[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 52.819015] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 53.170864] audit: type=1800 audit(1539253281.229:29): pid=5959 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 54.133632] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 54.613342] random: sshd: uninitialized urandom read (32 bytes read) [ 56.683273] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.8' (ECDSA) to the list of known hosts. [ 62.538602] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/11 10:21:32 fuzzer started [ 66.670075] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/11 10:21:36 dialing manager at 10.128.0.26:39089 2018/10/11 10:21:36 syscalls: 1 2018/10/11 10:21:36 code coverage: enabled 2018/10/11 10:21:36 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/11 10:21:36 setuid sandbox: enabled 2018/10/11 10:21:36 namespace sandbox: enabled 2018/10/11 10:21:36 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/11 10:21:36 fault injection: enabled 2018/10/11 10:21:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/11 10:21:36 net packed injection: /dev/net/tun can't be opened (open /dev/net/tun: cannot allocate memory) 2018/10/11 10:21:36 net device setup: enabled [ 71.440385] random: crng init done 10:23:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fe, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe(&(0x7f00000005c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000008d40)=[{&(0x7f0000000540)=@in6={0xa, 0x4e21, 0x1, @remote, 0x8}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000880)="6d3b7b918dbafe84402b0a7b3bcf74153f06bea852b55564ce314f37837907bfb721a7b18c73211f3788adf3e9941a57a3aa11954f95c97d3031954bbd4823c88a084540718c833f6ecf19cab66461482c56f88fd6a4cbca074a79acdb821d0ce9885347975adb5b17c08c797c419b363d543ed694e1ba5307b046cb4069255733db6f556a76c0cc62e0988c3a542e56ca761f5266c31d4d75abfe63e86bbf96", 0xa0}], 0x1, &(0x7f0000000a00)=ANY=[@ANYBLOB="20000000000000008400000008000000ff02000000000000000000000000000118000000000000008400000000000000bd000000010008002000000000000000840000000200000001000400ff00000002000000"], 0x54}, {&(0x7f0000000ac0)=@in6={0xa, 0x0, 0x6, @local, 0x1}, 0x1c, &(0x7f0000000f80), 0x0, &(0x7f0000001200)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x2, 0x100, 0xffff}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndrcv={0x30, 0x84, 0x1, {0xbab, 0x38000000000, 0x0, 0x7, 0x0, 0x0, 0x3f3, 0x10001}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x17}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20}], 0xc0, 0x20000001}, {&(0x7f0000001300)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000008740)=[{&(0x7f0000001440)}], 0x1, &(0x7f0000008880)=[@sndrcv={0x30, 0x84, 0x1, {0xa42b, 0x0, 0x8, 0x0, 0x1, 0x0, 0x100000001, 0x60a80000}}, @authinfo={0x18, 0x84, 0x6, {0x6000000}}], 0x48}, {&(0x7f0000008c40)=@in={0x2, 0x4e24, @rand_addr}, 0x10, &(0x7f0000008d00)}], 0x4, 0x800) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 165.122681] IPVS: ftp: loaded support on port[0] = 21 [ 166.308908] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.315575] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.323979] device bridge_slave_0 entered promiscuous mode [ 166.449756] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.456352] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.464823] device bridge_slave_1 entered promiscuous mode [ 166.589212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 166.708540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.093782] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.222357] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:23:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000100), 0xc, &(0x7f0000000580)={&(0x7f0000002640)={0x14, 0x21, 0x101}, 0x14}}, 0x0) [ 167.930328] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 167.938534] team0: Port device team_slave_0 added [ 168.125227] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 168.133417] team0: Port device team_slave_1 added [ 168.309747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.318600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.327112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.450960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.661121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 168.668845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.677699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.694956] IPVS: ftp: loaded support on port[0] = 21 [ 168.935111] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 168.942900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.951858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.436904] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.443502] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.451859] device bridge_slave_0 entered promiscuous mode [ 170.622525] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.628996] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.637554] device bridge_slave_1 entered promiscuous mode [ 170.832583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 171.097921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 171.205814] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.212742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.219664] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.226256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.235082] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.677023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.822002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.874788] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.096037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 172.103350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.286825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 172.294310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:23:20 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x2000000000004e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/159, &(0x7f00000001c0)=0x9f) [ 172.817747] ip (6260) used greatest stack depth: 53056 bytes left [ 173.105111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.113418] team0: Port device team_slave_0 added [ 173.422804] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.430767] team0: