[ 56.723111] audit: type=1800 audit(1538971784.761:27): pid=5998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 58.376310] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 62.274456] random: sshd: uninitialized urandom read (32 bytes read) [ 62.732778] random: sshd: uninitialized urandom read (32 bytes read) [ 65.143884] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.59' (ECDSA) to the list of known hosts. [ 71.884544] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/08 04:10:01 fuzzer started [ 76.519063] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/08 04:10:06 dialing manager at 10.128.0.26:36867 2018/10/08 04:10:06 syscalls: 1 2018/10/08 04:10:06 code coverage: enabled 2018/10/08 04:10:06 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/08 04:10:06 setuid sandbox: enabled 2018/10/08 04:10:06 namespace sandbox: enabled 2018/10/08 04:10:06 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/08 04:10:06 fault injection: enabled 2018/10/08 04:10:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/08 04:10:06 net packed injection: enabled 2018/10/08 04:10:06 net device setup: enabled [ 81.565536] random: crng init done 04:12:11 executing program 0: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000fffffffe) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@md5={0x1, "3a49e291e333836f9395e25841b8044c"}, 0x11, 0x2) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x7fffffff, 0x83b}}, 0x30) fcntl$setlease(r0, 0x400, 0x1) [ 204.207246] IPVS: ftp: loaded support on port[0] = 21 [ 206.601167] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.607812] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.616464] device bridge_slave_0 entered promiscuous mode [ 206.757751] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.764367] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.772994] device bridge_slave_1 entered promiscuous mode [ 206.915162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 207.055081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 207.482462] bond0: Enslaving bond_slave_0 as an active interface with an up link 04:12:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x4) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000100)={@multicast2, @dev}, &(0x7f0000000200)=0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) read(0xffffffffffffffff, &(0x7f0000000380)=""/172, 0xffffffc7) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x0) [ 207.626409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.065459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 208.072784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.110990] IPVS: ftp: loaded support on port[0] = 21 [ 208.677332] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.685766] team0: Port device team_slave_0 added [ 208.967283] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.975569] team0: Port device team_slave_1 added [ 209.116274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.123491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.132514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.386638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.393827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.402844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.643640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.651295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.660617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.836765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.844643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.853683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.574264] ip (6281) used greatest stack depth: 53056 bytes left [ 211.794790] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.801298] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.810198] device bridge_slave_0 entered promiscuous mode [ 211.956336] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.962933] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.971467] device bridge_slave_1 entered promiscuous mode [ 212.140672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 212.221473] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.228052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.235156] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.241623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.250997] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.392941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 212.994181] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.062330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.184188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.393562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.400624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.653567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.660624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:12:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/191, 0x84) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x107200, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000080)) [ 214.436292] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.444449] team0: Port device team_slave_0 added [ 214.702474] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.710529] team0: Port device team_slave_1 added [ 214.938063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 214.946686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.955817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.036501] IPVS: ftp: loaded support on port[0] = 21 [ 