[ 44.301287][ T25] audit: type=1800 audit(1571706402.707:22): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [ 44.330949][ T25] audit: type=1800 audit(1571706402.707:23): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2475 res=0 [....] Starting enhanced syslogd: rsyslogd[ 44.630587][ T7085] rsyslogd (7085) used greatest stack depth: 10136 bytes left [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2019/10/22 01:06:53 fuzzer started 2019/10/22 01:06:54 dialing manager at 10.128.0.105:37053 2019/10/22 01:06:55 syscalls: 2524 2019/10/22 01:06:55 code coverage: enabled 2019/10/22 01:06:55 comparison tracing: enabled 2019/10/22 01:06:55 extra coverage: extra coverage is not supported by the kernel 2019/10/22 01:06:55 setuid sandbox: enabled 2019/10/22 01:06:55 namespace sandbox: enabled 2019/10/22 01:06:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/22 01:06:55 fault injection: enabled 2019/10/22 01:06:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/22 01:06:55 net packet injection: enabled 2019/10/22 01:06:55 net device setup: enabled 2019/10/22 01:06:55 concurrency sanitizer: enabled 01:06:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syzkaller login: [ 59.817314][ T7230] IPVS: ftp: loaded support on port[0] = 21 01:06:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@iv={0xf}], 0x18}, 0x0) [ 59.923206][ T7230] chnl_net:caif_netlink_parms(): no params data found [ 60.008051][ T7230] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.015397][ T7230] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.037478][ T7230] device bridge_slave_0 entered promiscuous mode [ 60.045169][ T7230] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.065788][ T7230] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.096568][ T7230] device bridge_slave_1 entered promiscuous mode [ 60.124993][ T7230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.136320][ T7230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:06:58 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 60.168099][ T7230] team0: Port device team_slave_0 added [ 60.176546][ T7234] IPVS: ftp: loaded support on port[0] = 21 [ 60.192232][ T7230] team0: Port device team_slave_1 added [ 60.298900][ T7230] device hsr_slave_0 entered promiscuous mode [ 60.346082][ T7230] device hsr_slave_1 entered promiscuous mode [ 60.407143][ T7230] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.414219][ T7230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.421670][ T7230] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.428779][ T7230] bridge0: port 1(bridge_slave_0) entered forwarding state 01:06:58 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) setuid(0xee01) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xae0e8232fbf15c46}) [ 60.458472][ T7237] IPVS: ftp: loaded support on port[0] = 21 [ 60.579546][ T7230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.623152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.633681][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.666396][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.687410][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.712813][ T7230] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.722244][ T7234] chnl_net:caif_netlink_parms(): no params data found [ 60.746415][ T7242] IPVS: ftp: loaded support on port[0] = 21 [ 60.782121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.791149][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.798226][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 01:06:59 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200800, 0x0) getgroups(0x0, 0x0) setregid(0x0, 0x0) sched_setattr(0x0, 0x0, 0x5447d0e40dee964e) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) pkey_free(0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000008000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x8, 0x15]}}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000280)={0x0, {0x77359400}, 0xffffffffffff8000}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) [ 60.837788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.848867][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.855987][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.918011][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.939594][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.964000][ T7230] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.995780][ T7230] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.056196][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.064649][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.073944][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.083838][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.093367][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.102993][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.155022][ T7234] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.164663][ T7247] IPVS: ftp: loaded support on port[0] = 21 [ 61.177698][ T7234] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.186104][ T7234] device bridge_slave_0 entered promiscuous mode [ 61.198059][ T7237] chnl_net:caif_netlink_parms(): no params data found [ 61.220124][ T7230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.233827][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.242050][ T7234] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.250491][ T7234] device bridge_slave_1 entered promiscuous mode 01:06:59 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000080)=@newlink={0x78, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x4c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x3c, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x7ff}, @gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0x9}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x80}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x5}], @IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_BROADCAST={0xc, 0x3, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x0) [ 61.342410][ T7234] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.354489][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.363563][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.372383][ T7237] device bridge_slave_0 entered promiscuous mode [ 61.384409][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.392050][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.403102][ T7237] device bridge_slave_1 entered promiscuous mode [ 61.440414][ T7234] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.473623][ T7242] chnl_net:caif_netlink_parms(): no params data found [ 61.496282][ T7237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.506759][ T7234] team0: Port device team_slave_0 added [ 61.535398][ T7234] team0: Port device team_slave_1 added [ 61.544639][ T7237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.590671][ T7237] team0: Port device team_slave_0 added [ 61.598987][ T7237] team0: Port device team_slave_1 added [ 61.644000][ T7254] IPVS: ftp: loaded support on port[0] = 21 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 61.738737][ T7234] device hsr_slave_0 entered promiscuous mode [ 61.796140][ T7234] device hsr_slave_1 entered promiscuous mode [ 61.835827][ T7234] debugfs: Directory 'hsr0' with parent '/' already present! 