[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 89.840512][ T31] audit: type=1800 audit(1571101084.884:25): pid=12937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 89.863590][ T31] audit: type=1800 audit(1571101084.904:26): pid=12937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 89.899479][ T31] audit: type=1800 audit(1571101084.934:27): pid=12937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.159' (ECDSA) to the list of known hosts. 2019/10/15 00:58:19 fuzzer started 2019/10/15 00:58:24 dialing manager at 10.128.0.26:42019 2019/10/15 00:58:25 syscalls: 2412 2019/10/15 00:58:25 code coverage: enabled 2019/10/15 00:58:25 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/10/15 00:58:25 extra coverage: enabled 2019/10/15 00:58:25 setuid sandbox: enabled 2019/10/15 00:58:25 namespace sandbox: enabled 2019/10/15 00:58:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 00:58:25 fault injection: enabled 2019/10/15 00:58:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 00:58:25 net packet injection: enabled 2019/10/15 00:58:25 net device setup: enabled 2019/10/15 00:58:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 01:02:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{0x0, 0x13d}], 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) syzkaller login: [ 338.447247][T13101] IPVS: ftp: loaded support on port[0] = 21 [ 338.592130][T13101] chnl_net:caif_netlink_parms(): no params data found [ 338.659800][T13101] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.667102][T13101] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.675913][T13101] device bridge_slave_0 entered promiscuous mode [ 338.685949][T13101] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.694595][T13101] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.703259][T13101] device bridge_slave_1 entered promiscuous mode [ 338.736992][T13101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 338.750502][T13101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 338.783652][T13101] team0: Port device team_slave_0 added [ 338.793199][T13101] team0: Port device team_slave_1 added [ 338.968744][T13101] device hsr_slave_0 entered promiscuous mode [ 339.115168][T13101] device hsr_slave_1 entered promiscuous mode [ 339.395050][T13101] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.402289][T13101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.410554][T13101] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.417873][T13101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.498894][T13101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.519488][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.532933][ T811] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.544120][ T811] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.559961][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 339.579729][T13101] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.598431][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.608015][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.618294][T13104] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.625783][T13104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.672851][T13101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 339.683850][T13101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 339.698836][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.709735][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.718898][T13104] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.726141][T13104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.734900][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.744910][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 339.754791][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 339.764862][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 339.774584][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.784808][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.794784][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.804110][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.813915][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.823560][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.838518][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.847549][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 339.881811][T13101] 8021q: adding VLAN 0 to HW filter on device batadv0 01:02:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{0x0, 0x13d}], 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 01:02:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{0x0, 0x13d}], 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r6 = accept4(r4, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 341.797327][T13121] IPVS: ftp: loaded support on port[0] = 21 01:02:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x10, 0x0, 0x0) socket(0x100000000011, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 341.987596][T13121] chnl_net:caif_netlink_parms(): no params data found 01:02:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x1) [ 342.046283][T13121] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.053506][T13121] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.062469][T13121] device bridge_slave_0 entered promiscuous mode [ 342.072717][T13121] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.080121][T13121] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.089032][T13121] device bridge_slave_1 entered promiscuous mode 01:02:17 executing program 0: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000200)=0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='/dev/net/tun\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6\x00\x02\x00\x00ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x8c\x14', 