[info] Using makefile-style concurrent boot in runlevel 2. [ 41.131690][ T26] audit: type=1800 audit(1573546878.279:21): pid=7451 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 41.172619][ T26] audit: type=1800 audit(1573546878.279:22): pid=7451 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.56' (ECDSA) to the list of known hosts. 2019/11/12 08:21:26 fuzzer started 2019/11/12 08:21:28 dialing manager at 10.128.0.105:45453 2019/11/12 08:21:28 syscalls: 2566 2019/11/12 08:21:28 code coverage: enabled 2019/11/12 08:21:28 comparison tracing: enabled 2019/11/12 08:21:28 extra coverage: extra coverage is not supported by the kernel 2019/11/12 08:21:28 setuid sandbox: enabled 2019/11/12 08:21:28 namespace sandbox: enabled 2019/11/12 08:21:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/12 08:21:28 fault injection: enabled 2019/11/12 08:21:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/12 08:21:28 net packet injection: enabled 2019/11/12 08:21:28 net device setup: enabled 2019/11/12 08:21:28 concurrency sanitizer: enabled 2019/11/12 08:21:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:21:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) 08:21:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) syzkaller login: [ 52.271273][ T7617] IPVS: ftp: loaded support on port[0] = 21 [ 52.327329][ T7619] IPVS: ftp: loaded support on port[0] = 21 [ 52.428286][ T7617] chnl_net:caif_netlink_parms(): no params data found [ 52.460849][ T7619] chnl_net:caif_netlink_parms(): no params data found 08:21:29 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') [ 52.488542][ T7617] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.495647][ T7617] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.503249][ T7617] device bridge_slave_0 entered promiscuous mode [ 52.518436][ T7617] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.535767][ T7617] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.545974][ T7617] device bridge_slave_1 entered promiscuous mode [ 52.565326][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.576090][ T7619] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.595254][ T7619] device bridge_slave_0 entered promiscuous mode [ 52.619470][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.635325][ T7619] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.642995][ T7619] device bridge_slave_1 entered promiscuous mode [ 52.672176][ T7617] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.688571][ T7619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.699037][ T7617] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.710376][ T7619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.724456][ T7623] IPVS: ftp: loaded support on port[0] = 21 [ 52.729736][ T7619] team0: Port device team_slave_0 added [ 52.746254][ T7619] team0: Port device team_slave_1 added 08:21:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) [ 52.777520][ T7617] team0: Port device team_slave_0 added [ 52.847331][ T7619] device hsr_slave_0 entered promiscuous mode [ 52.885569][ T7619] device hsr_slave_1 entered promiscuous mode [ 52.926021][ T7617] team0: Port device team_slave_1 added [ 52.944261][ T7625] IPVS: ftp: loaded support on port[0] = 21 [ 53.068660][ T7617] device hsr_slave_0 entered promiscuous mode [ 53.115453][ T7617] device hsr_slave_1 entered promiscuous mode [ 53.135270][ T7617] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.154385][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.161496][ T7619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.168775][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.175823][ T7619] bridge0: port 1(bridge_slave_0) entered forwarding state 08:21:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) [ 53.343379][ T7623] chnl_net:caif_netlink_parms(): no params data found [ 53.504952][ T3513] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.545390][ T3513] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.769185][ T7619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.813260][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.835944][ T7623] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.866085][ T7623] device bridge_slave_0 entered promiscuous mode [ 53.912653][ T7675] IPVS: ftp: loaded support on port[0] = 21 [ 53.913213][ T7617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.002208][ T7619] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.027432][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.034466][ T7623] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.075911][ T7623] device bridge_slave_1 entered promiscuous mode [ 54.136240][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.155603][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.208868][ T7625] chnl_net:caif_netlink_parms(): no params data found [ 54.233803][ T7617] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.296612][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.304809][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.355784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.407477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.455785][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.462897][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.515817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.567299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.615933][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.622973][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 08:21:31 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 54.715909][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.767811][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.816360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.857619][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.908074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.966983][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.011721][ T7623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.075643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.083613][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.132254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.172287][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.179366][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.227794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.247549][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.267611][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.274719][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.307394][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.328242][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.348046][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.367897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.395441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.415697][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.441537][ T7623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.492378][ T7617] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.502832][ T7617] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.517145][ T7619] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.520278][ T7683] IPVS: ftp: loaded support on port[0] = 21 [ 55.529189][ T7619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.543005][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.551955][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.560096][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.568631][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.577401][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.585856][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.594119][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.602566][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.610950][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.619617][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.632149][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.640307][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.647452][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.654965][ T7625] device bridge_slave_0 entered promiscuous mode [ 55.676900][ T7623] team0: