[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.780537][ T25] audit: type=1800 audit(1572736702.670:25): pid=7141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.832957][ T25] audit: type=1800 audit(1572736702.670:26): pid=7141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.856548][ T25] audit: type=1800 audit(1572736702.670:27): pid=7141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. 2019/11/02 23:18:32 fuzzer started 2019/11/02 23:18:35 dialing manager at 10.128.0.105:46001 2019/11/02 23:18:35 syscalls: 2554 2019/11/02 23:18:35 code coverage: enabled 2019/11/02 23:18:35 comparison tracing: enabled 2019/11/02 23:18:35 extra coverage: extra coverage is not supported by the kernel 2019/11/02 23:18:35 setuid sandbox: enabled 2019/11/02 23:18:35 namespace sandbox: enabled 2019/11/02 23:18:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/02 23:18:35 fault injection: enabled 2019/11/02 23:18:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/02 23:18:35 net packet injection: enabled 2019/11/02 23:18:35 net device setup: enabled 2019/11/02 23:18:35 concurrency sanitizer: enabled syzkaller login: [ 60.961113][ T7306] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/02 23:18:52 adding functions to KCSAN blacklist: 'fsnotify' 'p9_poll_workfn' '__delete_from_page_cache' 'ext4_free_inode' 'tcp_add_backlog' 'blk_mq_run_hw_queue' 'inactive_list_is_low' 'rcu_gp_fqs_check_wake' 'ext4_has_free_clusters' 'find_get_pages_range_tag' 'echo_char' '__nf_conntrack_find_get' 'tcp_poll' 'tick_nohz_idle_stop_tick' 'queue_access_lock' 'xas_clear_mark' 'do_syslog' '__hrtimer_run_queues' 'pid_update_inode' 'kcm_rfree' 'list_lru_count_one' 'vm_area_dup' 'add_timer_on' 'update_defense_level' 'alloc_pid' '__skb_wait_for_more_packets' 'ext4_xattr_get' 'tomoyo_supervisor' 'tick_do_update_jiffies64' 'dd_has_work' 'ktime_get_with_offset' 'blk_mq_dispatch_rq_list' 'n_tty_receive_buf_common' 'xas_find_marked' 'task_dump_owner' '__rcu_read_unlock' 'ext4_free_inodes_count' 'wbt_done' 'do_exit' 'snd_ctl_notify' '__tcp_select_window' 'generic_permission' 'pipe_wait' 'ext4_nonda_switch' 'timer_clear_idle' 'taskstats_exit' '__nf_ct_refresh_acct' 'rcu_gp_fqs_loop' 'blk_mq_get_request' '__snd_rawmidi_transmit_ack' 'poll_schedule_timeout' 'mod_timer' 'generic_write_end' '__ext4_new_inode' 'ktime_get_seconds' 'kvm_arch_vcpu_load' 'sit_tunnel_xmit' '__dev_queue_xmit' 'find_next_bit' 'kauditd_thread' 'generic_fillattr' 'audit_log_start' 'blk_mq_sched_dispatch_requests' 'do_nanosleep' 'run_timer_softirq' 'ext4_mark_iloc_dirty' 'tick_sched_do_timer' 'add_timer' 'ktime_get_real_seconds' 'enqueue_timer' 'osq_lock' 'shmem_getpage_gfp' 'ipip_tunnel_xmit' 'pipe_poll' 'ep_poll' 'exit_signals' 'pcpu_alloc' 23:22:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x8, 0x6, 0x1, 0x0, 'syz1\x00'}) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 23:22:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) [ 297.928088][ T7309] IPVS: ftp: loaded support on port[0] = 21 [ 298.091463][ T7309] chnl_net:caif_netlink_parms(): no params data found 23:22:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x3c) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4), 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) [ 298.142995][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.151035][ T7309] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.159209][ T7309] device bridge_slave_0 entered promiscuous mode [ 298.167769][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.174963][ T7309] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.183205][ T7309] device bridge_slave_1 entered promiscuous mode [ 298.208314][ T7309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.213057][ T7312] IPVS: ftp: loaded support on port[0] = 21 [ 298.222137][ T7309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.300755][ T7309] team0: Port device team_slave_0 added [ 298.308994][ T7309] team0: Port device team_slave_1 added [ 298.419875][ T7309] device hsr_slave_0 entered promiscuous mode 23:22:45 executing program 3: bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100]}, 0x3c) [ 298.487655][ T7309] device hsr_slave_1 entered promiscuous mode [ 298.561224][ T7314] IPVS: ftp: loaded support on port[0] = 21 [ 298.728047][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.735171][ T7309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.742549][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.749633][ T7309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.891052][ T7312] chnl_net:caif_netlink_parms(): no params data found [ 298.999373][ T7328] IPVS: ftp: loaded support on port[0] = 21 [ 299.097400][ T7312] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.104708][ T7312] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.127375][ T7312] device bridge_slave_0 entered promiscuous mode [ 299.148225][ T7312] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.155304][ T7312] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.208127][ T7312] device bridge_slave_1 entered promiscuous mode [ 299.246349][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.267648][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.452520][ T7312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.492830][ T7312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.563574][ T7312] team0: Port device team_slave_0 added [ 299.612510][ T7312] team0: Port device team_slave_1 added [ 299.643619][ T7314] chnl_net:caif_netlink_parms(): no params data found [ 299.697057][ T7309] 8021q: adding VLAN 0 to HW filter on device bond0 23:22:46 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 299.786084][ T7309] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.826732][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.834694][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.962108][ T7312] device hsr_slave_0 entered promiscuous mode [ 300.040026][ T7312] device hsr_slave_1 entered promiscuous mode [ 300.106505][ T7312] debugfs: Directory 'hsr0' with parent '/' already present! [ 300.148104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.187171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.226988][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.234635][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.321924][ T7314] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.336532][ T7314] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.344679][ T7314] device bridge_slave_0 entered promiscuous mode [ 300.397747][ T7314] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.404841][ T7314] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.437555][ T7314] device bridge_slave_1 entered promiscuous mode [ 300.467891][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.500237][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.539517][ T7342] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.546659][ T7342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.587325][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.620166][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 300.672426][ T7328] chnl_net:caif_netlink_parms(): no params data found [ 300.731784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.749884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.790435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.817562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.857941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.893304][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.931874][ T7347] IPVS: ftp: loaded support on port[0] = 21 [ 300.945827][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 23:22:47 executing program 5: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc003, @multicast2}]}}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x570, 0x0) [ 300.981964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.027655][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.039262][ T7314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.066736][ T7309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.126956][ T7314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.223447][ T7309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.302748][ T7328] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.319691][ T7328] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.367742][ T7328] device bridge_slave_0 entered promiscuous mode [ 301.412657][ T7314] team0: Port device team_slave_0 added [ 301.431912][ T7314] team0: Port device team_slave_1 added [ 301.469746][ T7328] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.487971][ T7328] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.496154][ T7328] device bridge_slave_1 entered promiscuous mode [ 301.551007][ T7378] IPVS: ftp: loaded support on port[0] = 21 [ 301.635510][ T7328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.739779][ T7314] device hsr_slave_0 entered promiscuous mode [ 301.776875][ T7314] device hsr_slave_1 entered promiscuous mode [ 301.806600][ T7314] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.839638][ T7328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.919409][ T7328] team0: Port device team_slave_0 added [ 302.021832][ T7328] team0: Port device team_slave_1 added [ 302.153144][ C0] hrtimer: interrupt took 31381 ns [ 302.246955][ T7347] chnl_net:caif_netlink_parms(): no params data found [ 302.294158][ T7312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.443501][ T7328] device hsr_slave_0 entered promiscuous mode 23:22:49 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 302.519897][ T7328] device hsr_slave_1 entered promiscuous mode [ 302.548779][ T7328] debugfs: Directory 'hsr0' with parent '/' already present! [ 302.727751][ T7312] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.893173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.913777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.000212][ T7347] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.026502][ T7347] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.034607][ T7347] device bridge_slave_0 entered promiscuous mode [ 303.184672][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.216236][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:22:50 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 303.316998][ T7342] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.324110][ T7342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.437549][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.526796][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.535365][ T7342] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.542504][ T7342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.714386][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.788172][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.857964][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.917053][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.964134][ T7312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 23:22:51 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 304.076935][ T7312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.153720][ T7314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.197111][ T7347] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.204233][ T7347] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.288054][ T7347] device bridge_slave_1 entered promiscuous mode [ 304.385493][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.399716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.474759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.528870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.588870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 