Port device team_slave_1 added [ 173.713009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.720099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.728936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.969710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.977014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.985611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.020515] IPVS: ftp: loaded support on port[0] = 21 [ 174.213229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 174.220777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.229902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.436475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 174.444121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.453096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.408431] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.415035] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.423389] device bridge_slave_0 entered promiscuous mode [ 176.631853] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.638420] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.647000] device bridge_slave_1 entered promiscuous mode [ 176.944905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.207427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.273330] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.279805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.286888] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.293457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.302755] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 177.885723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.091895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.149629] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.388848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.396176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.621125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.628331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.286309] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.294590] team0: Port device team_slave_0 added [ 179.555753] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.564034] team0: Port device team_slave_1 added [ 179.780402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.787668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.796469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 10:23:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 180.093257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.100440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.109325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.353863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.361540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.370665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.708640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.716171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.725150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.379538] IPVS: ftp: loaded support on port[0] = 21 [ 182.191788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.417525] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.444537] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.451115] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.459534] device bridge_slave_0 entered promiscuous mode [ 184.471977] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.478438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.485475] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.492010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.500582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.712741] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.719169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.727297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.777468] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.784179] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.792670] device bridge_slave_1 entered promiscuous mode [ 184.842399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.144369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.473673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.993785] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.403071] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.681493] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.026927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.034198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.393582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.400865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.399667] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 188.407911] team0: Port device team_slave_0 added [ 188.727397] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 188.735365] team0: Port device team_slave_1 added 10:23:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000060100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'bridge0\x00', 0xfffffffffffffffd}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200), 0x2, 0x6}}, 0x20) io_setup(0x203, &(0x7f0000000040)=0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) [ 189.104179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 189.111378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.120385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.506506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 189.513954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.522751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.950022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.957761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.966837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.298246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.306060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.314985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.470712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.702440] IPVS: ftp: loaded support on port[0] = 21 [ 191.903487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.349938] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.356520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.364685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.510369] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.517025] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.525608] device