[info] Using makefile-style concurrent boot in runlevel 2. [ 43.467393][ T25] audit: type=1800 audit(1575909743.882:21): pid=7484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.520947][ T25] audit: type=1800 audit(1575909743.882:22): pid=7484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.100' (ECDSA) to the list of known hosts. 2019/12/09 16:42:33 fuzzer started 2019/12/09 16:42:35 dialing manager at 10.128.0.105:38603 2019/12/09 16:42:36 syscalls: 2689 2019/12/09 16:42:36 code coverage: enabled 2019/12/09 16:42:36 comparison tracing: enabled 2019/12/09 16:42:36 extra coverage: extra coverage is not supported by the kernel 2019/12/09 16:42:36 setuid sandbox: enabled 2019/12/09 16:42:36 namespace sandbox: enabled 2019/12/09 16:42:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/09 16:42:36 fault injection: enabled 2019/12/09 16:42:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/09 16:42:36 net packet injection: enabled 2019/12/09 16:42:36 net device setup: enabled 2019/12/09 16:42:36 concurrency sanitizer: enabled 2019/12/09 16:42:36 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 57.645964][ T7649] KCSAN: could not find function: 'poll_schedule_timeout' [ 58.948475][ T7649] KCSAN: could not find function: 'may_open' 2019/12/09 16:42:44 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'mod_timer' 'pid_update_inode' 'tick_sched_do_timer' 'blk_mq_get_request' 'run_timer_softirq' 'xas_clear_mark' 'add_timer' 'sbitmap_queue_clear' 'ext4_has_free_clusters' 'tomoyo_supervisor' 'poll_schedule_timeout' 'process_srcu' 'ktime_get_real_seconds' 'kauditd_thread' 'generic_write_end' '__ext4_new_inode' 'common_perm_cond' 'watchdog' 'do_syslog' 'audit_log_start' 'pipe_poll' 'may_open' 'copy_process' 'page_counter_try_charge' 'xas_find_marked' 'blk_mq_run_hw_queue' 'lruvec_lru_size' 'do_exit' 'taskstats_exit' '__snd_rawmidi_transmit_ack' 'find_get_pages_range_tag' 'iput' 'wbt_issue' 'find_next_bit' 'ipip_tunnel_xmit' '__skb_try_recv_from_queue' 'ep_poll' 'generic_fillattr' 'ext4_nonda_switch' 'rcu_gp_fqs_check_wake' 'tick_do_update_jiffies64' 'do_nanosleep' 'inactive_list_is_low' 'tick_nohz_idle_stop_tick' 'pcpu_alloc' '__d_lookup_done' 'blk_mq_dispatch_rq_list' 'rcu_gp_fqs_loop' 'tcp_add_backlog' 'skb_dequeue' 'vm_area_dup' 'dd_has_work' 'ext4_free_inode' 16:45:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150004008178a8001600050001400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 218.048162][ T7652] IPVS: ftp: loaded support on port[0] = 21 16:45:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x40000000015, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r4, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000100)={@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, {0x0}, 0x0}, 0xa0) [ 218.119690][ T7652] chnl_net:caif_netlink_parms(): no params data found [ 218.178192][ T7652] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.193230][ T7652] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.201108][ T7652] device bridge_slave_0 entered promiscuous mode [ 218.225067][ T7652] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.232330][ T7652] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.253600][ T7652] device bridge_slave_1 entered promiscuous mode [ 218.272382][ T7655] IPVS: ftp: loaded support on port[0] = 21 [ 218.285028][ T7652] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.295541][ T7652] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.318730][ T7652] team0: Port device team_slave_0 added [ 218.327031][ T7652] team0: Port device team_slave_1 added 16:45:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) [ 218.426033][ T7652] device hsr_slave_0 entered promiscuous mode [ 218.473614][ T7652] device hsr_slave_1 entered promiscuous mode 16:45:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x2bb1f36c7597d46, 0x2, 0x0) [ 218.619768][ T7657] IPVS: ftp: loaded support on port[0] = 21 [ 218.683673][ T7652] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.690765][ T7652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.698677][ T7652] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.705913][ T7652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.966288][ T7655] chnl_net:caif_netlink_parms(): no params data found [ 219.078277][ T7652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.130739][ T7652] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.130817][ T7683] IPVS: ftp: loaded support on port[0] = 21 [ 219.174246][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.194665][ T3512] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.223358][ T3512] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.255813][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 219.286267][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.303116][ T7655] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.333925][ T7655] device bridge_slave_0 entered promiscuous mode 16:45:19 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000004c0), 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x7, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000a00)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000002d80)=0x40) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x0, 0x0, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) r5 = dup3(r3, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x10800002}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x14, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0xc0) [ 219.375744][ T7657] chnl_net:caif_netlink_parms(): no params data found [ 