23:22:51 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 304.647338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.717787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.774785][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.852821][ T7314] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.992196][ T7312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.047331][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.055287][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.101185][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.158781][ T7347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.209701][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 305.232853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.280703][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.288281][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.363561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.422985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 23:22:52 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 305.491912][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.499069][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.576789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.637888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.707941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 305.779006][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.837766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.901876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.968915][ T7347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 306.034570][ T7328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.081834][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.097790][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 306.146359][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 23:22:53 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 306.212337][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.290173][ T7314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 306.351252][ T7314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 306.437452][ T7328] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.456312][ T7378] chnl_net:caif_netlink_parms(): no params data found [ 306.481162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.490652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.528759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.570259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.645455][ T7314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.734180][ T7347] team0: Port device team_slave_0 added [ 306.756911][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 23:22:53 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24044824, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x3e8, 0x0, 0xffffffffffffff37) [ 306.781450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.849581][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.856889][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.961209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.026319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.092787][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.099939][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 23:22:54 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) [ 307.181608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.207471][ T7347] team0: Port device team_slave_1 added [ 307.315525][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.342359][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.352241][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.370875][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.386162][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.395723][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.414860][ T7328] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 307.426615][ T7328] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 307.472249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.481041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.491734][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.501073][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.510271][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.573723][ T7347] device hsr_slave_0 entered promiscuous mode [ 307.616942][ T7347] device hsr_slave_1 entered promiscuous mode [ 307.656565][ T7347] debugfs: Directory 'hsr0' with parent '/' already present! [ 307.664280][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.674137][ T7378] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.681390][ T7378] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.689659][ T7378] device bridge_slave_0 entered promiscuous mode [ 307.702030][ T7328] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 307.722741][ T7378] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.729993][ T7378] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.738255][ T7378] device bridge_slave_1 entered promiscuous mode 23:22:54 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0x2d6) lstat(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) getresgid(0x0, 0x0, 0x0) setregid(0x0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 307.841393][ T7378] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.878508][ T7378] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.091684][ T7378] team0: Port device team_slave_0 added [ 308.198997][ T7378] team0: Port device team_slave_1 added [ 308.279752][ T7347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.419985][ T7378] device hsr_slave_0 entered promiscuous