215.230361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.237654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.246781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.508057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 215.515789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.525107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.904351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.912320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.921529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.830712] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.837377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.844608] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.851078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.860162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.622297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.046838] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.054124] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.062844] device bridge_slave_0 entered promiscuous mode [ 220.388528] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.395182] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.403593] device bridge_slave_1 entered promiscuous mode [ 220.734576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.070579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:12:29 executing program 3: r0 = memfd_create(&(0x7f0000049000)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) capset(&(0x7f0000000000), &(0x7f0000000200)={0x102c, 0x0, 0x0, 0x8}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={0x0, {}, {{0x2, 0x4e21, @local}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast2}}}, 0x3d0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f00000001c0)) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0xffffffff80000004, "210e295e02ca3901", "88e7ed00007fff051eaa961ef6c6992b6900000000f9ffff7711be18a3d918e0"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd) [ 221.858548] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.195491] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.595734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.603034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.960420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.967739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.033163] IPVS: ftp: loaded support on port[0] = 21 [ 224.050616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.058771] team0: Port device team_slave_0 added [ 224.083384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.401610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.410020] team0: Port device team_slave_1 added [ 224.830835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.838036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.847185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.238807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.245946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.254922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.377843] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 225.604137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.611697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.621007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.934541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.942558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.951492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.813609] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 226.819979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.828238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.179546] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.897508] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.904731] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.913317] device bridge_slave_0 entered promiscuous mode [ 229.275536] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.282204] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.290634] device bridge_slave_1 entered promiscuous mode [ 229.659544] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.784864] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.791320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.798327] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.804913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.813971] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.922707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.037882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.046164] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.377997] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.765687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.773016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.097257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 232.104945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:12:40 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000002c0)={0x260d01610d135c37, 0x0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x48, 0x0, &(0x7f00000001c0)=[@enter_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)}}], 0x1, 0x0, &(0x7f0000000240)='-'}) [ 233.277681] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.285819] team0: Port device team_slave_0 added [ 233.312613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.705699] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.714089] team0: Port device team_slave_1 added [ 233.799401] IPVS: ftp: loaded support on port[0] = 21 [ 