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 61.861304][ T7242] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.869051][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.883400][ T7242] device bridge_slave_0 entered promiscuous mode [ 61.894387][ T7242] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.905047][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.919139][ T7242] device bridge_slave_1 entered promiscuous mode [ 61.950256][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 61.957399][ T7234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.964733][ T7234] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.971851][ T7234] bridge0: port 1(bridge_slave_0) entered forwarding state 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 62.022782][ T7237] device hsr_slave_0 entered promiscuous mode 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 62.096164][ T7237] device hsr_slave_1 entered promiscuous mode [ 62.135824][ T7237] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.166059][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.178990][ T5] bridge0: port 2(bridge_slave_1) entered disabled state 01:07:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 62.230127][ T7247] chnl_net:caif_netlink_parms(): no params data found [ 62.290389][ T7242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.339541][ T7242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.354824][ T7247] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.370052][ T7247] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.378135][ T7247] device bridge_slave_0 entered promiscuous mode [ 62.387343][ T7234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.414189][ T7247] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.421596][ T7247] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.432305][ T7247] device bridge_slave_1 entered promiscuous mode [ 62.466720][ T7247] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.480813][ T7242] team0: Port device team_slave_0 added [ 62.498985][ T7234] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.511206][ T7247] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.521625][ T7242] team0: Port device team_slave_1 added [ 62.529119][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.537719][ T7238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.549667][ T7237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.566360][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.575528][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.584334][ T7244] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.591412][ T7244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.658793][ T7242] device hsr_slave_0 entered promiscuous mode [ 62.696350][ T7242] device hsr_slave_1 entered promiscuous mode [ 62.736053][ T7242] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.744923][ T7247] team0: Port device team_slave_0 added [ 62.753452][ T7247] team0: Port device team_slave_1 added [ 62.777758][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.786790][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.795261][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.802331][ T7243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.810654][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.818431][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.833825][ T7234] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.844468][ T7234] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.857644][ T7237] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.896705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.908801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.917766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.926548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.935291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.944729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.954004][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.962856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.971603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.980279][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.993718][ T7234] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.038308][ T7247] device hsr_slave_0 entered promiscuous mode [ 63.086257][ T7247] device hsr_slave_1 entered promiscuous mode [ 63.126601][ T7247] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.135213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.143756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.151579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.160555][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.169054][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.176137][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.184110][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.193517][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.202317][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.209388][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.217525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.247764][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.259874][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.269789][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.278891][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.288019][ T7254] chnl_net:caif_netlink_parms(): no params data found [ 63.329118][ T7254] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.336256][ T7254] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.343998][ T7254] device bridge_slave_0 entered promiscuous mode [ 63.351503][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.368500][ T7254] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.375633][ T7254] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.384084][ T7254] device bridge_slave_1 entered promiscuous mode [ 63.397928][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.409750][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.418765][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.427271][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.455310][ T7242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.472801][ T7254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.490966][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.499690][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.512458][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.520424][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.529615][ T7237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.539922][ T7254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.550110][ T7242] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.572016][ T7237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.605452][ T7247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.616081][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.625263][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.646527][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.653868][ T7233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.677808][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.686997][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.696060][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.703149][ T7233] bridge0: port 2(bridge_slave_1) entered forwarding state 01:07:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@iv={0xf}], 0x18}, 0x0) [ 63.745301][ T7254] team0: Port device team_slave_0 added [ 63.757351][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.768100][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.797736][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.817371][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.855683][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.865003][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.874701][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.884508][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.893448][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.902504][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.911663][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.921382][ T7242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.939056][ T7254] team0: Port device team_slave_1 added [ 64.011909][ T7254] device hsr_slave_0 entered promiscuous mode [ 64.056266][ T7254] device hsr_slave_1 entered promiscuous mode [ 64.105839][ T7254] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.115026][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.136285][ T7242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.146636][ T7247] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.168111][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.176935][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.185037][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.221079][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.230052][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.237297][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.246360][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.250037][ C1] hrtimer: interrupt took 34504 ns [ 64.255285][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.282743][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.289938][ T7243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.326132][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.334707][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.345162][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.356384][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.365477][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.374896][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.383799][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.393308][ T7244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.417010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.425591][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.440959][ T7247] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.454350][ T7247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.463639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.473461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.503167][ T7247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.534408][ T7254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.551648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.567561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.582064][ T7254] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.598681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.610679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.619469][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.626556][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.647689][ T7254] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.665846][ T7254] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.683670][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.692489][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.702557][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.714911][ T7243] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.722179][ T7243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.731294][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.740698][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.749957][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.759011][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.768186][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.777733][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.787806][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.796580][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.805151][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.814079][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.823429][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.832323][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.854438][ T7254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.012433][ T7337] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 65.066226][ T7338] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 01:07:05 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:07:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@iv={0xf}], 0x18}, 0x0) 01:07:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 01:07:05 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) setuid(0xee01) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xae0e8232fbf15c46}) 01:07:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000080)=@newlink={0x78, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x4c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x3c, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x7ff}, @gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0x9}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x80}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x5}], @IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_BROADCAST={0xc, 0x3, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 01:07:05 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200800, 0x0) getgroups(0x0, 0x0) setregid(0x0, 0x0) sched_setattr(0x0, 0x0, 0x5447d0e40dee964e) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) pkey_free(0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000008000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x8, 0x15]}}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000280)={0x0, {0x77359400}, 0xffffffffffff8000}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) [ 67.315688][ T7350] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 01:07:05 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) setuid(0xee01) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xae0e8232fbf15c46}) 01:07:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 01:07:06 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200800, 0x0) getgroups(0x0, 0x0) setregid(0x0, 0x0) sched_setattr(0x0, 0x0, 0x5447d0e40dee964e) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) pkey_free(0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000008000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x8, 0x15]}}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000280)={0x0, {0x77359400}, 0xffffffffffff8000}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) 