0x2761, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfffffd55) [ 342.167655][T13121] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.180721][T13121] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 342.220148][T13121] team0: Port device team_slave_0 added [ 342.246577][T13121] team0: Port device team_slave_1 added [ 342.498995][T13121] device hsr_slave_0 entered promiscuous mode [ 342.606839][T13121] device hsr_slave_1 entered promiscuous mode [ 342.684854][T13121] debugfs: Directory 'hsr0' with parent '/' already present! [ 342.741185][T13121] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.748480][T13121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.756283][T13121] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.763483][T13121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.865935][T13121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.893082][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:02:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @broadcast}, 0x3f3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x100000000011, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 342.913221][ T3643] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.942552][ T3643] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.970897][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 343.003265][T13121] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.025125][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.035167][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.044330][ T3643] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.055061][ T3643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.069411][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.079074][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.088155][ T3643] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.095374][ T3643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.115560][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 343.125810][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 343.160903][T13121] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 343.171483][T13121] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 343.186938][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 343.197171][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 343.206878][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 343.216717][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 343.226115][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.235289][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.245245][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 01:02:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x1) [ 343.254538][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.267943][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 343.277181][T13104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 343.315241][T13121] 8021q: adding VLAN 0 to HW filter on device batadv0 01:02:18 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="230400000000000000060ad1266d12e95afed85a1bf38a2f1b4ba87899a3686efe93e8b0dc000000000000000000"], 0x2e) ioctl$SG_IO(r0, 0x2285, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000100000000038000000000000000000000000002000"/88], 0x58) poll(&(0x7f0000000600)=[{r0}], 0x1, 0x0) 01:02:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@setlink={0x3, 0x13, 0x311, 0x0, 0x800, {}, [@IFLA_TXQLEN={0x8}, @IFLA_IFALIAS={0x14, 0x28, 'veth0_to_team\x00'}, @IFLA_IFNAME={0x14, 0x3, 'team_slave_1\x00'}]}, 0x50}}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101801) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000100)={0xa7}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f0000000000)={0x4, 0x3, 0x8, 0x4, 0x9, 0x7c}) 01:02:18 executing program 0: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x100000000000012, 0x7, 0x1, 0x3, 0x0, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x355, 0x0, 0x9, 0xfc}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = socket(0x22, 0x2, 0x1) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) shutdown(r2, 0xb414e86ec7b51ba3) write$char_usb(r1, 0x0, 0xfed2) r3 = socket(0x22, 0x2, 0x1) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x101801) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x38) r7 = eventfd(0x1) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000080)=r7) ioctl$IMGETDEVINFO(r3, 0x80044944, 0x0) r8 = socket(0x22, 0x2, 0x1) ioctl$IMGETDEVINFO(r8, 0x80044944, 0x0) r9 = dup2(0xffffffffffffffff, r8) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r11, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev}]}, 0x28}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r15, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100"/64], 0x58}}, 0x0) sendmsg$FOU_CMD_GET(r9, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x85204040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r11, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IFINDEX={0x8, 0xb, r15}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x5) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000040)=0xffffff19, 0x4) [ 344.164001][T13104] usb 1-1: new high-speed USB device number 2 using dummy_hcd 01:02:19 executing program 1: syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000eacf96204e080110c8060000000109021b0001000000000904c100016615130009058f5302000000004dea2d321606556564d9a20b016600025b15bf2e279202a6a800ad15aa8b90bd25b7bd64b4418866a168f1053bc90def6fe5f7ca7e7b11e0c93dcb64cf6f8c9b411e87a521260b575ba38de7a434b86547d501bd304025cf68e725467bf7eb62a02b34781e07909bf1f278d83ab1b192e73951355dfe73e5a97d71d7defa3524aac9efd603cf38b979d7ab47f7605e68e2b69e8e3de5be0f8abe0ef903bf06e1babc99acafa1feeaf9da381b914aba993b904b3ac4ac847fc7"], 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xea, 0x84800) r0 = socket(0x22, 0x2, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x3, 0x4) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @broadcast, 'vxcan1\x00'}}) [ 344.404465][T13104] usb 1-1: Using ep0 maxpacket: 8 [ 344.524619][T13104] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 344.534989][T13104] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 344.545186][T13104] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 344.558325][T13104] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 344.567504][T13104] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 344.665144][ T3643] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 344.934147][ T3643] usb 2-1: Using ep0 maxpacket: 32 [ 345.060257][T13104] usblp 1-1:1.