234.212090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.219180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.228347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.592054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.599093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.607950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.060443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.068303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.077493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.121435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.543847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.551488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.560815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.778446] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.785010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.793354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:12:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000200)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x280}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x10001}, {0x80}}) [ 238.439144] 8021q: adding VLAN 0 to HW filter on device team0 04:12:46 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x3f, 0x30, 0xffffffff80000000, 0xa12}, &(0x7f00000011c0)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001200)={r1, 0x80, 0x7, 0xbea4}, &(0x7f0000001240)=0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f00000001c0), 0x10ce) 04:12:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0x800, @loopback, 0x7}}}, &(0x7f0000000540)=0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={r1, 0xf7}, 0x8) socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r3, &(0x7f0000000400)={&(0x7f0000000180)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-pclmul\x00'}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000240)="03f6ae1d32906a919c4a29f8136b480a9dc629105b8ad662331bf71aa2ad118261d079129464ce596df87c9e61d46c5d", 0x30}], 0x1, &(0x7f00000002c0)=[{0x28, 0x115, 0x5, "1f4ae63b4030b2c8dce71031a9826f8e197b"}, {0xb0, 0x0, 0xe91, "2992e0583cd5bc2fde48de1d726de845926e1f1ee3c636184c876ed40f7a35f0258f60d551167639afc7b6058820e367c314a7e90ce6f906044a96d150c5b1d9eee9b461530cae9b49ff6701b409845bb8ae19dbef9c19c9f3fc64362c46c68a0c63e2fcaf97589ea1dd30d397873f4286ca9b4d4d8bf1d9d1b1fdc902b13121ff80d516195cc08f16c111bcd61eaa14eef897333d52593307"}, {0x30, 0x119, 0x1, "a1c657984e454448a0b8cddb9f0962fd84de3142cc34185508a3ae39a52d429b"}], 0x108, 0x8000}, 0x44010) r4 = socket$inet(0x10, 0x10000000000003, 0x0) sendmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r5 = accept(r2, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000100)={r3}) recvmmsg(r4, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 239.465947] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.473634] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.525407] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.533024] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.614655] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.622352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.652199] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.659789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.757188] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.765050] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.852435] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.860011] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.903089] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.910687] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 239.962167] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 239.969736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 240.012232] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 240.019765] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 240.092224] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 240.099771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 240.286172] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.293024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.300061] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.306687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.315114] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 04:12:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x8000000035, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x40000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x1, 0x8, @loopback, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x16}, 0x1fffe0}, 0xcf44, [0x7, 0x8, 0xfffffffffffffffe, 0x3, 0x9, 0x800, 0x3ff, 0x1]}, 0x5c) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc000, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x7ff, 0x4) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x2d1, &(0x7f0000001f80), 0x0, &(0x7f0000000100)}}], 0x4000000000003d4, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e20, 0x8, @mcast2, 0xfffffffffffffffe}, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x5}, 0xf2e2, [0x6, 0x7555, 0x3ff, 0xffffffffffff0763, 0x1, 0x3f, 0x6, 0x3]}, 0x5c) 04:12:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xa, 0x1, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f00000000c0)=""/207}, 0x18) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x60480, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000280)={0x6, {{0xa, 0x4e20, 0x1, @loopback}}}, 0x88) [ 241.063615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.299567] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.306168] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.314547] device