x40 [ 196.327137] fpstate_init+0x50/0x160 [ 196.330898] kvm_arch_vcpu_init+0x3e9/0x870 [ 196.335239] kvm_vcpu_init+0x2fa/0x420 [ 196.339147] ? vcpu_stat_get+0x300/0x300 [ 196.343237] ? kmem_cache_alloc+0x33f/0x730 [ 196.347596] vmx_create_vcpu+0x1b7/0x2695 [ 196.351765] ? perf_trace_sched_process_exec+0x860/0x860 [ 196.357227] ? do_raw_spin_unlock+0xa7/0x330 [ 196.361651] ? vmx_exec_control+0x210/0x210 [ 196.365989] ? kasan_check_write+0x14/0x20 [ 196.370234] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 196.375172] ? futex_wait_queue_me+0x55d/0x840 [ 196.379772] ? wait_for_completion+0x8a0/0x8a0 [ 196.384373] ? print_usage_bug+0xc0/0xc0 [ 196.388456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.394038] ? get_futex_value_locked+0xcb/0xf0 [ 196.398735] kvm_arch_vcpu_create+0xe5/0x220 [ 196.403149] ? kvm_arch_vcpu_free+0x90/0x90 [ 196.407492] kvm_vm_ioctl+0x526/0x2030 [ 196.411395] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 196.416505] ? futex_wait+0x5ec/0xa50 [ 196.420325] ? kvm_unregister_device_ops+0x70/0x70 [ 196.425272] ? mark_held_locks+0x130/0x130 [ 196.429536] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 196.434763] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 196.439889] ? futex_wake+0x304/0x760 [ 196.443709] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 196.448325] ? __lock_acquire+0x62f/0x4c20 [ 196.452606] ? mark_held_locks+0x130/0x130 [ 196.456872] ? graph_lock+0x270/0x270 [ 196.460721] ? do_futex+0x249/0x26d0 [ 196.464451] ? copy_user_handle_tail+0x54/0xb0 [ 196.469045] ? .E_write_words+0x23/0x2e [ 196.473058] ? find_held_lock+0x36/0x1c0 [ 196.477142] ? __fget+0x4aa/0x740 [ 196.480610] ? lock_downgrade+0x900/0x900 [ 196.484771] ? check_preemption_disabled+0x48/0x280 [ 196.489821] ? kasan_check_read+0x11/0x20 [ 196.494234] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 196.499533] ? rcu_read_unlock_special+0x370/0x370 [ 196.504512] ? __fget+0x4d1/0x740 [ 196.507988] ? ksys_dup3+0x680/0x680 [ 196.511774] ? __might_fault+0x12b/0x1e0 [ 196.515844] ? lock_downgrade+0x900/0x900 [ 196.520003] ? lock_release+0xa00/0xa00 [ 196.523988] ? perf_trace_sched_process_exec+0x860/0x860 [ 196.529451] ? kvm_unregister_device_ops+0x70/0x70 [ 196.534410] do_vfs_ioctl+0x1de/0x1790 [ 196.538324] ? ioctl_preallocate+0x300/0x300 [ 196.542774] ? __fget_light+0x2e9/0x430 [ 196.546773] ? fget_raw+0x20/0x20 [ 196.550234] ? _copy_to_user+0xc8/0x110 [ 196.554220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.559772] ? put_timespec64+0x10f/0x1b0 [ 196.563934] ? nsecs_to_jiffies+0x30/0x30 [ 196.568107] ? do_syscall_64+0x9a/0x820 [ 196.572120] ? do_syscall_64+0x9a/0x820 [ 196.576100] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 196.580707] ? security_file_ioctl+0x94/0xc0 [ 196.585131] ksys_ioctl+0xa9/0xd0 [ 196.588637] __x64_sys_ioctl+0x73/0xb0 [ 196.592579] do_syscall_64+0x1b9/0x820 [ 196.596492] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 196.601885] ? syscall_return_slowpath+0x5e0/0x5e0 [ 196.606832] ? trace_hardirqs_on_caller+0x310/0x310 [ 196.611866] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 196.616892] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 196.623614] ? __switch_to_asm+0x40/0x70 [ 196.627681] ? __switch_to_asm+0x34/0x70 [ 196.631763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.636630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.641838] RIP: 0033:0x457669 [ 196.645058] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.664048] RSP: 002b:00007f899e951c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 196.671765] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 196.679038] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 