bridge_slave_0 entered promiscuous mode [ 194.571056] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.577600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.584715] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.591264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.600023] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 194.800528] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.947960] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.954797] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.963388] device bridge_slave_1 entered promiscuous mode 10:23:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000060100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'bridge0\x00', 0xfffffffffffffffd}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x96, "909196", "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"}}, 0x110) io_setup(0x203, &(0x7f0000000040)=0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) [ 195.273189] hrtimer: interrupt took 34062 ns [ 195.329752] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.351752] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.513041] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.519594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.526632] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.533157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.540059] device bridge0 entered promiscuous mode [ 196.554910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.564707] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.571434] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.578274] device bridge0 left promiscuous mode [ 197.148247] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.154906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.162060] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.168524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.175628] device bridge0 entered promiscuous mode [ 197.187699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 10:23:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000060100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'bridge0\x00', 0xfffffffffffffffd}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r4, 0x96, "909196", "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"}}, 0x110) io_setup(0x203, &(0x7f0000000040)=0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) [ 197.641187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 10:23:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) ioctl$VT_DISALLOCATE(r0, 0x5608) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x8, 0xd}, &(0x7f00000000c0), 0x1000) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$TCSBRK(r0, 0x5409, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000140)) r2 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8b42076cc2104f74) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000001c0)={0x7, 0x4, 0x9}) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000280)={{0x3, 0xfffffffffffffffb, 0x8000, 0x1, 0x8, 0x5}, 0x6, 0x6, 0x7fffffff, 0x1, 0x7, "06c017af4f307f9ac939110117ebbbd25538aac5d283a138cd275a90c6a55499e1e99d40fd250d487a3c34bd6113e4b2c766f7f3408daa97abe24b3f8c67bd927681e1029a7f451b199b15311ed429cf2773088f41c3eab17b946bf96b558ed887d048fe4259959f9f79aaf7b6e746f6a8a1036b936a7f00e66a3bbaa5aaa589"}) r3 = geteuid() bind(r0, &(0x7f0000000340)=@ethernet={0x306, @remote}, 0x80) r4 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x20440) setsockopt$inet6_int(r4, 0x29, 0x4f, &(0x7f0000000400)=0x5, 0x4) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000440)=""/17) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setfsuid(r3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000600)="57d71e58b34b65c12f144de0f7", 0xd) r9 = shmget$private(0x0, 0x600000, 0xa44, &(0x7f00009fd000/0x600000)=nil) fstat(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r9, 0x1, &(0x7f0000000740)={{0x8459, r3, r10, r6, r11, 0x4, 0x1}, 0x7, 0x76, 0x8, 0x1b3, r1, r1, 0x3}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r7, 0x40a85321, &(0x7f0000000800)={{0x5, 0x14}, 'port1\x00', 0x4, 0x100001, 0xe90, 0x3, 0x9, 0xe5b, 0x100000000, 0x0, 0x1, 0x1f}) socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000ee0000/0x2000)=nil, 0x2000, 0xa, 0x11, r12, 0x0) connect$can_bcm(r2, &(0x7f00000008c0)={0x1d, r5}, 0x10) setsockopt$inet_buf(r4, 0x0, 0x11, &(0x7f0000000900)="cf387eb20dd405fb0e5e4e31500d4d6f628107339483e59813f2f6b9acdc5f037a02b76255d1d11e6230d6cb7f5cb405aac0e6e469b41d2a1811b97dcff79ab2b87ab0233eac2f354e02f4c1d227e1d292b57b668123024636c52cbfc2a4c02ad25f7a9052f906bb8185692996051f55712a9c7701d3ee9511845ee33fbc32b0f432c106d4cbb32e577dd762ccd272e3255ead776b7b596de15cd9aadadca1d753ba2f5c18e7b55f7f9d9b75a9bbd12f94657752c6424a785d", 0xb9) [ 197.723828] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.733568] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.747300] device bridge0 left promiscuous mode [ 198.548038] IPVS: ftp: loaded support on port[0] = 21 [ 198.710834] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.717490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.724460] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.731075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.738055] device bridge0 entered promiscuous mode 10:23:47 executing program 0: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000680)=@flushpolicy={0x10, 0x1d, 0x401}, 0x10}}, 0x0) [ 199.214025] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) 10:23:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x5, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 199.601516] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.022215] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:23:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x5, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 200.450872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 200.458284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.835287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.842662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:23:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/current\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x5, 