[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 49.599840] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 49.955476] audit: type=1800 audit(1538913205.003:29): pid=5935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 50.330384] random: sshd: uninitialized urandom read (32 bytes read) [ 50.697290] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 52.230881] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.97' (ECDSA) to the list of known hosts. [ 58.170576] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/07 11:53:35 fuzzer started [ 62.369832] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/07 11:53:39 dialing manager at 10.128.0.26:36867 2018/10/07 11:53:39 syscalls: 1 2018/10/07 11:53:39 code coverage: enabled 2018/10/07 11:53:39 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/07 11:53:39 setuid sandbox: enabled 2018/10/07 11:53:39 namespace sandbox: enabled 2018/10/07 11:53:39 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/07 11:53:39 fault injection: enabled 2018/10/07 11:53:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/07 11:53:39 net packed injection: enabled 2018/10/07 11:53:39 net device setup: enabled [ 67.954535] random: crng init done 11:55:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000340)="cb", 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000000c0)=0x2, 0x4) [ 168.240453] IPVS: ftp: loaded support on port[0] = 21 [ 170.255301] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.261991] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.270183] device bridge_slave_0 entered promiscuous mode [ 170.391136] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.397642] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.405896] device bridge_slave_1 entered promiscuous mode [ 170.526216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 170.646007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.020978] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:55:26 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x6f4, 0x2, 0xff}) r1 = socket$key(0xf, 0x3, 0x2) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000001c0)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)={0x0, 0x0, 0x80000000, 0x90}) sendmsg$key(r1, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) sched_getscheduler(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x9, 0x8, 0x0, 0x10000}) [ 171.144482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.942350] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.950275] team0: Port device team_slave_0 added [ 171.986556] IPVS: ftp: loaded support on port[0] = 21 [ 172.102991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.110743] team0: Port device team_slave_1 added [ 172.304515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 172.332420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.341057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.450505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.684591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.692296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.700988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.872700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.880206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.889114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.091998] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.098497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.105489] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.111978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.120633] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 175.165534] ip (6226) used greatest stack depth: 53056 bytes left [ 175.374215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.414579] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.421016] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.430302] device bridge_slave_0 entered promiscuous mode [ 175.655142] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.661629] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.670087] device bridge_slave_1 entered promiscuous mode 11:55:31 executing program 2: pipe2(&(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) [ 175.959345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.262262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.817964] IPVS: ftp: loaded support on port[0] = 21 [ 176.966428] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.256791] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.497151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 177.504381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.808631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.815843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.579819] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.587835] team0: Port device team_slave_0 added [ 178.813030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.820882] team0: Port device team_slave_1 added [ 179.072100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.079254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.087945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.330962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.338089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.346894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.602118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.609626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.618769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.834971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.842552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.851286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.069503] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.076307] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.084594] device bridge_slave_0 entered