196.686309] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 196.693588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f899e9526d4 [ 196.700863] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 196.708152] [ 196.709791] Allocated by task 7744: [ 196.713438] save_stack+0x43/0xd0 [ 196.716889] kasan_kmalloc+0xcb/0xd0 [ 196.720604] kasan_slab_alloc+0x12/0x20 [ 196.724599] kmem_cache_alloc+0x130/0x730 [ 196.728765] vmx_create_vcpu+0x110/0x2695 [ 196.732931] kvm_arch_vcpu_create+0xe5/0x220 [ 196.737346] kvm_vm_ioctl+0x526/0x2030 [ 196.741235] do_vfs_ioctl+0x1de/0x1790 [ 196.745127] ksys_ioctl+0xa9/0xd0 [ 196.748614] __x64_sys_ioctl+0x73/0xb0 [ 196.752509] do_syscall_64+0x1b9/0x820 [ 196.756404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.761592] [ 196.763219] Freed by task 0: [ 196.766228] (stack is not available) [ 196.769929] [ 196.771561] The buggy address belongs to the object at ffff8881c1a1ab80 [ 196.771561] which belongs to the cache x86_fpu of size 832 [ 196.783882] The buggy address is located 64 bytes inside of [ 196.783882] 832-byte region [ffff8881c1a1ab80, ffff8881c1a1aec0) [ 196.795677] The buggy address belongs to the page: [ 196.800610] page:ffffea0007068680 count:1 mapcount:0 mapping:ffff8881d64cc240 index:0x0 [ 196.808773] flags: 0x2fffc0000000200(slab) [ 196.813062] raw: 02fffc0000000200 ffff8881d512ca48 ffff8881d512ca48 ffff8881d64cc240 [ 196.820952] raw: 0000000000000000 ffff8881c1a1a040 0000000100000004 0000000000000000 [ 196.828829] page dumped because: kasan: bad access detected [ 196.834570] [ 196.836214] Memory state around the buggy address: [ 196.841149] ffff8881c1a1ad80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 196.848545] ffff8881c1a1ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 196.855932] >ffff8881c1a1ae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 196.863298] ^ [ 196.868755] ffff8881c1a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 196.876118] ffff8881c1a1af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 10:06:31 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:06:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64], 0x345) recvmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}}], 0x1, 0x0, 0x0) 10:06:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) [ 196.883477] ================================================================== [ 196.890837] Disabling lock debugging due to kernel taint [ 196.959872] Kernel panic - not syncing: panic_on_warn set ... [ 196.965833] CPU: 0 PID: 7744 Comm: syz-executor2 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 196.968209] kobject: 'kvm' (00000000934f0bca): kobject_uevent_env [ 196.975724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.975729] Call Trace: [ 196.975749] dump_stack+0x244/0x39d [ 196.975765] ? dump_stack_print_info.cold.1+0x20/0x20 [ 196.975785] ? fpstate_init+0x30/0x160 [ 196.992190] kobject: 'kvm' (00000000934f0bca): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 196.993957] panic+0x2ad/0x632 [ 196.993975] ? add_taint.cold.5+0x16/0x16 [ 197.022992] ? preempt_schedule+0x4d/0x60 [ 197.027146] ? ___preempt_schedule+0x16/0x18 [ 197.031575] ? trace_hardirqs_on+0xb4/0x310 [ 197.035910] ? fpstate_init+0x50/0x160 [ 197.039803] end_report+0x47/0x4f [ 197.043265] kasan_report.cold.5+0xe/0x39 [ 197.047431] ? fpstate_init+0x50/0x160 [ 197.051325] ? fpstate_init+0x50/0x160 [ 197.055222] check_memory_region+0x13e/0x1b0 [ 197.059634] memset+0x23/0x40 [ 197.062748] fpstate_init+0x50/0x160 [ 197.066471] kvm_arch_vcpu_init+0x3e9/0x870 [ 197.070803] kvm_vcpu_init+0x2fa/0x420 [ 197.074702] ? vcpu_stat_get+0x300/0x300 [ 197.078772] ? kmem_cache_alloc+0x33f/0x730 [ 197.083106] vmx_create_vcpu+0x1b7/0x2695 [ 