219.393241][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.423897][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.453243][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.460402][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.524452][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.564330][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.593187][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.600268][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.664626][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.704166][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.733550][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.763172][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.772091][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.792880][ T7655] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.800605][ T7655] device bridge_slave_1 entered promiscuous mode [ 219.857005][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.860577][ T7687] IPVS: ftp: loaded support on port[0] = 21 [ 219.913147][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.934717][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.972696][ T7655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.015390][ T7652] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.034238][ T7652] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 16:45:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 220.093933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.113592][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.134130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.172893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.215490][ T7655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.239250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.261774][ T7657] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.270636][ T7657] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.279059][ T7657] device bridge_slave_0 entered promiscuous mode [ 220.290169][ T7657] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.297507][ T7657] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.305858][ T7657] device bridge_slave_1 entered promiscuous mode [ 220.327562][ T7655] team0: Port device team_slave_0 added [ 220.334646][ T7655] team0: Port device team_slave_1 added [ 220.369468][ T7683] chnl_net:caif_netlink_parms(): no params data found [ 220.379310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.387213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.396554][ T7657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.412666][ T7657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.435194][ T7652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.436845][ T7697] IPVS: ftp: loaded support on port[0] = 21 [ 220.474501][ T7655] device hsr_slave_0 entered promiscuous mode [ 220.523484][ T7655] device hsr_slave_1 entered promiscuous mode [ 220.563042][ T7655] debugfs: Directory 'hsr0' with parent '/' already present! [ 220.609641][ T7657] team0: Port device team_slave_0 added [ 220.616578][ T7657] team0: Port device team_slave_1 added [ 220.652712][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.661507][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.672584][ T7683] device bridge_slave_0 entered promiscuous mode [ 220.732308][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.743391][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.763023][ T7683] device bridge_slave_1 entered promiscuous mode [ 220.825455][ T7657] device hsr_slave_0 entered promiscuous mode [ 220.855651][ T7657] device hsr_slave_1 entered promiscuous mode [ 220.922925][ T7657] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.010497][ T7687] chnl_net:caif_netlink_parms(): no params data found [ 221.036722][ T7683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.082303][ T7729] IPv6: NLM_F_CREATE should be specified when creating new route [ 221.102996][ T7729] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 221.170714][ T7683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:45:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150004008178a8001600050001400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 221.242014][ T7655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.277975][ T7697] chnl_net:caif_netlink_parms(): no params data found [ 221.329968][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.356507][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.403622][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.410792][ T7687] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.460921][ T7687] device bridge_slave_0 entered promiscuous mode [ 221.503364][ T7683] team0: Port device team_slave_0 added [ 221.514410][ T7655] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.557811][ T7747] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 221.595933][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.628044][ T7687] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.663710][ T7687] device bridge_slave_1 entered promiscuous mode 16:45:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150004008178a8001600050001400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 221.690532][ T7683] team0: Port device team_slave_1 added [ 221.701233][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.753230][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.803247][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.810535][ T7674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.886131][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.975555][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.006794][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.048134][ T7674] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.055449][ T7674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.123683][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.168526][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.211227][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.270322][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.315635][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.356578][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.400522][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.450646][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.508793][ T7655] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.557512][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.598887][ T7758] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 222.676940][ T7683] device hsr_slave_0 entered promiscuous mode 16:45:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150004008178a8001600050001400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 222.745364][ T7683] device hsr_slave_1 entered promiscuous mode [ 222.783459][ T7683] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.792373][ T7687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.927051][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.946745][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.991850][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.032623][ T7657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.076588][ T7697] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.091883][ T7697] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.122507][ T7697] device bridge_slave_0 entered promiscuous mode [ 223.154544][ T7687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.188280][ T7763] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 223.223188][ T7657] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.230346][ T7697] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.258140][ T7697] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.295483][ T7697] device bridge_slave_1 entered promiscuous mode 16:45:23 executing program 0: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) [ 223.326996][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.347547][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.389109][ T7655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.459959][ T7687] team0: Port device team_slave_0 added [ 223.474058][ T7754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.481973][ T7754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.521660][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.556463][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.610803][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.618794][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.709258][ T7687] team0: Port device team_slave_1 added [ 223.734228][ T7697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.768770][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.805082][ T7697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.836426][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.867135][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.883346][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.890525][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.007558][ T7687] device hsr_slave_0 entered promiscuous mode [ 224.053168][ T7687] device hsr_slave_1 entered promiscuous mode [ 224.072879][ T7687] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.083619][ T7697] team0: Port device team_slave_0 added [ 224.099914][ T2613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.130954][ T7657] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 224.192309][ T7657] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.228768][ T7697] team0: Port device team_slave_1 added [ 224.267389][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.297662][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.350708][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 16:45:24 executing program 0: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) [ 224.413672][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.447689][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.492672][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.557027][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.607048][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.636569][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.666689][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.700263][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.784092][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.855256][ T7697] device hsr_slave_0 entered promiscuous mode [ 224.893182][ T7697] device hsr_slave_1 entered promiscuous mode 16:45:25 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) [ 224.942944][ T7697] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.980102][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 225.011907][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 225.056299][ T7657] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.083422][ T7683] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.180704][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.199698][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.295626][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.319052][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.368995][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.376194][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.452049][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 