promiscuous mode [ 181.373452] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.379900] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.388284] device bridge_slave_1 entered promiscuous mode [ 181.650603] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 181.870976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.554559] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.673658] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.680120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.687069] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.693563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.702270] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.869318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.024521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.031589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 11:55:38 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x0, 0x4}]}, 0xc, 0x1) ptrace$setopts(0x4202, r0, 0x0, 0x31) tkill(r0, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) sched_setparam(r0, &(0x7f0000000100)=0x2) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000240)) [ 183.313875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.321354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.552557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.202324] IPVS: ftp: loaded support on port[0] = 21 [ 184.292131] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.299905] team0: Port device team_slave_0 added [ 184.663955] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.672279] team0: Port device team_slave_1 added [ 184.988285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.995587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.004286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.362618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.369682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.379061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.690758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.698472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.707362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.724572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.076363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.084074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.093003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.817949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.134140] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.140730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.149186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.179803] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.186480] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.195023] device bridge_slave_0 entered promiscuous mode [ 189.226118] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.555693] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.562403] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.570540] device bridge_slave_1 entered promiscuous mode [ 189.665810] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.672464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.679339] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.685911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.694449] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.771982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.918035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 190.251443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 191.138403] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 191.441490] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 191.764461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 191.783583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 11:55:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x20) [ 192.137087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 192.144432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.536932] ip (6655) used greatest stack depth: 53040 bytes left [ 193.141859] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 193.149742] team0: Port device team_slave_0 added [ 193.316302] IPVS: ftp: loaded support on port[0] = 21 [ 193.549516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 193.557540] team0: Port device team_slave_1 added [ 193.975082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.982343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.990922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.327652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.334800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.343515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.715737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.723537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.732549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.175072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.182715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.191371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.618157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.602065] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:55:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0xc, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x4) [ 198.139990] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 11:55:53 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000100)=0xffffffba, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x2, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e20}, 0x225, 0x20, 0x5, 0x80, 0x5, 0x0, 0x1, 0x7, 0x5}) getpeername$packet(r1, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000dc0)=0x14) 11:55:54 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x240000, 0x0) dup3(r0, r1, 0x0) 11:55:54 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x2, 