197.087290] ? perf_trace_sched_process_exec+0x860/0x860 [ 197.092776] ? do_raw_spin_unlock+0xa7/0x330 [ 197.097195] ? vmx_exec_control+0x210/0x210 [ 197.101539] ? kasan_check_write+0x14/0x20 [ 197.105788] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 197.110720] ? futex_wait_queue_me+0x55d/0x840 [ 197.115347] ? wait_for_completion+0x8a0/0x8a0 [ 197.119933] ? print_usage_bug+0xc0/0xc0 [ 197.124003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.129553] ? get_futex_value_locked+0xcb/0xf0 [ 197.134230] kvm_arch_vcpu_create+0xe5/0x220 [ 197.138645] ? kvm_arch_vcpu_free+0x90/0x90 [ 197.142991] kvm_vm_ioctl+0x526/0x2030 [ 197.146888] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 197.152044] ? futex_wait+0x5ec/0xa50 [ 197.155864] ? kvm_unregister_device_ops+0x70/0x70 [ 197.160825] ? mark_held_locks+0x130/0x130 [ 197.165100] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 197.170304] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 197.175414] ? futex_wake+0x304/0x760 [ 197.179221] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 197.183815] ? __lock_acquire+0x62f/0x4c20 [ 197.188079] ? mark_held_locks+0x130/0x130 [ 197.192322] ? graph_lock+0x270/0x270 [ 197.196147] ? do_futex+0x249/0x26d0 [ 197.199870] ? copy_user_handle_tail+0x54/0xb0 [ 197.204471] ? .E_write_words+0x23/0x2e [ 197.208457] ? find_held_lock+0x36/0x1c0 [ 197.212532] ? __fget+0x4aa/0x740 [ 197.216006] ? lock_downgrade+0x900/0x900 [ 197.220164] ? check_preemption_disabled+0x48/0x280 [ 197.225180] ? kasan_check_read+0x11/0x20 [ 197.229338] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 197.234615] ? rcu_read_unlock_special+0x370/0x370 [ 197.239555] ? __fget+0x4d1/0x740 [ 197.243016] ? ksys_dup3+0x680/0x680 [ 197.246733] ? __might_fault+0x12b/0x1e0 [ 197.250803] ? lock_downgrade+0x900/0x900 [ 197.254953] ? lock_release+0xa00/0xa00 [ 197.258926] ? perf_trace_sched_process_exec+0x860/0x860 [ 197.264384] ? kvm_unregister_device_ops+0x70/0x70 [ 197.269323] do_vfs_ioctl+0x1de/0x1790 [ 197.273219] ? ioctl_preallocate+0x300/0x300 [ 197.277630] ? __fget_light+0x2e9/0x430 [ 197.281638] ? fget_raw+0x20/0x20 [ 197.285107] ? _copy_to_user+0xc8/0x110 [ 197.289135] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.294691] ? put_timespec64+0x10f/0x1b0 [ 197.298841] ? nsecs_to_jiffies+0x30/0x30 [ 197.303004] ? do_syscall_64+0x9a/0x820 [ 197.306991] ? do_syscall_64+0x9a/0x820 [ 197.310977] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 197.315589] ? security_file_ioctl+0x94/0xc0 [ 197.320006] ksys_ioctl+0xa9/0xd0 [ 197.323475] __x64_sys_ioctl+0x73/0xb0 [ 197.327363] do_syscall_64+0x1b9/0x820 [ 197.331253] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 197.336632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 197.341572] ? trace_hardirqs_on_caller+0x310/0x310 [ 197.346591] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 197.351613] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 197.358292] ? __switch_to_asm+0x40/0x70 [ 197.362349] ? __switch_to_asm+0x34/0x70 [ 197.366421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.371269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.376467] RIP: 0033:0x457669 [ 197.379660] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.398569] RSP: 002b:00007f899e951c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 197.406284] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 197.413558] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000006 [ 197.420857] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 197.428150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f899e9526d4 [ 197.435415] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 197.443739] Kernel Offset: disabled [ 197.447365] Rebooting in 86400 seconds..