mode [ 308.451718][ T7378] device hsr_slave_1 entered promiscuous mode [ 308.509077][ T7378] debugfs: Directory 'hsr0' with parent '/' already present! [ 308.577349][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.595357][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.652894][ T7347] 8021q: adding VLAN 0 to HW filter on device team0 23:22:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 308.788556][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.827253][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.906988][ T7342] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.914084][ T7342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.012226][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.065877][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.114074][ T7342] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.121382][ T7342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.197794][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.255833][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.307319][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.363379][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.453536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.469985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.513185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.563382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.615183][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.664486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.725952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.771193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.819023][ T7347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.926217][ T7347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.161740][ T7378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.247425][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.255489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.329716][ T7378] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.371407][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.417784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.426317][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.433426][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.567357][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.576071][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.641473][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.697061][ T7488] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.704343][ T7488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.792293][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.858195][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.916339][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 310.974860][ T7488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.049934][ T7378] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 311.138542][ T7378] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 311.209863][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 311.238530][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.300197][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.348187][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.407369][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.446605][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.507253][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:22:58 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 311.557622][ T7342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 311.597460][ T7378] 8021q: adding VLAN 0 to HW filter on device batadv0 23:22:59 executing program 5: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc003, @multicast2}]}}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x570, 0x0) 23:22:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x7b, 0xaa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000240)=""/195}, 0x26) 23:22:59 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0x2d6) lstat(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) getresgid(0x0, 0x0, 0x0) setregid(0x0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 23:22:59 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) 23:22:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:22:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x7b, 0xaa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000240)=""/195}, 0x26) 23:22:59 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) 23:22:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:22:59 executing program 5: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc003, @multicast2}]}}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x570, 0x0) 23:22:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x7b, 0xaa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000240)=""/195}, 0x26) 23:22:59 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0x2d6) lstat(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) getresgid(0x0, 0x0, 0x0) setregid(0x0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 23:23:00 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:23:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x7b, 0xaa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000240)=""/195}, 0x26) 23:23:00 executing program 5: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc003, @multicast2}]}}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x570, 0x0) 23:23:00 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0x2d6) lstat(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) getresgid(0x0, 0x0, 0x0) setregid(0x0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 