01:07:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000080)=@newlink={0x78, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x4c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x3c, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x7ff}, @gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0x9}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x80}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x5}], @IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_BROADCAST={0xc, 0x3, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 01:07:06 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:07:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@iv={0xf}], 0x18}, 0x0) 01:07:06 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) setuid(0xee01) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xae0e8232fbf15c46}) 01:07:06 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 67.870714][ T7377] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 01:07:06 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:07:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000080)=@newlink={0x78, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x4c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x3c, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x7ff}, @gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0x9}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1000}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x80}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x5}], @IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_BROADCAST={0xc, 0x3, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 01:07:06 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200800, 0x0) getgroups(0x0, 0x0) setregid(0x0, 0x0) sched_setattr(0x0, 0x0, 0x5447d0e40dee964e) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) pkey_free(0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000008000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x8, 0x15]}}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000280)={0x0, {0x77359400}, 0xffffffffffff8000}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) 01:07:06 executing program 3: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:07:06 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 68.185261][ T7402] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 68.255795][ T7199] ================================================================== [ 68.263957][ T7199] BUG: KCSAN: data-race in ktime_get_real_seconds / timekeeping_advance [ 68.272818][ T7199] [ 68.275150][ T7199] write to 0xffffffff86040b08 of 280 bytes by interrupt on cpu 0: [ 68.283046][ T7199] timekeeping_advance+0x893/0xd80 [ 68.288184][ T7199] update_wall_time+0x19/0x20 [ 68.292861][ T7199] tick_do_update_jiffies64+0x1ae/0x260 [ 68.298412][ T7199] tick_sched_do_timer+0xd4/0xe0 [ 68.304214][ T7199] tick_sched_timer+0x43/0xe0 [ 68.308886][ T7199] __hrtimer_run_queues+0x288/0x600 [ 68.314876][ T7199] hrtimer_interrupt+0x22a/0x480 [ 68.319827][ T7199] smp_apic_timer_interrupt+0xdc/0x280 [ 68.325379][ T7199] apic_timer_interrupt+0xf/0x20 [ 68.330332][ T7199] __kcsan_setup_watchpoint+0x268/0x4a0 [ 68.335871][ T7199] __tsan_read1+0x2c/0x30 [ 68.340199][ T7199] memcmp+0x3c/0x70 [ 68.344041][ T7199] translate_table+0x58c/0xcd0 [ 68.348800][ T7199] do_ip6t_set_ctl+0x219/0x311 [ 68.353545][ T7199] [ 68.355878][ T7199] read to 0xffffffff86040b78 of 8 bytes by task 7199 on cpu 1: [ 68.363420][ T7199] ktime_get_real_seconds+0x20/0x40 [ 68.368612][ T7199] tomoyo_supervisor+0x1da/0xd20 [ 68.373540][ T7199] tomoyo_path_permission+0x121/0x160 [ 68.378995][ T7199] tomoyo_path_perm+0x23e/0x390 [ 68.383855][ T7199] tomoyo_inode_getattr+0x26/0x40 [ 68.388879][ T7199] security_inode_getattr+0x9b/0xd0 [ 68.394071][ T7199] vfs_getattr+0x2e/0x70 [ 68.398454][ T7199] vfs_statx_fd+0x7a/0xd0 [ 68.402870][ T7199] __do_sys_newfstat+0x49/0xa0 [ 68.407639][ T7199] __x64_sys_newfstat+0x3a/0x50 [ 68.415531][ T7199] do_syscall_64+0xcc/0x370 [ 68.420036][ T7199] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.425921][ T7199] [ 68.428255][ T7199] Reported by Kernel Concurrency Sanitizer on: [ 68.434405][ T7199] CPU: 1 PID: 7199 Comm: udevd Not tainted 5.4.0-rc3+ #0 [ 68.441435][ T7199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:07:06 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 68.451836][ T7199] ================================================================== [ 68.460766][ T7199] Kernel panic - not syncing: panic_on_warn set ... [ 68.467364][ T7199] CPU: 1 PID: 7199 Comm: udevd Not tainted 5.4.0-rc3+ #0 [ 68.474554][ T7199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.484640][ T7199] Call Trace: [ 68.487975][ T7199] dump_stack+0xf5/0x159 [ 68.493710][ T7199] panic+0x210/0x640 [ 68.497701][ T7199] ? __do_sys_newfstat+0x49/0xa0 [ 68.502650][ T7199] ? vprintk_func+0x8d/0x140 [ 68.507250][ T7199] kcsan_report.cold+0xc/0x10 [ 68.511944][ T7199] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 68.517514][ T7199] __tsan_read8+0x2c/0x30 [ 68.521850][ T7199] ktime_get_real_seconds+0x20/0x40 [ 68.527071][ T7199] tomoyo_supervisor+0x1da/0xd20 [ 68.532041][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 68.537685][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 68.543351][ T7199] ? __tsan_write1+0x32/0x40 [ 68.547959][ T7199] ? tomoyo_compare_name_union+0xa0/0xa0 [ 68.554041][ T7199] tomoyo_path_permission+0x121/0x160 [ 68.559436][ T7199] tomoyo_path_perm+0x23e/0x390 [ 68.564470][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 68.570198][ T7199] tomoyo_inode_getattr+0x26/0x40 [ 68.575237][ T7199] security_inode_getattr+0x9b/0xd0 [ 68.580556][ T7199] vfs_getattr+0x2e/0x70 [ 68.584805][ T7199] vfs_statx_fd+0x7a/0xd0 [ 68.589163][ T7199] __do_sys_newfstat+0x49/0xa0 [ 68.593955][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 68.599611][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 01:07:07 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:07:07 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='#!!'], 0x3) chmod(&(0x7f0000000000)='./file0\x00', 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 68.605251][ T7199] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 68.611584][ T7199] ? __tsan_read8+0x2c/0x30 [ 68.616100][ T7199] __x64_sys_newfstat+0x3a/0x50 [ 68.620960][ T7199] do_syscall_64+0xcc/0x370 [ 68.625477][ T7199] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.631400][ T7199] RIP: 0033:0x7ff0096e9cb4 [ 68.635857][ T7199] Code: 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 83 ff 01 89 f0 77 19 48 63 f8 48 89 d6 b8 05 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 18 f3 c3 66 90 48 8b 05 51 51 2b 00 64 c7 00 [ 68.655475][ T7199] RSP: 002b:00007ffc49dc8f68 EFLAGS: 00000246 ORIG_RAX: 0000000000000005 [ 68.663905][ T7199] RAX: ffffffffffffffda RBX: 0000000001b4ae80 RCX: 00007ff0096e9cb4 [ 68.671898][ T7199] RDX: 00007ffc49dc8f70 RSI: 00007ffc49dc8f70 RDI: 0000000000000005 [ 68.679872][ T7199] RBP: 0000000000003fff R08: 0000000000000001 R09: 0000000000000000 [ 68.687845][ T7199] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 68.695821][ T7199] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc49dc9500 [ 68.705462][ T7199] Kernel Offset: disabled [ 68.712186][ T7199] Rebooting in 86400 seconds..