0x9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 10:23:49 executing program 0: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') request_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000740)='rose0\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000780), &(0x7f0000000240), 0x6b, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x8100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[]}}, 0x0) [ 201.950764] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.959047] team0: Port device team_slave_0 added [ 202.395644] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.403805] team0: Port device team_slave_1 added [ 202.600138] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.606907] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.615474] device bridge_slave_0 entered promiscuous mode [ 202.658484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.731369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 202.739200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.748064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.944126] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.950615] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.959035] device bridge_slave_1 entered promiscuous mode [ 203.051475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.058858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.067570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.354976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.413492] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.421119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.430153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.680925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.743962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.751821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.760521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.968963] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.719680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.085365] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.143186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.153379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.161274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.472808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.479998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.685177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.692807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:23:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_INTERRUPT(r1, &(0x7f0000000600)={0x10}, 0x10) [ 206.488299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.496743] team0: Port device team_slave_0 added [ 206.558478] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.865199] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.873399] team0: Port device team_slave_1 added [ 207.063844] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.102341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.111087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.297783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.304994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.313801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.487084] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.493618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.500569] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.507170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.515677] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.552750] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.560353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.569340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.818645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.826358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.835247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.174201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.867517] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.874063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.880988] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.887588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.896471] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.903317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.932596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.855479] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.733916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 212.740350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.748307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:24:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x2000000000004e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/159, &(0x7f00000001c0)=0x9f) [ 213.797758] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.474937] 8021q: adding VLAN 0 to HW filter on device bond0 10:24:06 executing program 3: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x4}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) close(r1) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) [ 218.268382] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.849062] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 218.855611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.863622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.371895] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.412109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.902406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.400229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.406903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.414700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.914486] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.612991] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.620050] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.641693] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.648812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.664796] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.673941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.688562] device bridge0 entered promiscuous mode [ 222.703664] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.727483] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.734250] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.740915] device