0x220003) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000380)={0x5}, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000480)={0x0, {}, 0x0, 0x2000000000001ef}, 0x82) [ 199.491169] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.497890] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.506116] device bridge_slave_0 entered promiscuous mode [ 199.544485] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.550949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.557921] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.564458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.572710] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.598116] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 199.604637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.612459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.620073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:55:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="021203000300000000000000000000000100080000000000"], 0x18}}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x80) [ 199.980983] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.987620] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.995875] device bridge_slave_1 entered promiscuous mode 11:55:55 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x68, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000027bd7000ffdbdf250d00000014000300080005000066ddbfd54f96686007dc0080000800030002000000080006001f000000440541b476f75be8d0f774694eed90a1b99bdaf4c74949db3960ed33155ede0e5168d752805a87dea8d013b7e114c2a32e7def1eaf0e4449200beb16dde815f0aa5d741506d3ba1c89a3692439b2ebccc0dfe6e158145985a3ee3d2a303b2d4e72e1ba6f6dd099e3e4fde69072cdf72281a449ba0daa6e20bd04c1aa899cd50455"], 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x151000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={r2, 0x0, r3}) r4 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000300)={0x101ff, 0x1, 0xd000, 0x2000, &(0x7f0000b5c000/0x2000)=nil}) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)) [ 200.443990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:55:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)="62627200127a7befb1aecd9d343c125105380d534d033390f728a1d423f4e7de0e284f4e76cd331830592dd776c542f5279a821f624aa22dc8d441c18a0f716a6df525e17304091496afcbc5bb1fdeb3a2b1669c2de799359c50b894", 0x5c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7}, &(0x7f0000000580)=0x8) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000000), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000500)=[{&(0x7f0000003ac0)=""/4096, 0xfffffe44}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 200.751569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.972455] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.931429] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:55:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)="62627200127a7befb1aecd9d343c125105380d534d033390f728a1d423f4e7de0e284f4e76cd331830592dd776c542f5279a821f624aa22dc8d441c18a0f716a6df525e17304091496afcbc5bb1fdeb3a2b1669c2de799359c50b894", 0x5c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7}, &(0x7f0000000580)=0x8) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000000), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000500)=[{&(0x7f0000003ac0)=""/4096, 0xfffffe44}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 202.375249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.737692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.745011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.094970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.102192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.027412] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.035585] team0: Port device team_slave_0 added [ 204.191585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.199705] team0: Port device team_slave_1 added [ 204.462526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.474470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.483254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.731953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 204.739008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.747732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.845427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.010202] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.017802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.026745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.293348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.300861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.309691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.942775] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 206.898990] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 206.905525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.913288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.773993] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.780478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.787473] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.793976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.802293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:56:02 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x6f4, 0x2, 0xff}) r1 = socket$key(0xf, 0x3, 0x2) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000001c0)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)={0x0, 0x0, 0x80000000, 0x90}) sendmsg$key(r1, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) sched_getscheduler(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x9, 0x8, 0x0, 0x10000}) [ 