16:45:25 executing program 0: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) [ 225.503708][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.596635][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.603754][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.673398][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.757727][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.800254][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.857653][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.929448][ T7683] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 226.003912][ T7683] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 16:45:26 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) [ 226.087390][ T7687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.166322][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.177761][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.241272][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.296085][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.353818][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.398523][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.443801][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.487092][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.551436][ T7683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.613566][ T7687] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.659434][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.678366][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 226.720206][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 226.779144][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.830119][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.910778][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.969553][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.042332][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.049882][ T7685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.121669][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.156449][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.203913][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.211046][ T7685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.269597][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.308179][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 16:45:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) [ 227.369836][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.398772][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.466550][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.493851][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.549955][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.576593][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.633275][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.675668][ T7687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 227.699552][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.740563][ T7697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.782628][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.792192][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.825573][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.855369][ T7687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.867736][ T7697] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.903189][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 227.910763][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.930237][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.948860][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.975868][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.986153][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.001263][ T3018] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.008384][ T3018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.021357][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.030225][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.041444][ T3018] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.048573][ T3018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.064543][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.076587][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.097441][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.105612][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.124327][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.143206][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.152445][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.161613][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.170345][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.178968][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.187675][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.196278][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.216821][ T7697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.238067][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.246173][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.261964][ T7697] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.413312][ C1] hrtimer: interrupt took 55270 ns 16:45:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x2bb1f36c7597d46, 0x2, 0x0) 16:45:30 executing program 0: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) 16:45:30 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) poll(&(0x7f0000002100)=[{r1}], 0x1, 0xc94) close(r0) 16:45:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) 16:45:30 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000004c0), 