bridge0 left promiscuous mode [ 222.750347] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.757489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.764532] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.770984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.778130] device bridge0 entered promiscuous mode [ 222.784825] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 10:24:11 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0505510, &(0x7f0000001000)) 10:24:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2, 0x3503}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 10:24:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) ioctl(r1, 0xffffffffffffffff, &(0x7f0000000b40)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) [ 223.692121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:24:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) r2 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000060100"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'bridge0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r3, 0x96, "909196", "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"}}, 0x110) io_setup(0x203, &(0x7f0000000040)=0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) 10:24:12 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:24:12 executing program 3: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x4}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) close(r1) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 10:24:12 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x40405515, &(0x7f0000001000)) 10:24:12 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000040)=0x24) 10:24:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={&(0x7f00000000c0), 0xc, &(0x7f0000018100)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac00020038000100240001006d636173745f72656a6f696e5f696ec8300000616c00000000000000000000000800030003000000080004000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000038000100240000000000000000005f70656572735f636f756e74000000000000000000000000000008000300030000000800040000000000769c97ac9e187a9c9c77491025ac0d4cb0b89e2653c6f76673c74dd4d3fe7354c837f6a2a543c81600b730d3bafb694935cdcbef048518fcc405d69bb3a01ab8c9"], 0x1}}, 0x0) [ 224.156907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 10:24:12 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551b, &(0x7f0000001000)) 10:24:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e106558", &(0x7f0000000140)=""/41, 0x69}, 0x28) 10:24:12 executing program 4: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) 10:24:12 executing program 3: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x4}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x0) close(r1) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 10:24:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fe, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendmmsg$inet_sctp(r0, &(0x7f0000008d40)=[{&(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000940), 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="20000000000000008400000008000000ff02000000000000000000000000000118000000000000008400000000000000bd00000001000800"], 0x38}], 0x1, 0x0) 10:24:12 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000840)={0x4c, 0x0, &(0x7f00000005c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0xfffffffffffffffe}}}], 0x1, 0x0, &(0x7f0000000780)='i'}) 10:24:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x8000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) r2 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000060100"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'bridge0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r3, 0x96, "909196", "607ac4caa08f24bf78b2546de6ed00d47ab1f7a658abcf957cb4327d5e320d5a3aaec1187d9596b05c99956b7e1b669d51b4037f68452e21a72ac06939bd2d37c6a872c465e24e618da250dfa857dd8f709394a957eea032b26b5bf813fcb09ce690e16c882d42ad1e7309c3514168ce2f7798365408a3d1f00355bbc5bb2d296a85d511a1521e311079b17ca3dbc21d98ae4745e8883a01d74af3b5747733d8a2d87440fb3c5a01fa02eff75941d548f2bd627751393968a93f214bfc87dbb5fdda3da0771a94cdfeaa6d0be826f03f824f096aeaba1901ec1254b9648f6b3ae9f0b46cc74d1c021f6c0e609b0de2e644b3b38e8c860d433aa8f0e779e71526"}}, 0x110) io_setup(0x203, &(0x7f0000000040)=0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) [ 224.998730] binder: 7710:7713 got reply transaction with no transaction stack [ 225.006402] binder: 7710:7713 transaction failed 29201/-71, size 0-0 line 2762 10:24:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='cgroup\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/82, 0x52}], 0x1, 0x0) 10:24:13 executing program 4: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) [ 225.103425] binder: 7710:7716 got reply transaction with no transaction stack [ 225.110900] binder: 7710:7716 transaction failed 29201/-71, size 0-0 line 2762 10:24:13 executing program 3: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) 10:24:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000740)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 10:24:13 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000840)={0x4c, 0x0, &(0x7f00000005c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0xfffffffffffffffe}}}], 0x1, 0x0, &(0x7f0000000780)='i'}) 10:24:13 executing program 1: ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001200)={'nat\x00', 0x0, 0x5000000, 0xffffffffffffff1f, [], 0xf0, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000000000)=0x108) [ 225.579230] binder: 7731:7732 got reply transaction with no transaction stack [ 225.586762] binder: 7731:7732 transaction failed 29201/-71, size 0-0 line 2762 10:24:13 executing program 4: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) 10:24:13 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85512, &(0x7f0000001000)) [ 225.632301] input: syz0 as /devices/virtual/input/input5 10:24:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0x1, 0xc, [0x10000, 0x597, 0x0]}) [ 225.708606] input: syz0 as /devices/virtual/input/input6 10:24:13 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 10:24:14 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000840)={0x4c, 