bridge_slave_0 entered promiscuous mode 04:12:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x501040, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2, 0x3, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xfe03}}, 0x0) [ 241.791651] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.798262] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.807203] device bridge_slave_1 entered promiscuous mode 04:12:49 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r1 = socket(0x1e, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/176) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) syncfs(r0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) setsockopt$inet_buf(r1, 0x0, 0x27, &(0x7f0000000300)="06e9001fc221be43befb376fbad4fff9a303390b9736864b1560fa2d67ed065f35f4df855f8da6964a02aba0c771d557db4444f657d76ff6e4127480c373e6cb0e3a0f2811a3c6b660a333546cdafe5a27fc37a325ef12fdd7f03a4a9e72000ecdd40bc4e28a77b1b7187e3d52ff89d8adec487fdc8175784a6a17b43c6f42ba40e45158b911e9850f4e3cbaaa7da6f0a374169d6728489607c19f7615f88ecce21854635e4562dc2cc5432ecf1e8804a3728c74d3576ac8c6187508a1bee5b5d3de688d598358b51b3030b590c521ec18767015e44d7ea3224113110a42f321f8acbae9584f16ea5e545bf98c43029d8ccc6c094715942f7009082b7b469df471a6aa8135dfd5ea4a5847fa858d405ef3b28ec6a0456f2840ca9287fd05700ef4f8b124d96f42a375881ff2095f2cdb8fc3e533f7299d010000000100000051a8ae873c1d252a0903bded80fc6ea2e4cc0551ab968d367ec2b69f9155e3afc7db1f854ba57e11a292f06896a78a07323aa3392e47aecc860af0ed534262b1a64b237e8c9225854da7d7693a00f274cec5ce9ca209fbb55c7b04c3ab77ef678a2f9b280453404c376b23ebfd8f277ccef3adc1c9d60d7dba0b12a8ff687a18fe14661628fcd3511e2beda6d26c0710abdc43de09bb6ee036e2e60123aca2233d6530b18b29957e4e0f668a321c97", 0x454) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000540)={[{0x6, 0x1, 0x5, 0x200, 0x9, 0x5ff80b20, 0x3, 0x8001, 0x3, 0x1, 0xffffffffffff8001, 0x4, 0x40}, {0x1ff, 0x8, 0x361f, 0x4e5, 0x6482, 0x0, 0x7, 0x8, 0x401, 0x3, 0x3f, 0xfff, 0x87}, {0x9, 0x800, 0x3, 0xeb0, 0x1f, 0x5, 0x2000000000, 0xffffffffffffffa5, 0x1, 0x0, 0x800, 0xfffffffffffffffa, 0x2}], 0x8001}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f00000005c0)=""/174) connect$l2tp(r0, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x4, 0x1, {0xa, 0x4e23, 0x6, @mcast2, 0xa3}}}, 0x32) [ 242.280667] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:12:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000000)={0x8, {{0x2, 0x4e21, @multicast2}}}, 0x2d3) readv(r0, &(0x7f0000000100)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x2d2) [ 242.763501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 243.802681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.157276] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.463492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 244.470525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.778573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 244.785878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.776490] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.785133] team0: Port device team_slave_0 added [ 246.078501] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 246.086835] team0: Port device team_slave_1 added [ 246.154016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.413038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 246.420118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.429166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.816836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 246.824437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.833407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:12:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) [ 247.208143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.215812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.224801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.304394] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.506229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.513880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.522714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.081639] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.088156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.096025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.010003] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.007548] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.014158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.021112] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.027796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.036586] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.043321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.640915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.386902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.102643] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.109001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.116950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.957181] 8021q: adding VLAN 0 to HW filter on device team0 04:13:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 257.610208] 8021q: adding VLAN 0 to HW filter on device bond0 04:13:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) io_destroy(0x0) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000000540)={{}, 'port1\x00', 0x10, 0x0, 0x7fffffff, 0x5, 0x7, 0x143c, 0x0, 0x0, 0x1, 0x2}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000006c0)=0x5) read(r0, &(0x7f00000001c0)=""/175, 0xfffffffffffffe69) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ptrace$getsig(0x4202, 