207.911903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.950091] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.759541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.507324] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.090646] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.097141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.104905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:56:07 executing program 2: pipe2(&(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)) [ 212.740202] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.850300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.333749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.771076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.777398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.785292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.083648] 8021q: adding VLAN 0 to HW filter on device team0 11:56:13 executing program 3: 11:56:13 executing program 0: getgroups(0x2, &(0x7f0000000140)=[0xee00, 0xffffffffffffffff]) setresgid(r0, 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) fchdir(r1) 11:56:13 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x28000, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)=""/40, &(0x7f0000000080)=0x28) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0x2) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000100)={@multicast1, @multicast1, @loopback}, 0xc) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000140)=""/43, &(0x7f0000000180)=0x2b) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) fremovexattr(r0, &(0x7f0000000300)=@random={'osx.', '/dev/hwrng\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000380)={r2, 0x3}) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r3 = accept4$alg(r0, 0x0, 0x0, 0x800) sendfile(r0, r3, &(0x7f0000000440), 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000480)={0xfffffffffffff801, 0x1, 'client1\x00', 0xffffffff80000003, "29b2929cca7fcf0f", "bce53c03767be6b9ce5a7b43a93b6207eed3440fa09bcd1620efe73f8f25fe39", 0x9, 0x101}) fstatfs(r3, &(0x7f0000000540)=""/210) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000640)={0x5, 0x1}) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000680)=0x6) write$P9_RREADDIR(r1, &(0x7f00000006c0)={0xe4, 0x29, 0x2, {0x7f, [{{0x48, 0x3, 0x5}, 0x3, 0x7fffffff, 0x7, './file0'}, {{0x2c, 0x9, 0x3}, 0x6, 0x2, 0x7, './file0'}, {{0x20, 0x4, 0x8}, 0x3f, 0x9, 0x7, './file0'}, {{0x0, 0x4, 0x2}, 0x6, 0x1, 0x7, './file0'}, {{0x20, 0x2, 0x7}, 0x10001, 0x2, 0x7, './file0'}, {{0x5, 0x1, 0x6}, 0x8036, 0x6, 0x7, './file0'}, {{0x9, 0x3, 0x4}, 0x4f, 0x9, 0x7, './file0'}]}}, 0xe4) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000007c0)=0x2, &(0x7f0000000800)=0x2) sendmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f0000000840)=@generic={0x17, "ef886db867118d8d6045c744dae3d1862b0cd2e5715ffd3aa25f68ed0b80c63c91d50f24ecdba364a3fefe6884d2f5014f1a8793dc7ea08d9adeab7b0b45a33982b75e524a6156710c5b0b23a0702a24c919fa914eec19139c26c420084204601fb149daff3a10d51e2a7c61806b96b6137127e998d3ce81593f4ab343dc"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000900)=[{0xb8, 0x11f, 0x8, "1285b02c126bfebaae753af73ec8cc789fc2cf058643fc8c08d13e4bad76a4803a01037802c4d917c7fb4dcc5f79e963dc0ace49367b8f3fa47b3b7a1207c7c6a2e4ee5a4bf23f894ccbe529d15a1e3951326b255b626643d614aa3a521048c791974b22a320f8ca683e3fb45c979cce7af9eb9f7126b4d8c29a5af30dc45c92090e3e7eae6cf1cd6cf58a0ca28ed4494e1af970fde6f3a187ec17745c1f86b47a9f"}], 0xb8, 0x8080}, 0xc801) write$P9_RREADDIR(r1, &(0x7f0000000a00)={0x87, 0x29, 0x1, {0x193, [{{0x60, 0x3, 0x6}, 0x5, 0x4, 0x7, './file0'}, {{0xc, 0x1, 0x3}, 0x1, 0x1e, 0x7, './file0'}, {{0x22, 0x3, 0x3}, 0x8, 0x9, 0x7, './file0'}, {{0x16, 0x2, 0x5}, 0x7e2, 0x81, 0x7, './file0'}]}}, 0x87) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000ac0)={@remote, 0x6a, 0x3, 0x0, 0x8, 0x7, 0x3, 0xe46}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000b00)='-\x00'}, 0x30) migrate_pages(r4, 0x6, &(0x7f0000000b80)=0x23f, &(0x7f0000000bc0)=0x3) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000c00)={r2, 0x1}) acct(&(0x7f0000000c40)='./file0\x00') r5 = openat(r0, &(0x7f0000000c80)='./file0\x00', 0x2000, 0x1) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000cc0)=""/194) write$P9_RSYMLINK(r1, &(0x7f0000000dc0)={0x14, 0x11, 0x2, {0x1, 0x4, 0x5}}, 0x14) write$apparmor_exec(r5, &(0x7f0000000e00)={'exec ', '\x00'}, 0x6) 11:56:13 executing program 1: 11:56:13 executing program 2: 11:56:13 executing program 4: 11:56:14 executing program 3: 11:56:14 executing program 4: 11:56:14 executing program 0: 11:56:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bc0}, {{@in=@rand_addr, 0x0, 0x33}, 0x0, @in=@loopback}}, 0xe8) 11:56:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8ba7, &(0x7f0000000040)) 11:56:14 executing program 4: mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, &(0x7f00000002c0)=ANY=[]) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x0, {{0x2, 0x3a, @remote}}}, 0x88) mount(&(0x7f0000000000), &(0x7f0000000380)='./file1\x00', &(0x7f0000000280)='hfsplus\x00', 0x0, &(0x7f0000000240)="0039a72bdfc19b4a537279543fceec4cf6ccbc5914bd90979dfe58d58cbc9d6b6056") 11:56:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() 11:56:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f00000000c0)={0x77359400}) [ 219.898941] IPVS: ftp: loaded support on port[0] = 21 [ 221.103989] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.110383] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.118409] device bridge_slave_0 entered promiscuous mode [ 221.193711] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.200109] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.208090] device bridge_slave_1 entered promiscuous mode [ 221.281805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.355632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.579561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.659158] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.803220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.810195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.032767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.040416] team0: Port device team_slave_0 added [ 222.113797] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.121258] team0: Port device team_slave_1 added [ 222.194799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.270880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.345371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.352686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.361217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.435009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.442475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.450977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.259968] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.266412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.273294] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.279676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.287777] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.791942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.267491] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.538704] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 226.814576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.820826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.828734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.100639] 8021q: adding VLAN 0 to HW filter on device team0 11:56:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:modules_dep_t:s0\x00', 0x23, 0x0) 11:56:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4100, 0x0) 11:56:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, r0) 11:56:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/50) 11:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) 11:56:24 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x0) 11:56:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1}, 0xc) 11:56:24 executing program 3: 11:56:24 executing program 0: 11:56:24 executing program 2: 11:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) 11:56:24 executing program 1: 11:56:24 executing program 5: 11:56:24 executing program 3: 11:56:24 executing program 5: 11:56:24 executing program 0: 11:56:24 executing program 2: 11:56:24 executing program 1: 11:56:25 executing program 5: 11:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) 11:56:25 executing program 3: 11:56:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x803, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f0000016000)=[{0x28, 0x0, 0x0, 0xfffffffffffff000}, {0x6}]}, 0x10) 11:56:25 executing program 1: 11:56:25 executing program 0: 11:56:25 executing program 5: 11:56:25 executing program 3: 11:56:25 executing program 0: 11:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) 11:56:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000c07e98)=@newsa={0x10c, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@replay_esn_val={0x1c}]}, 0x10c}}, 0x0) 11:56:25 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x0, 0x100000000020011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000500)={0x4, 0x0, &(0x7f0000000480)=[@enter_looper], 0x1, 0x0, &(0x7f00000004c0)='8'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000000680)}) 11:56:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001a0001f1ff0000000828b19f00000000"], 0x1}}, 0x0) 11:56:26 executing program 5: r0 = socket(0x11, 0x2, 0x9) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={"6c6f004000100300", 0x101}) chdir(&(0x7f0000000040)='./file0/../file0\x00') [ 230.964747] binder: 7828 RLIMIT_NICE not set 11:56:26 executing program 3: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0x0, 0x0, {0x0, 0x0, 0x40, 0x7, 0x401, 0x0, {0x0, 0x1}}}, 0x90) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xa6ba0) io_setup(0x0, &(0x7f0000000200)) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) 11:56:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) [ 231.187754] hrtimer: interrupt took 51474 ns 11:56:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) setrlimit(0x400000000000007, &(0x7f0000000000)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa1cd, 0x402}) 11:56:26 executing program 0: [ 231.338674] device lo entered promiscuous mode 11:56:26 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x100000002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 231.559654] device lo left promiscuous mode 11:56:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) [ 231.664677] device lo entered promiscuous mode 11:56:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d65b970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a6fb78edd28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") read$eventfd(r0, &(0x7f0000000000), 0x8) 11:56:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="28000000150005000000000000000000010000000c000200fe8000a05e00000000000017000000003ad8753d4673d90d7abd60218d56686d1bd18658a7c7b4756517520363fce38187a56d1692e7"], 0x1}}, 0x0) 11:56:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000580)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x119, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 11:56:27 executing program 5: r0 = socket(0x11, 0x2, 0x9) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={"6c6f004000100300", 0x101}) chdir(&(0x7f0000000040)='./file0/../file0\x00') 11:56:27 executing program 0: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002b80)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x6c, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000280)=0xff7b) [ 232.187492] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:56:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}}, 0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3ad) 11:56:27 executing program 3: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0x0, 