0x0, &(0x7f00000005c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0xfffffffffffffffe}}}], 0x1, 0x0, &(0x7f0000000780)='i'}) [ 226.109979] binder: 7760:7761 got reply transaction with no transaction stack [ 226.117517] binder: 7760:7761 transaction failed 29201/-71, size 0-0 line 2762 10:24:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x81785501, &(0x7f0000001000)) 10:24:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f00000001c0), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}}, 0x0) 10:24:14 executing program 4: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) 10:24:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x8100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x41000180}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="200028bd7000fedbdf250700000060000100080001cd020000000c0006006c626c6300000000080004004e2000000c0007002700000004000000080001000a0000000800060072720000080004004e210000080004004e2200000c0006006c626c6372000000080004004e24000008000600060000000800040001000000"], 0x1}, 0x1, 0x0, 0x0, 0x14}, 0x48080) 10:24:14 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000840)={0x4c, 0x0, &(0x7f00000005c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0xfffffffffffffffe}}}], 0x1, 0x0, &(0x7f0000000780)='i'}) 10:24:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000240)="66baf80cb8ee330d8bef66bafc0cec66baf80cb81c56d98cef66bafc0cec48b8934d123b449e31350f23c80f21f8350c0030000f23f8400f01f8c7442400ec000000c744240200109966ff1c24c462f9ae1966b825018ed8470f2101660f3808e90f07", 0x63}], 0x1, 0x0, &(0x7f0000000080), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0xd0003}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:24:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x174, 0x0, &(0x7f00000000c0), 0x100000e4) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 226.683324] binder: 7778:7779 got reply transaction with no transaction stack [ 226.691114] binder: 7778:7779 transaction failed 29201/-71, size 0-0 line 2762 [ 226.699810] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 10:24:14 executing program 4: r0 = socket(0x800800000000000a, 0x80002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x80000004340}) [ 226.796147] ================================================================== [ 226.803679] BUG: KMSAN: uninit-value in vmx_set_constant_host_state+0x1778/0x1830 [ 226.811416] CPU: 0 PID: 7786 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #66 [ 226.818721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.828093] Call Trace: [ 226.830714] dump_stack+0x306/0x460 [ 226.834367] ? vmx_set_constant_host_state+0x1778/0x1830 [ 226.839851] kmsan_report+0x1a2/0x2e0 [ 226.843681] __msan_warning+0x7c/0xe0 [ 226.847510] vmx_set_constant_host_state+0x1778/0x1830 [ 226.852812] vmx_create_vcpu+0x3e6f/0x7870 [ 226.857062] ? kmsan_set_origin_inline+0x6b/0x120 [ 226.861926] ? __msan_poison_alloca+0x17a/0x210 [ 226.866621] ? vmx_vm_init+0x340/0x340 [ 226.870529] kvm_arch_vcpu_create+0x25d/0x2f0 [ 226.875057] kvm_vm_ioctl+0x13fd/0x33d0 [ 226.879054] ? __msan_poison_alloca+0x17a/0x210 [ 226.883745] ? do_vfs_ioctl+0x18a/0x2810 [ 226.887814] ? __se_sys_ioctl+0x1da/0x270 [ 226.891974] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 226.896824] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 226.901675] do_vfs_ioctl+0xcf3/0x2810 [ 226.905586] ? security_file_ioctl+0x92/0x200 [ 226.910099] __se_sys_ioctl+0x1da/0x270 [ 226.914109] __x64_sys_ioctl+0x4a/0x70 [ 226.918003] do_syscall_64+0xbe/0x100 [ 226.921837] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 226.927033] RIP: 0033:0x457519 [ 226.930237] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.949151] RSP: 002b:00007f9d2a184c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 226.956870] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 226.964144] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 226.971421] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 226.978705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d2a1856d4 [ 226.985989] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 226.993274] [ 226.994911] Local variable description: ----dt@vmx_set_constant_host_state [ 227.001921] Variable was created at: [ 227.005653] vmx_set_constant_host_state+0x2b0/0x1830 [ 227.010850] vmx_create_vcpu+0x3e6f/0x7870 [ 227.015104] ================================================================== [ 227.022465] Disabling lock debugging due to kernel taint [ 227.027921] Kernel panic - not syncing: panic_on_warn set ... [ 227.027921] [ 227.035308] CPU: 0 PID: 7786 Comm: syz-executor0 Tainted: G B 4.19.0-rc4+ #66 [ 227.043882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.053237] Call Trace: [ 227.055852] dump_stack+0x306/0x460 [ 227.059499] panic+0x54c/0xafa [ 227.062761] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 227.068228] kmsan_report+0x2d3/0x2e0 [ 227.072047] __msan_warning+0x7c/0xe0 [ 227.075862] vmx_set_constant_host_state+0x1778/0x1830 [ 227.081156] vmx_create_vcpu+0x3e6f/0x7870 [ 227.085415] ? kmsan_set_origin_inline+0x6b/0x120 [ 227.090302] ? __msan_poison_alloca+0x17a/0x210 [ 227.095017] ? vmx_vm_init+0x340/0x340 [ 227.098928] kvm_arch_vcpu_create+0x25d/0x2f0 [ 227.103459] kvm_vm_ioctl+0x13fd/0x33d0 [ 227.107477] ? __msan_poison_alloca+0x17a/0x210 [ 227.112173] ? do_vfs_ioctl+0x18a/0x2810 [ 227.116254] ? __se_sys_ioctl+0x1da/0x270 [ 227.120424] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 227.125290] ? vcpu_stat_clear_per_vm+0x420/0x420 [ 227.130168] do_vfs_ioctl+0xcf3/0x2810 [ 227.134076] ? security_file_ioctl+0x92/0x200 [ 227.138590] __se_sys_ioctl+0x1da/0x270 [ 227.142586] __x64_sys_ioctl+0x4a/0x70 [ 227.146487] do_syscall_64+0xbe/0x100 [ 227.150304] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 227.155503] RIP: 0033:0x457519 [ 227.158707] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.177624] RSP: 002b:00007f9d2a184c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 227.185347] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 227.192634] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 227.199907] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 227.207188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9d2a1856d4 [ 227.214735] R13: 00000000004bfbb7 R14: 00000000004cfc40 R15: 00000000ffffffff [ 227.223253] Kernel Offset: disabled [ 227.226882] Rebooting in 86400 seconds..