0x0, 0xffffffff7fffffff, &(0x7f0000000280)) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180), 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x0, 0x989680}, 0x7ff, 0x8}) open(&(0x7f0000000040)='./file0\x00', 0x141000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000680)={0xa6, 0x0, 0x7093, 0x0, 0xf5800}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) [ 257.960913] hrtimer: interrupt took 48138 ns [ 258.226128] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.618012] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.624370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.632220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.921417] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.741253] binder: 7512:7513 transaction failed 29189/-22, size 0-0 line 2855 [ 260.752335] binder: 7512:7514 transaction failed 29189/-22, size 0-0 line 2855 04:13:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) io_destroy(0x0) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000000540)={{}, 'port1\x00', 0x10, 0x0, 0x7fffffff, 0x5, 0x7, 0x143c, 0x0, 0x0, 0x1, 0x2}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000006c0)=0x5) read(r0, &(0x7f00000001c0)=""/175, 0xfffffffffffffe69) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ptrace$getsig(0x4202, 0x0, 0xffffffff7fffffff, &(0x7f0000000280)) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180), 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x0, 0x989680}, 0x7ff, 0x8}) open(&(0x7f0000000040)='./file0\x00', 0x141000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000680)={0xa6, 0x0, 0x7093, 0x0, 0xf5800}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 04:13:08 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001f40)={{{@in=@rand_addr, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002040)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000002140)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000002180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000021c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000022c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000024c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000025c0)={'veth1_to_bridge\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002680)={0x0, @rand_addr, @remote}, &(0x7f00000026c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002700)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000002740)={@dev, @local, 0x0}, &(0x7f0000002780)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f00000027c0)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000002800)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002840)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000002940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002980)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002bc0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@multicast2, @multicast1, 0x0}, &(0x7f0000002dc0)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003380)=[{{&(0x7f0000002e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002e80)=""/23, 0x17}, {&(0x7f0000002ec0)=""/64, 0x40}, {&(0x7f0000002f00)=""/5, 0x5}, {&(0x7f0000002f40)=""/56, 0x38}, {&(0x7f0000002f80)=""/206, 0xce}, {&(0x7f0000003080)=""/40, 0x28}], 0x6, &(0x7f0000003140)=""/174, 0xae, 0xe97}, 0x9b}, {{&(0x7f0000003200)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000003280)=""/175, 0xaf}], 0x1, 0x0, 0x0, 0xdc2}, 0x5}], 0x2, 0x10102, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000003400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003440)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003640)={'syzkaller0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003740)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003840)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003940)={'ipddp0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003b80)={0x0, @broadcast, @multicast2}, &(0x7f0000003bc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003c00)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003f80)={0x0, @multicast2, @rand_addr}, &(0x7f0000003fc0)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0}, &(0x7f0000004040)=0x14, 0x80000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x8, 0x2040) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x240400}, 0xc, &(0x7f00000048c0)={&(0x7f0000004080)={0x830, r1, 0x4, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x1a8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x25c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r15}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xc0}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r19}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}]}}, {{0x8, 0x1, r20}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r21}, {0x230, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r23}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8000, 0x7f, 0x81}, {0x9, 0x97, 0xc00, 0x4}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}]}, 0x830}, 0x1, 0x0, 0x0, 0x800}, 0x4040814) r26 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r26, &(0x7f0000000640)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000004cb8e7843c4455df92100000066c89fb00cd60ac3002a0000002e98507f4e7a097eaf85d24a4bf7332b95a533aa8aee140c50d831436daf4c5ea8b769a6fff8319bab13b7bb7f9f9d44475972c0f32784d6d2c5e96019570cae8d6d55f9e8357d6d51114c91421c83e845bec53c67"], 0x14}}, 0x0) 04:13:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x10400000000005, &(0x7f0000000200)=0x104000000000fd, 0xffffffffffffff06) 04:13:08 