0x0, {0x0, 0x0, 0x40, 0x7, 0x401, 0x0, {0x0, 0x1}}}, 0x90) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xa6ba0) io_setup(0x0, &(0x7f0000000200)) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) [ 232.294225] device lo left promiscuous mode [ 232.409871] ================================================================== [ 232.417378] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 [ 232.423867] CPU: 1 PID: 7872 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #63 [ 232.431042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.440398] Call Trace: [ 232.442972] [ 232.445124] dump_stack+0x306/0x460 [ 232.448746] ? loaded_vmcs_init+0x343/0x590 [ 232.453098] kmsan_report+0x1a3/0x2d0 [ 232.456895] __msan_warning+0x7c/0xe0 [ 232.460694] loaded_vmcs_init+0x343/0x590 [ 232.464840] __loaded_vmcs_clear+0x2fb/0x3c0 [ 232.469255] flush_smp_call_function_queue+0x404/0x770 [ 232.474538] ? vmx_get_msr_feature+0x180/0x180 [ 232.479123] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 232.485353] smp_call_function_single_interrupt+0x2f7/0x530 [ 232.491076] call_function_single_interrupt+0xf/0x20 [ 232.496168] [ 232.498420] RIP: 0010:_raw_spin_unlock_irqrestore+0x4b/0x70 [ 232.504134] Code: 00 8b b8 88 0c 00 00 48 8b 00 48 85 c0 75 28 48 89 df e8 48 23 56 f7 c6 00 00 c6 03 00 4d 85 e4 75 1c 4c 89 7d d8 ff 75 d8 9d <48> 83 c4 08 5b 41 5c 41 5e 41 5f 5d c3 e8 83 2d 56 f7 eb d1 44 89 [ 232.523030] RSP: 0018:ffff880179d1fc60 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff04 [ 232.530738] RAX: ffff88017a3d611c RBX: ffff88017a36611c RCX: ffff88017a39e11c [ 232.537996] RDX: ffff88017a39e11c RSI: aaaaaaaaaaaab000 RDI: ffffea0008dd4640 [ 232.545254] RBP: ffff880179d1fc88 R08: 0000000000480020 R09: 0000000000000002 [ 232.552516] R10: 0000000000000000 R11: ffffffff816f2a30 R12: 0000000000000000 [ 232.559778] R13: ffff88021fcba598 R14: 00000000fac0000c R15: 0000000000000286 [ 232.567046] ? yield_to_task_fair+0x2f0/0x2f0 [ 232.571545] wake_up_new_task+0x17f9/0x1ae0 [ 232.575877] _do_fork+0x9ab/0x1330 [ 232.579427] __se_sys_clone+0xf6/0x110 [ 232.583319] __x64_sys_clone+0x62/0x80 [ 232.587210] do_syscall_64+0xbe/0x100 [ 232.591003] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 232.596180] RIP: 0033:0x459f49 [ 232.599362] Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 232.618253] RSP: 002b:0000000000a3fac8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 232.625963] RAX: ffffffffffffffda RBX: 00007ffb2ac23700 RCX: 0000000000459f49 [ 232.633224] RDX: 00007ffb2ac239d0 RSI: 00007ffb2ac22db0 RDI: 00000000003d0f00 [ 232.640588] RBP: 0000000000a3fcd0 R08: 00007ffb2ac23700 R09: 00007ffb2ac23700 [ 232.647858] R10: 00007ffb2ac239d0 R11: 0000000000000202 R12: 0000000000000000 [ 232.655126] R13: 0000000000a3fb7f R14: 00007ffb2ac239c0 R15: 0000000000000001 [ 232.662394] [ 232.664011] Local variable description: ----error.i@loaded_vmcs_init [ 232.670483] Variable was created at: [ 232.674191] loaded_vmcs_init+0x8a/0x590 [ 232.678244] __loaded_vmcs_clear+0x2fb/0x3c0 [ 232.682635] ================================================================== [ 232.689979] Disabling lock debugging due to kernel taint [ 232.695414] Kernel panic - not syncing: panic_on_warn set ... [ 232.695414] [ 232.702774] CPU: 1 PID: 7872 Comm: syz-executor5 Tainted: G B 4.19.0-rc4+ #63 [ 232.711334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.720673] Call Trace: [ 232.723245] [ 232.725392] dump_stack+0x306/0x460 [ 232.729020] panic+0x54c/0xafa [ 232.732222] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 232.737666] kmsan_report+0x2cd/0x2d0 [ 232.741463] __msan_warning+0x7c/0xe0 [ 232.745262] loaded_vmcs_init+0x343/0x590 [ 232.749414] __loaded_vmcs_clear+0x2fb/0x3c0 [ 232.753908] flush_smp_call_function_queue+0x404/0x770 [ 232.759176] ? vmx_get_msr_feature+0x180/0x180 [ 232.763758] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 232.769984] smp_call_function_single_interrupt+0x2f7/0x530 [ 232.775689] call_function_single_interrupt+0xf/0x20 [ 232.780775] [ 232.783007] RIP: 0010:_raw_spin_unlock_irqrestore+0x4b/0x70 [ 232.788728] Code: 00 8b b8 88 0c 00 00 48 8b 00 48 85 c0 75 28 48 89 df e8 48 23 56 f7 c6 00 00 c6 03 00 4d 85 e4 75 1c 4c 89 7d d8 ff 75 d8 9d <48> 83 c4 08 5b 41 5c 41 5e 41 5f 5d c3 e8 83 2d 56 f7 eb d1 44 89 [ 232.807620] RSP: 0018:ffff880179d1fc60 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff04 [ 232.815334] RAX: ffff88017a3d611c RBX: ffff88017a36611c RCX: ffff88017a39e11c [ 232.822595] RDX: ffff88017a39e11c RSI: aaaaaaaaaaaab000 RDI: ffffea0008dd4640 [ 232.829856] RBP: ffff880179d1fc88 R08: 0000000000480020 R09: 0000000000000002 [ 232.837118] R10: 0000000000000000 R11: ffffffff816f2a30 R12: 0000000000000000 [ 232.844388] R13: ffff88021fcba598 R14: 00000000fac0000c R15: 0000000000000286 [ 232.851686] ? yield_to_task_fair+0x2f0/0x2f0 [ 232.856215] wake_up_new_task+0x17f9/0x1ae0 [ 232.860540] _do_fork+0x9ab/0x1330 [ 232.864093] __se_sys_clone+0xf6/0x110 [ 232.867979] __x64_sys_clone+0x62/0x80 [ 232.871859] do_syscall_64+0xbe/0x100 [ 232.875657] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 232.880834] RIP: 0033:0x459f49 [ 232.884016] Code: ff 48 85 f6 0f 84 47 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 1e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 232.902910] RSP: 002b:0000000000a3fac8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 232.910613] RAX: ffffffffffffffda RBX: 00007ffb2ac23700 RCX: 0000000000459f49 [ 232.917871] RDX: 00007ffb2ac239d0 RSI: 00007ffb2ac22db0 RDI: 00000000003d0f00 [ 232.925134] RBP: 0000000000a3fcd0 R08: 00007ffb2ac23700 R09: 00007ffb2ac23700 [ 232.932402] R10: 00007ffb2ac239d0 R11: 0000000000000202 R12: 0000000000000000 [ 232.939661] R13: 0000000000a3fb7f R14: 00007ffb2ac239c0 R15: 0000000000000001 [ 232.948048] Kernel Offset: disabled [ 232.951671] Rebooting in 86400 seconds..