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 345.074645][ T3643] usb 2-1: config 0 has an invalid interface number: 193 but max is 0 [ 345.083092][ T3643] usb 2-1: config 0 has no interface number 0 [ 345.089441][ T3643] usb 2-1: config 0 interface 193 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 345.100713][ T3643] usb 2-1: New USB device found, idVendor=084e, idProduct=1001, bcdDevice= 6.c8 [ 345.110146][ T3643] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 345.120320][ T3643] usb 2-1: config 0 descriptor?? [ 345.169867][ T3643] input: KB Gear Tablet as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.193/input/input5 [ 345.295312][ C0] usblp0: nonzero read bulk status received: -71 [ 345.332645][T13104] usb 1-1: USB disconnect, device number 2 [ 345.347329][T13164] ===================================================== [ 345.354322][T13164] BUG: KMSAN: use-after-free in usb_autopm_put_interface+0xf2/0x120 [ 345.362422][T13164] CPU: 0 PID: 13164 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 345.370317][T13164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.380375][T13164] Call Trace: [ 345.383677][T13164] dump_stack+0x191/0x1f0 [ 345.388025][T13164] kmsan_report+0x14a/0x2f0 [ 345.392605][T13164] __msan_warning+0x73/0xf0 [ 345.397122][T13164] usb_autopm_put_interface+0xf2/0x120 [ 345.402588][T13164] usblp_release+0x182/0x3d0 [ 345.407199][T13164] ? usblp_open+0x610/0x610 [ 345.411876][T13164] __fput+0x4c9/0xba0 [ 345.415878][T13164] ____fput+0x37/0x40 [ 345.419860][T13164] ? fput_many+0x2a0/0x2a0 [ 345.424370][T13164] task_work_run+0x22e/0x2a0 [ 345.428972][T13164] prepare_exit_to_usermode+0x39d/0x4d0 [ 345.434538][T13164] syscall_return_slowpath+0x90/0x610 [ 345.439925][T13164] do_syscall_64+0xdc/0x160 [ 345.444431][T13164] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.450319][T13164] RIP: 0033:0x413741 [ 345.454223][T13164] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 345.473833][T13164] RSP: 002b:0000000000a6fbf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 345.482335][T13164] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 [ 345.490305][T13164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 345.498307][T13164] RBP: 0000000000000001 R08: 000000006e8b811c R09: 000000006e8b8120 [ 345.506283][T13164] R10: 0000000000a6fcd0 R11: 0000000000000293 R12: 000000000075bf20 [ 345.514261][T13164] R13: 000000000005452a R14: 0000000000763cd0 R15: 000000000075bf2c [ 345.522247][T13164] [ 345.524567][T13164] Uninit was created at: [ 345.528843][T13164] kmsan_internal_poison_shadow+0x60/0x110 [ 345.534655][T13164] kmsan_slab_free+0x8d/0x100 [ 345.539329][T13164] kfree+0x4c1/0x2e70 [ 345.543312][T13164] usb_release_interface+0x105/0x120 [ 345.548593][T13164] device_release+0xe2/0x380 [ 345.553200][T13164] kobject_put+0x38d/0x480 [ 345.557616][T13164] put_device+0x51/0x70 [ 345.561782][T13164] usb_disable_device+0x69a/0x1150 [ 345.566900][T13164] usb_disconnect+0x51e/0xd60 [ 345.571577][T13164] hub_event+0x3fd0/0x72f0 [ 345.575996][T13164] process_one_work+0x1572/0x1ef0 [ 345.581018][T13164] worker_thread+0x111b/0x2460 [ 345.585780][T13164] kthread+0x4b5/0x4f0 [ 345.589857][T13164] ret_from_fork+0x35/0x40 [ 345.594441][T13164] ===================================================== [ 345.601366][T13164] Disabling lock debugging due to kernel taint [ 345.607514][T13164] Kernel panic - not syncing: panic_on_warn set ... [ 345.614102][T13164] CPU: 0 PID: 13164 Comm: syz-executor.0 Tainted: G B 5.4.0-rc3+ #0 [ 345.623373][T13164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.633525][T13164] Call Trace: [ 345.636830][T13164] dump_stack+0x191/0x1f0 [ 345.641603][T13164] panic+0x3c9/0xc1e [ 345.645539][T13164] kmsan_report+0x2e8/0x2f0 [ 345.650061][T13164] __msan_warning+0x73/0xf0 [ 345.654576][T13164] usb_autopm_put_interface+0xf2/0x120 [ 345.660042][T13164] usblp_release+0x182/0x3d0 [ 345.664657][T13164] ? usblp_open+0x610/0x610 [ 345.669160][T13164] __fput+0x4c9/0xba0 [ 345.673161][T13164] ____fput+0x37/0x40 [ 345.677165][T13164] ? fput_many+0x2a0/0x2a0 [ 345.681600][T13164] task_work_run+0x22e/0x2a0 [ 345.686219][T13164] prepare_exit_to_usermode+0x39d/0x4d0 [ 345.691790][T13164] syscall_return_slowpath+0x90/0x610 [ 345.697220][T13164] do_syscall_64+0xdc/0x160 [ 345.701732][T13164] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.707623][T13164] RIP: 0033:0x413741 [ 345.711521][T13164] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 345.731133][T13164] RSP: 002b:0000000000a6fbf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 345.739750][T13164] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 [ 345.747809][T13164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 345.755788][T13164] RBP: 0000000000000001 R08: 000000006e8b811c R09: 000000006e8b8120 [ 345.764024][T13164] R10: 0000000000a6fcd0 R11: 0000000000000293 R12: 000000000075bf20 [ 345.771998][T13164] R13: 000000000005452a R14: 0000000000763cd0 R15: 000000000075bf2c [ 345.781651][T13164] Kernel Offset: disabled [ 345.786746][T13164] Rebooting in 86400 seconds..