executing program 5: r0 = msgget(0x0, 0x8) msgctl$IPC_RMID(r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0xc, &(0x7f0000000080)='cpusetwlan1\x00', r3}, 0x30) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000180)={0x3, 0xc8, 0x3ff, 0x9, 0x4, 0x5}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000001c0)=0x7fff, 0x4) delete_module(&(0x7f0000000200)='\x00', 0x800) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000240)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r7 = semget(0x0, 0x3, 0x0) semtimedop(r7, &(0x7f0000000300)=[{0x7, 0xe625, 0x800}, {0x6, 0x4, 0x1000}, {0x4, 0x7fff, 0x1000}, {0x0, 0x4, 0x800}, {0x4, 0x7, 0x800}], 0x5, &(0x7f0000000340)={0x0, 0x1c9c380}) ioperm(0xfff, 0x1ff, 0x9) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000380)) r8 = socket$netlink(0x10, 0x3, 0x1f) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000400)=""/93) fsetxattr$system_posix_acl(r4, &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {0x1, 0x4}, [{0x2, 0x6, r5}], {0x4, 0x4}, [{0x8, 0x2, r6}, {0x8, 0x3, r6}, {0x8, 0x5, r6}], {0x10, 0x7}, {0x20, 0x7}}, 0x44, 0x1) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000540)) r9 = openat$userio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/userio\x00', 0x181180, 0x0) r10 = request_key(&(0x7f00000005c0)='syzkaller\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="656d319800", 0xfffffffffffffffb) keyctl$set_timeout(0xf, r10, 0x7) read$FUSE(r2, &(0x7f0000000680), 0x1000) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000001680)=0x80000000) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000016c0)={0x7, 0x7}) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000001780)={0x34, 0x0, &(0x7f0000001700)=[@dead_binder_done={0x40086310, 0x3}, @clear_death={0x400c630f, 0x1}, @release, @request_death={0x400c630e, 0x1, 0x3}], 0xc, 0x0, &(0x7f0000001740)="d0a4b899e5e72b525bfec2b2"}) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f00000017c0)={0xa1, 0x7, 0xfffffffffffffff8, 0x2}, 0x10) fcntl$F_GET_FILE_RW_HINT(r9, 0x40d, &(0x7f0000001800)) 04:13:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setrlimit(0x400000000000007, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) 04:13:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) io_destroy(0x0) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000000540)={{}, 'port1\x00', 0x10, 0x0, 0x7fffffff, 0x5, 0x7, 0x143c, 0x0, 0x0, 0x1, 0x2}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000006c0)=0x5) read(r0, &(0x7f00000001c0)=""/175, 0xfffffffffffffe69) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ptrace$getsig(0x4202, 0x0, 0xffffffff7fffffff, &(0x7f0000000280)) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180), 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x0, 0x989680}, 0x7ff, 0x8}) open(&(0x7f0000000040)='./file0\x00', 0x141000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000680)={0xa6, 0x0, 0x7093, 0x0, 0xf5800}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 04:13:09 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f00001a3000)='./file1\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, &(0x7f0000000000)) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000500)) poll(&(0x7f0000000400), 0x0, 0x400007f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') 04:13:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000900), &(0x7f0000001940)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400), &(0x7f0000000440)=0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000240)) sched_yield() r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000540)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000740)={'syz', 0x2}, &(0x7f00000007c0)="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", 0xfd, 0xfffffffffffffff8) r4 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)=':-!\x00', 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000300)=[{&(0x7f0000000140)="e37fe7040a61fd2a3ad52dd4e198254cd870c986e35d32e3012801196b8d149a7cd247006289adecd1806dcd71dcaf3b6975ccf18138712fc08cfe7e770bdc49f8de899ee71365056e2d42dbdb68ffef5566a60c06a6e640ff0987fbceef3d308e58ca0664a54d6c6c96109184a439e679f2dca370314c619a97850cc87789cbf5d071d787adc14ff1", 0x89}], 0x1, r6) msgget(0x0, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x6000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000780)) setsockopt$inet_sctp_SCTP_NODELAY(r7, 0x84, 0x3, &(0x7f0000000080)=0x7fffffff, 0xffffffffffffff8e) clone(0x10062100, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000000), &(0x7f0000000080)) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x80000000, 0x1, 0x800000000, 0x0, 0x0, 0x100000001, 0x0, 0xb, 0x401, 0x48000000, 0x4, 0x5, 0xffffffffe97a5d05, 0x50, 0x8, 0x0, 0x10000, 0x3ff, 0x6, 0x7f, 0x7, 0x8, 0x401, 0x9, 0x3, 0x4, 0x7, 0x9, 0x0, 0x5, 0xcdf9, 0x3, 0x776, 0xe217, 0x4, 0x63, 0x0, 0x80000001, 0x6, @perf_config_ext={0x8, 0xfffffffffffffff8}, 0x4008, 0x9, 0x0, 0x7, 0x80000000000000, 0x6, 0x8001}) 04:13:09 executing program 4: request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)=']\x00', 0x0) 04:13:09 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000006c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000640)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000680)='./file0\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000200)="ad360fc7f3260f00d5d8163200baf80c66b8348be98b66efbafc0c66b8ea1de44666ef660f3adf80c0003566b94c06000066b80000000066ba008000000f30660f3a6350ee052e0f01c9670f00905a3b0000", 0x52}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x79, 