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x7, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000a00)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000002d80)=0x40) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x0, 0x0, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) r5 = dup3(r3, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x10800002}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x14, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0xc0) 16:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 16:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 16:45:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) 16:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 16:45:30 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) 16:45:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x3, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u8=0x0}}) 16:45:31 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) 16:45:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x2bb1f36c7597d46, 0x2, 0x0) 16:45:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x3, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u8=0x0}}) 16:45:32 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) 16:45:32 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r4, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000500)=""/249, 0xf9}, {0x0}], 0x3, 0x10400003) 16:45:32 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000004c0), 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x7, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000a00)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000002d80)=0x40) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x0, 0x0, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) r5 = dup3(r3, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x10800002}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x14, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0xc0) 16:45:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x3, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u8=0x0}}) 16:45:32 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) 16:45:32 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0x3, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u8=0x0}}) 16:45:32 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x40}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:45:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x2bb1f36c7597d46, 0x2, 0x0) 16:45:34 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:34 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x40}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:45:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r4, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000500)=""/249, 0xf9}, {0x0}], 0x3, 0x10400003) 16:45:34 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000004c0), 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) syz_open_dev$vcsa(0x0, 0x7, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000a00)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000002d80)=0x40) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x0, 0x0, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) r5 = dup3(r3, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x10800002}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x14, r4, 0x1, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0xc0) 16:45:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x40}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:45:34 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:34 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f209975e2c2f7d2681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c26358e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a3032537ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2faffbba1c9b8c8a726f2886e40a55bb2f8c21264bd545a9b824d13fed5868ecdc300b433fc5f1ec9ea680da4e37ef26e00"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 16:45:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x40}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:45:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r4, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000500)=""/249, 0xf9}, {0x0}], 0x3, 0x10400003) [ 234.655423][ T7631] ================================================================== [ 234.663594][ T7631] BUG: KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit [ 234.671217][ T7631] [ 234.673560][ T7631] write to 0xffff888125af3908 of 1 bytes by interrupt on cpu 0: [ 234.681210][ T7631] __dev_queue_xmit+0x17c9/0x1b40 [ 234.686379][ T7631] dev_queue_xmit+0x21/0x30 [ 234.690900][ T7631] ip_finish_output2+0x836/0xe40 [ 234.696023][ T7631] __ip_finish_output+0x23a/0x490 [ 234.701060][ T7631] ip_finish_output+0x41/0x160 [ 234.705835][ T7631] ip_output+0xdf/0x210 [ 234.710154][ T7631] ip_local_out+0x74/0x90 [ 234.714853][ T7631] __ip_queue_xmit+0x3a8/0xa40 [ 234.719624][ T7631] ip_queue_xmit+0x45/0x60 [ 234.724245][ T7631] __tcp_transmit_skb+0xe81/0x1d60 [ 234.729560][ T7631] tcp_write_xmit+0xa54/0x3120 [ 234.734350][ T7631] __tcp_push_pending_frames+0x7b/0x1d0 [ 234.739915][ T7631] tcp_rcv_established+0xda0/0xf50 [ 234.745167][ T7631] tcp_v4_do_rcv+0x3b5/0x520 [ 234.750388][ T7631] tcp_v4_rcv+0x19ec/0x1bd0 [ 234.754995][ T7631] ip_protocol_deliver_rcu+0x4d/0x420 [ 234.760389][ T7631] ip_local_deliver_finish+0x110/0x140 [ 234.765891][ T7631] ip_local_deliver+0x133/0x210 [ 234.771395][ T7631] ip_rcv_finish+0x121/0x160 [ 234.776008][ T7631] ip_rcv+0x18f/0x1a0 [ 234.780202][ T7631] __netif_receive_skb_one_core+0xa7/0xe0 [ 234.785947][ T7631] __netif_receive_skb+0x37/0xf0 [ 234.791051][ T7631] netif_receive_skb_internal+0x59/0x190 [ 234.797154][ T7631] napi_gro_receive+0x28f/0x330 [ 234.802028][ T7631] receive_buf+0x284/0x30b0 [ 234.806538][ T7631] virtnet_poll+0x436/0x7d0 [ 234.811047][ T7631] net_rx_action+0x3ae/0xa90 [ 234.815658][ T7631] __do_softirq+0x115/0x33f [ 234.820186][ T7631] irq_exit+0xbb/0xe0 [ 234.824271][ T7631] do_IRQ+0x81/0x130 [ 234.828207][ T7631] ret_from_intr+0x0/0x19 [ 234.832543][ T7631] __tsan_unaligned_write8+0x96/0x100 [ 234.837936][ T7631] import_iovec+0x124/0x220 [ 234.842484][ T7631] copy_msghdr_from_user+0x235/0x320 [ 234.847798][ T7631] ___sys_recvmsg+0xb9/0x3e0 [ 234.855283][ T7631] do_recvmmsg+0x19a/0x5c0 [ 234.861970][ T7631] __sys_recvmmsg+0x1ef/0x200 [ 234.866683][ T7631] __x64_sys_recvmmsg+0x89/0xb0 [ 234.871566][ T7631] do_syscall_64+0xcc/0x370 [ 234.876143][ T7631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 234.882125][ T7631] [ 234.884569][ T7631] read to 0xffff888125af3908 of 1 bytes by task 7631 on cpu 1: [ 234.892133][ T7631] __dev_queue_xmit+0x9db/0x1b40 [ 234.897115][ T7631] dev_queue_xmit+0x21/0x30 [ 234.901998][ T7631] ip_finish_output2+0x836/0xe40 [ 234.907052][ T7631] __ip_finish_output+0x23a/0x490 [ 234.912134][ T7631] ip_finish_output+0x41/0x160 [ 234.917240][ T7631] ip_output+0xdf/0x210 [ 234.921503][ T7631] ip_local_out+0x74/0x90 [ 234.925851][ T7631] __ip_queue_xmit+0x3a8/0xa40 [ 234.930674][ T7631] ip_queue_xmit+0x45/0x60 [ 234.935101][ T7631] __tcp_transmit_skb+0xe81/0x1d60 [ 234.940221][ T7631] tcp_write_xmit+0xa54/0x3120 [ 234.945031][ T7631] __tcp_push_pending_frames+0x7b/0x1d0 [ 234.951209][ T7631] tcp_push+0x1e9/0x3d0 [ 234.955394][ T7631] tcp_sendmsg_locked+0x1d2b/0x1fb0 [ 234.960613][ T7631] tcp_sendmsg+0x39/0x60 [ 234.964873][ T7631] inet_sendmsg+0x6d/0x90 [ 234.969217][ T7631] sock_sendmsg+0x9f/0xc0 [ 234.973577][ T7631] sock_write_iter+0x16b/0x210 [ 234.978353][ T7631] new_sync_write+0x388/0x4a0 [ 234.983032][ T7631] __vfs_write+0xb1/0xc0 [ 234.987288][ T7631] vfs_write+0x18a/0x390 [ 234.991540][ T7631] ksys_write+0xd5/0x1b0 [ 234.995802][ T7631] __x64_sys_write+0x4c/0x60 [ 235.000422][ T7631] do_syscall_64+0xcc/0x370 [ 235.004942][ T7631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 235.010833][ T7631] [ 235.013163][ T7631] Reported by Kernel Concurrency Sanitizer on: [ 235.019334][ T7631] CPU: 1 PID: 7631 Comm: sshd Not tainted 5.4.0-syzkaller #0 [ 235.026738][ T7631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.037263][ T7631] ================================================================== [ 235.046028][ T7631] Kernel panic - not syncing: panic_on_warn set ... [ 235.052715][ T7631] CPU: 1 PID: 7631 Comm: sshd Not tainted 5.4.0-syzkaller #0 [ 235.060791][ T7631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.071238][ T7631] Call Trace: [ 235.074813][ T7631] dump_stack+0x11d/0x181 [ 235.079166][ T7631] panic+0x210/0x640 [ 235.084037][ T7631] ? vprintk_func+0x8d/0x140 [ 235.088649][ T7631] kcsan_report.cold+0xc/0xd [ 235.093271][ T7631] kcsan_setup_watchpoint+0x3fe/0x460 [ 235.099118][ T7631] __tsan_read1+0xc2/0x100 [ 235.103551][ T7631] __dev_queue_xmit+0x9db/0x1b40 [ 235.108588][ T7631] ? ipt_do_table+0x8e9/0xe60 [ 235.113278][ T7631] ? __rcu_read_unlock+0x66/0x3c0 [ 235.118475][ T7631] ? nf_nat_packet+0xc2/0x110 [ 235.123338][ T7631] dev_queue_xmit+0x21/0x30 [ 235.127855][ T7631] ip_finish_output2+0x836/0xe40 [ 235.132809][ T7631] __ip_finish_output+0x23a/0x490 [ 235.137869][ T7631] ? ipv4_confirm+0xdc/0x160 [ 235.142469][ T7631] ip_finish_output+0x41/0x160 [ 235.147237][ T7631] ip_output+0xdf/0x210 [ 235.151401][ T7631] ? __ip_finish_output+0x490/0x490 [ 235.156708][ T7631] ip_local_out+0x74/0x90 [ 235.161049][ T7631] __ip_queue_xmit+0x3a8/0xa40 [ 235.165826][ T7631] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 235.171737][ T7631] ip_queue_xmit+0x45/0x60 [ 235.176180][ T7631] __tcp_transmit_skb+0xe81/0x1d60 [ 235.181309][ T7631] tcp_write_xmit+0xa54/0x3120 [ 235.186100][ T7631] ? kmem_cache_alloc_node_trace+0x1b4/0x670 [ 235.192243][ T7631] __tcp_push_pending_frames+0x7b/0x1d0 [ 235.197803][ T7631] tcp_push+0x1e9/0x3d0 [ 235.202001][ T7631] tcp_sendmsg_locked+0x1d2b/0x1fb0 [ 235.207255][ T7631] tcp_sendmsg+0x39/0x60 [ 235.211513][ T7631] inet_sendmsg+0x6d/0x90 [ 235.215852][ T7631] ? inet_send_prepare+0x200/0x200 [ 235.220982][ T7631] sock_sendmsg+0x9f/0xc0 [ 235.225321][ T7631] sock_write_iter+0x16b/0x210 [ 235.230121][ T7631] new_sync_write+0x388/0x4a0 [ 235.234994][ T7631] __vfs_write+0xb1/0xc0 [ 235.239255][ T7631] vfs_write+0x18a/0x390 [ 235.243604][ T7631] ksys_write+0xd5/0x1b0 [ 235.247849][ T7631] __x64_sys_write+0x4c/0x60 [ 235.252442][ T7631] do_syscall_64+0xcc/0x370 [ 235.256955][ T7631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 235.262847][ T7631] RIP: 0033:0x7f937ffa6370 [ 235.267272][ T7631] Code: 73 01 c3 48 8b 0d c8 4a 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d 85 a2 2b 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 0e 8a 01 00 48 89 04 24 [ 235.287053][ T7631] RSP: 002b:00007ffef16c1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 235.295462][ T7631] RAX: ffffffffffffffda RBX: 0000000000000248 RCX: 00007f937ffa6370 [ 235.304307][ T7631] RDX: 0000000000000248 RSI: 00005622be263160 RDI: 0000000000000003 [ 235.312278][ T7631] RBP: 00005622be263160 R08: 0000000000000001 R09: 0101010101010101 [ 235.320264][ T7631] R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffef16c1acc [ 235.328412][ T7631] R13: 00005622bd30efb4 R14: 0000000000000028 R15: 00005622bd310ca0 [ 235.338081][ T7631] Kernel Offset: disabled [ 235.342814][ T7631] Rebooting in 86400 seconds..