23:23:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0xb191e96b602ca588}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="58fc4b826720535e755f85a8fbd2d69bd3cb5a13b461a2d5b345748ab6c884c0603b2d86e6e87735941605426ecf1e683719261c06121fde2d860c6351cd322f2db3785efd7e4106d3a378a67264b3cf885cc15d"], 0x54) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:23:00 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0x2d6) lstat(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) getresgid(0x0, 0x0, 0x0) setregid(0x0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 313.824739][ T7653] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 23:23:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:23:00 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:23:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xf3, 0x0, 0x0, 0x0, 0x7}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000150007841dfffd946f6105000247f989170389060400080008000b000400ff7e", 0x24}], 0x1}, 0x0) [ 314.487850][ T7677] netlink: 'syz-executor.0': attribute type 8 has an invalid length. 23:23:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000150007841dfffd946f6105000247f989170389060400080008000b000400ff7e", 0x24}], 0x1}, 0x0) 23:23:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xf3, 0x0, 0x0, 0x0, 0x7}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 314.764092][ T7683] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 314.880999][ T7659] ================================================================== [ 314.889498][ T7659] BUG: KCSAN: data-race in ext4_setattr / mpage_process_page_bufs [ 314.897289][ T7659] [ 314.899620][ T7659] write to 0xffff8880b99099d8 of 8 bytes by task 7660 on cpu 1: [ 314.907337][ T7659] ext4_setattr+0xef4/0x1620 [ 314.911927][ T7659] notify_change+0x7e1/0xaa0 [ 314.916526][ T7659] do_truncate+0xfb/0x180 [ 314.920871][ T7659] path_openat+0x2f4a/0x36e0 [ 314.925468][ T7659] do_filp_open+0x11e/0x1b0 [ 314.929971][ T7659] do_sys_open+0x3b3/0x4f0 [ 314.934385][ T7659] __x64_sys_openat+0x62/0x80 [ 314.939064][ T7659] do_syscall_64+0xcc/0x370 [ 314.943568][ T7659] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.949446][ T7659] [ 314.951803][ T7659] read to 0xffff8880b99099d8 of 8 bytes by task 7659 on cpu 0: [ 314.959354][ T7659] mpage_process_page_bufs+0x41/0x3d0 [ 314.964733][ T7659] mpage_prepare_extent_to_map+0x48b/0x760 [ 314.971062][ T7659] ext4_writepages+0xb2b/0x2300 [ 314.975912][ T7659] do_writepages+0x6b/0x170 [ 314.980421][ T7659] __filemap_fdatawrite_range+0x1c5/0x230 [ 314.986136][ T7659] filemap_flush+0x2d/0x40 [ 314.990545][ T7659] ext4_alloc_da_blocks+0x78/0x180 [ 314.995668][ T7659] ext4_ioctl+0xeb1/0x3130 [ 315.000075][ T7659] do_vfs_ioctl+0x991/0xc60 [ 315.004566][ T7659] ksys_ioctl+0xbd/0xe0 [ 315.008709][ T7659] __x64_sys_ioctl+0x4c/0x60 [ 315.013287][ T7659] do_syscall_64+0xcc/0x370 [ 315.017783][ T7659] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.023669][ T7659] [ 315.025980][ T7659] Reported by Kernel Concurrency Sanitizer on: [ 315.032121][ T7659] CPU: 0 PID: 7659 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 315.039928][ T7659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.049971][ T7659] ================================================================== [ 315.058017][ T7659] Kernel panic - not syncing: panic_on_warn set ... [ 315.064591][ T7659] CPU: 0 PID: 7659 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 315.072388][ T7659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.082429][ T7659] Call Trace: [ 315.085717][ T7659] dump_stack+0xf5/0x159 [ 315.089952][ T7659] panic+0x210/0x640 [ 315.093837][ T7659] ? do_vfs_ioctl+0x991/0xc60 [ 315.098519][ T7659] ? vprintk_func+0x8d/0x140 [ 315.103107][ T7659] kcsan_report.cold+0xc/0x10 [ 315.107791][ T7659] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 315.113341][ T7659] __tsan_read8+0x2c/0x30 [ 315.117672][ T7659] mpage_process_page_bufs+0x41/0x3d0 [ 315.123173][ T7659] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 315.129256][ T7659] mpage_prepare_extent_to_map+0x48b/0x760 [ 315.135069][ T7659] ? syscall_return_via_sysret+0x32/0x33 [ 315.140701][ T7659] ext4_writepages+0xb2b/0x2300 [ 315.145671][ T7659] ? __kcsan_check_watchpoint+0xbb/0x180 [ 315.151297][ T7659] ? ext4_mark_inode_dirty+0x420/0x420 [ 315.156759][ T7659] do_writepages+0x6b/0x170 [ 315.161253][ T7659] ? do_writepages+0x6b/0x170 [ 315.166104][ T7659] ? wbc_attach_and_unlock_inode+0xdd/0x390 [ 315.171987][ T7659] __filemap_fdatawrite_range+0x1c5/0x230 [ 315.177722][ T7659] filemap_flush+0x2d/0x40 [ 315.182129][ T7659] ext4_alloc_da_blocks+0x78/0x180 [ 315.187232][ T7659] ext4_ioctl+0xeb1/0x3130 [ 315.191646][ T7659] ? do_vfs_ioctl+0x55/0xc60 [ 315.196237][ T7659] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 315.201873][ T7659] ? __sanitizer_cov_trace_switch+0x3c/0x80 [ 315.207759][ T7659] ? ext4_ioctl_group_add+0x330/0x330 [ 315.213121][ T7659] do_vfs_ioctl+0x991/0xc60 [ 315.217616][ T7659] ? __tsan_read8+0x2c/0x30 [ 315.222112][ T7659] ksys_ioctl+0xbd/0xe0 [ 315.226405][ T7659] __x64_sys_ioctl+0x4c/0x60 [ 315.231009][ T7659] do_syscall_64+0xcc/0x370 [ 315.235506][ T7659] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.241402][ T7659] RIP: 0033:0x459f49 [ 315.245308][ T7659] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.266118][ T7659] RSP: 002b:00007fbb17759c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.274575][ T7659] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 315.282556][ T7659] RDX: 0000000000000000 RSI: 000000000000660c RDI: 0000000000000003 [ 315.290519][ T7659] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 315.298480][ T7659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb1775a6d4 [ 315.306439][ T7659] R13: 00000000004ce550 R14: 00000000004d7fc0 R15: 00000000ffffffff [ 315.315905][ T7659] Kernel Offset: disabled [ 315.320232][ T7659] Rebooting in 86400 seconds..