0x0, [0x490]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000240)="79616d30030300") socket(0x0, 0x0, 0x0) 04:13:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000040)=0x1, 0x1f1) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x36a, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x20004bc0) 04:13:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x80}}) [ 262.034107] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 262.058074] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:13:10 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x0, 0x1}, 0x0, 0x2}) [ 262.187923] ================================================================== [ 262.195391] BUG: KMSAN: uninit-value in vmx_create_vcpu+0x10df/0x7920 [ 262.202528] CPU: 1 PID: 7554 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #63 [ 262.209733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.219125] Call Trace: [ 262.221747] dump_stack+0x306/0x460 [ 262.225409] ? _raw_spin_lock_irqsave+0x227/0x340 [ 262.230273] ? vmx_create_vcpu+0x10df/0x7920 [ 262.234728] kmsan_report+0x1a3/0x2d0 [ 262.238579] __msan_warning+0x7c/0xe0 [ 262.242445] vmx_create_vcpu+0x10df/0x7920 [ 262.246761] ? kmsan_set_origin_inline+0x6b/0x120 [ 262.251654] ? __msan_poison_alloca+0x17a/0x210 [ 262.256385] ? vmx_vm_init+0x340/0x340 [ 262.260307] kvm_arch_vcpu_create+0x25d/0x2f0 [ 262.264834] kvm_vm_ioctl+0x13fd/0x33d0 [ 262.268879] ? __msan_poison_alloca+0x17a/0x210 [ 262.273602] ? do_vfs_ioctl+0x18a/0x2810 [ 262.277697] ? __se_sys_ioctl+0x1da/0x270 [ 262.281873] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 262.286751] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 262.291682] do_vfs_ioctl+0xcf3/0x2810 [ 262.295635] ? security_file_ioctl+0x92/0x200 [ 262.300175] __se_sys_ioctl+0x1da/0x270 [ 262.304189] __x64_sys_ioctl+0x4a/0x70 [ 262.308120] do_syscall_64+0xbe/0x100 [ 262.311976] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 262.317192] RIP: 0033:0x457579 [ 262.320422] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.339831] RSP: 002b:00007ff68f27cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.347601] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 262.354904] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 262.362207] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.369512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff68f27d6d4 [ 262.376832] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 262.384142] [ 262.385788] Local variable description: ----c.i.i.i.i.i.i@vmx_create_vcpu [ 262.392719] Variable was created at: [ 262.396462] vmx_create_vcpu+0xd5/0x7920 [ 262.400549] kvm_arch_vcpu_create+0x25d/0x2f0 [ 262.405060] ================================================================== [ 262.412436] Disabling lock debugging due to kernel taint [ 262.417904] Kernel panic - not syncing: panic_on_warn set ... [ 262.417904] [ 262.425322] CPU: 1 PID: 7554 Comm: syz-executor1 Tainted: G B 4.19.0-rc4+ #63 [ 262.433939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.443413] Call Trace: [ 262.446045] dump_stack+0x306/0x460 [ 262.449726] panic+0x54c/0xafa [ 262.453016] kmsan_report+0x2cd/0x2d0 [ 262.456854] __msan_warning+0x7c/0xe0 [ 262.460713] vmx_create_vcpu+0x10df/0x7920 [ 262.465003] ? kmsan_set_origin_inline+0x6b/0x120 [ 262.469881] ? __msan_poison_alloca+0x17a/0x210 [ 262.474604] ? vmx_vm_init+0x340/0x340 [ 262.478530] kvm_arch_vcpu_create+0x25d/0x2f0 [ 262.483063] kvm_vm_ioctl+0x13fd/0x33d0 [ 262.487088] ? __msan_poison_alloca+0x17a/0x210 [ 262.491808] ? do_vfs_ioctl+0x18a/0x2810 [ 262.495916] ? __se_sys_ioctl+0x1da/0x270 [ 262.500120] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 262.504997] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 262.509875] do_vfs_ioctl+0xcf3/0x2810 [ 262.513835] ? security_file_ioctl+0x92/0x200 [ 262.518430] __se_sys_ioctl+0x1da/0x270 [ 262.522447] __x64_sys_ioctl+0x4a/0x70 [ 262.526400] do_syscall_64+0xbe/0x100 [ 262.530257] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 262.535474] RIP: 0033:0x457579 04:13:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x12d) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000240)={0x20}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21}, {0xa, 0x0, 0x0, @local}}}, 0x48) 04:13:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) io_destroy(0x0) unshare(0x8020000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000000540)={{}, 'port1\x00', 0x10, 0x0, 0x7fffffff, 0x5, 0x7, 0x143c, 0x0, 0x0, 0x1, 0x2}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000006c0)=0x5) read(0xffffffffffffffff, &(0x7f00000001c0)=""/175, 0xfffffffffffffe69) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ptrace$getsig(0x4202, 0x0, 0xffffffff7fffffff, &(0x7f0000000280)) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000180), 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x0, 0x989680}, 0x7ff, 0x8}) open(&(0x7f0000000040)='./file0\x00', 0x141000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000680)={0xa6, 0x0, 0x7093, 0x0, 0xf5800}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) [ 262.538694] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.557637] RSP: 002b:00007ff68f27cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.565384] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 262.572671] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 262.579962] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.587257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff68f27d6d4 [ 262.594564] R13: 00000000004bfc18 R14: 00000000004cfca0 R15: 00000000ffffffff [ 262.603013] Kernel Offset: disabled [ 262.606654] Rebooting in 86400 seconds..