Port device team_slave_0 added [ 55.682764][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.689891][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.697675][ T7625] device bridge_slave_1 entered promiscuous mode [ 55.704652][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.712366][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.747834][ T7623] team0: Port device team_slave_1 added [ 55.768211][ T7617] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.787373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 55.794826][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 55.808716][ T7625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.817937][ T7675] chnl_net:caif_netlink_parms(): no params data found [ 55.850112][ T7625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.877765][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.884825][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.892897][ T7675] device bridge_slave_0 entered promiscuous mode [ 55.901935][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.909280][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.917104][ T7675] device bridge_slave_1 entered promiscuous mode [ 55.977061][ T7623] device hsr_slave_0 entered promiscuous mode [ 56.035502][ T7623] device hsr_slave_1 entered promiscuous mode [ 56.075271][ T7623] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.094675][ T7619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.112701][ T7625] team0: Port device team_slave_0 added [ 56.122564][ T7625] team0: Port device team_slave_1 added [ 56.142712][ T7675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.153234][ T7675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.214737][ T7706] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 56.237538][ T7625] device hsr_slave_0 entered promiscuous mode [ 56.265486][ T7625] device hsr_slave_1 entered promiscuous mode [ 56.288329][ T7625] debugfs: Directory 'hsr0' with parent '/' already present! 08:21:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 56.346847][ T7675] team0: Port device team_slave_0 added [ 56.372659][ T7683] chnl_net:caif_netlink_parms(): no params data found [ 56.458877][ T7675] team0: Port device team_slave_1 added [ 56.664668][ T7623] 8021q: adding VLAN 0 to HW filter on device bond0 08:21:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 56.917632][ T7675] device hsr_slave_0 entered promiscuous mode [ 57.005711][ T7675] device hsr_slave_1 entered promiscuous mode [ 57.045270][ T7675] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.052757][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.065271][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.136584][ T7683] device bridge_slave_0 entered promiscuous mode 08:21:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 57.227421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.244315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.339207][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.357880][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.458155][ T7683] device bridge_slave_1 entered promiscuous mode [ 57.578654][ T7623] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.614120][ T7625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.703042][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 08:21:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 57.778632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.855552][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.862600][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state 08:21:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) [ 57.999083][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.095757][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.155776][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.162828][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state 08:21:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 58.276857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.346932][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.416087][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.424539][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.558461][ T7683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.592182][ T7683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.691292][ T7625] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.744414][ T7623] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 08:21:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) [ 58.826321][ T7623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.916776][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.924682][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.998258][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.066933][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.074808][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.207041][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.266766][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.275069][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 08:21:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) [ 59.389296][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.475882][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.594481][ T7683] team0: Port device team_slave_0 added [ 59.665464][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.689631][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.755924][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.764395][ T2966] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.771538][ T2966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.925737][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.985172][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.035606][ T2966] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.042674][ T2966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.097780][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.140888][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.172946][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.200958][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.226770][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.264016][ T7623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.294153][ T7683] team0: Port device team_slave_1 added [ 60.320349][ T7675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.355333][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.369778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.397246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.409746][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.424624][ T7625] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.439142][ T7625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.465777][ T7675] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.473878][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.506472][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.538425][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.566694][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.585736][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.606287][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.631207][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.697820][ T7683] device hsr_slave_0 entered promiscuous mode [ 60.735524][ T7683] device hsr_slave_1 entered promiscuous mode [ 60.765360][ T7683] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.809787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.834705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.857492][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.886031][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.893113][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.936010][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.943469][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.965435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.985878][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.005624][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.012672][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.038457][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.059706][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.085264][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.094230][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.114280][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.145038][ T7625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.215864][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.224168][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.286103][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.299255][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 08:21:38 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') [ 61.346115][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.367954][ T7675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.425797][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.472401][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.487227][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.585331][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.592811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.668410][ T7675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.718671][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.795710][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.803424][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:21:39 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) [ 61.839296][ T7683] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.863064][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.885874][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.894201][ T7665] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.901253][ T7665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.975714][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.008952][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.035834][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.065465][ T7665] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.072574][ T7665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.098624][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.116319][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.136135][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.153483][ T7665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.217951][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.259295][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.285909][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.309646][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.332330][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.357088][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.374348][ T7767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.395403][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:21:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) [ 62.429984][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 62.455613][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 62.472788][ T7683] 8021q: adding VLAN 0 to HW filter on device batadv0 08:21:40 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:40 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) 08:21:40 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) 08:21:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:40 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) 08:21:41 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:41 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:42 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:42 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) 08:21:42 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 08:21:42 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x12}}) 08:21:42 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) 08:21:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:42 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:42 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:43 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:43 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 08:21:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) 08:21:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)) 08:21:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffffffffffffff3f}, 0x3f00) write(r1, &(0x7f0000000240)="bb", 0x1) close(r2) [ 66.332098][ T8089] ================================================================== [ 66.340243][ T8089] BUG: KCSAN: data-race in generic_file_read_iter / generic_write_end [ 66.348381][ T8089] [ 66.350717][ T8089] read to 0xffff8881278f7278 of 8 bytes by task 8094 on cpu 0: [ 66.358259][ T8089] generic_file_read_iter+0x860/0x1440 [ 66.363727][ T8089] ext4_file_read_iter+0xfa/0x240 [ 66.368758][ T8089] generic_file_splice_read+0x35c/0x500 [ 66.374306][ T8089] do_splice_to+0xf2/0x130 [ 66.378726][ T8089] splice_direct_to_actor+0x1a1/0x510 [ 66.384099][ T8089] do_splice_direct+0x161/0x1e0 [ 66.388952][ T8089] do_sendfile+0x384/0x7f0 [ 66.393370][ T8089] __x64_sys_sendfile64+0x12a/0x140 [ 66.398566][ T8089] do_syscall_64+0xcc/0x370 [ 66.403072][ T8089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.408950][ T8089] [ 66.411286][ T8089] write to 0xffff8881278f7278 of 8 bytes by task 8089 on cpu 1: [ 66.418911][ T8089] generic_write_end+0xd0/0x1f0 [ 66.423762][ T8089] ext4_da_write_end+0x158/0x620 [ 66.428698][ T8089] generic_perform_write+0x1d3/0x320 [ 66.433989][ T8089] __generic_file_write_iter+0x251/0x380 [ 66.439623][ T8089] ext4_file_write_iter+0x1bd/0xa00 [ 66.444822][ T8089] new_sync_write+0x388/0x4a0 [ 66.449492][ T8089] __vfs_write+0xb1/0xc0 [ 66.453729][ T8089] vfs_write+0x18a/0x390 [ 66.457966][ T8089] ksys_write+0xd5/0x1b0 [ 66.462205][ T8089] __x64_sys_write+0x4c/0x60 [ 66.466792][ T8089] do_syscall_64+0xcc/0x370 [ 66.471296][ T8089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.477174][ T8089] [ 66.479489][ T8089] Reported by Kernel Concurrency Sanitizer on: [ 66.485639][ T8089] CPU: 1 PID: 8089 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 66.493430][ T8089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.503479][ T8089] ================================================================== [ 66.511632][ T8089] Kernel panic - not syncing: panic_on_warn set ... [ 66.518221][ T8089] CPU: 1 PID: 8089 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 66.526015][ T8089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.536067][ T8089] Call Trace: [ 66.539365][ T8089] dump_stack+0x11d/0x181 [ 66.543696][ T8089] panic+0x210/0x640 [ 66.547600][ T8089] ? vprintk_func+0x8d/0x140 [ 66.552198][ T8089] kcsan_report.cold+0xc/0x1a [ 66.556881][ T8089] kcsan_setup_watchpoint+0x3fe/0x460 [ 66.562253][ T8089] __tsan_unaligned_write8+0xc4/0x100 [ 66.567624][ T8089] generic_write_end+0xd0/0x1f0 [ 66.572485][ T8089] ext4_da_write_end+0x158/0x620 [ 66.577426][ T8089] ? ext4_write_end+0x800/0x800 [ 66.582276][ T8089] generic_perform_write+0x1d3/0x320 [ 66.587579][ T8089] __generic_file_write_iter+0x251/0x380 [ 66.593219][ T8089] ? constant_test_bit+0x12/0x30 [ 66.598164][ T8089] ext4_file_write_iter+0x1bd/0xa00 [ 66.603369][ T8089] ? iov_iter_init+0xe2/0x120 [ 66.608049][ T8089] new_sync_write+0x388/0x4a0 [ 66.612740][ T8089] __vfs_write+0xb1/0xc0 [ 66.616992][ T8089] vfs_write+0x18a/0x390 [ 66.621264][ T8089] ksys_write+0xd5/0x1b0 [ 66.625524][ T8089] __x64_sys_write+0x4c/0x60 [ 66.630200][ T8089] do_syscall_64+0xcc/0x370 [ 66.634705][ T8089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.640589][ T8089] RIP: 0033:0x45a219 [ 66.644489][ T8089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 66.664094][ T8089] RSP: 002b:00007f7fe7b1ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 66.672504][ T8089] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 66.680470][ T8089] RDX: 000000007c774aac RSI: 0000000020000040 RDI: 0000000000000003 [ 66.688440][ T8089] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 66.696413][ T8089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fe7b1f6d4 [ 66.704387][ T8089] R13: 00000000004cab18 R14: 00000000004e2fb8 R15: 00000000ffffffff [ 66.713592][ T8089] Kernel Offset: disabled [ 66.717913][ T8089] Rebooting in 86400 seconds..