[info] Using makefile-style concurrent boot in runlevel 2. [ 27.036968] audit: type=1800 audit(1545602970.013:21): pid=5867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.159' (ECDSA) to the list of known hosts. 2018/12/23 22:09:38 fuzzer started 2018/12/23 22:09:40 dialing manager at 10.128.0.26:33943 syzkaller login: [ 37.420670] ld (6029) used greatest stack depth: 15200 bytes left 2018/12/23 22:09:40 syscalls: 1 2018/12/23 22:09:40 code coverage: enabled 2018/12/23 22:09:40 comparison tracing: enabled 2018/12/23 22:09:40 setuid sandbox: enabled 2018/12/23 22:09:40 namespace sandbox: enabled 2018/12/23 22:09:40 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/23 22:09:40 fault injection: enabled 2018/12/23 22:09:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/23 22:09:40 net packet injection: enabled 2018/12/23 22:09:40 net device setup: enabled 22:12:02 executing program 0: [ 179.802593] IPVS: ftp: loaded support on port[0] = 21 22:12:02 executing program 1: [ 180.112234] IPVS: ftp: loaded support on port[0] = 21 22:12:03 executing program 2: [ 180.408653] IPVS: ftp: loaded support on port[0] = 21 22:12:03 executing program 3: [ 180.718059] IPVS: ftp: loaded support on port[0] = 21 22:12:04 executing program 4: [ 181.291560] IPVS: ftp: loaded support on port[0] = 21 [ 181.511662] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.518620] bridge0: port 1(bridge_slave_0) entered disabled state 22:12:04 executing program 5: [ 181.558234] device bridge_slave_0 entered promiscuous mode [ 181.740446] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.745785] IPVS: ftp: loaded support on port[0] = 21 [ 181.746833] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.762235] device bridge_slave_1 entered promiscuous mode [ 181.905334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.057817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.224868] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.239054] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.249341] device bridge_slave_0 entered promiscuous mode [ 182.374479] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.387333] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.395177] device bridge_slave_1 entered promiscuous mode [ 182.481594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.608456] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.630174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.767102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.908686] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.915914] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.923832] device bridge_slave_0 entered promiscuous mode [ 182.985873] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.994870] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.018534] device bridge_slave_0 entered promiscuous mode [ 183.059229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.097085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.114606] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.123978] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.131970] device bridge_slave_1 entered promiscuous mode [ 183.141031] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.163419] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.170975] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.178456] device bridge_slave_1 entered promiscuous mode [ 183.248643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.272266] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.319683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.396222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.412331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.422242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.450287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.554237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.561400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.626522] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.652201] team0: Port device team_slave_0 added [ 183.820245] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.826662] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.847492] device bridge_slave_0 entered promiscuous mode [ 183.866601] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.880143] team0: Port device team_slave_1 added [ 183.891308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.901188] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.914608] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.939465] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.970020] device bridge_slave_0 entered promiscuous mode [ 183.992504] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.001661] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.013088] device bridge_slave_1 entered promiscuous mode [ 184.024051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.049508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.057632] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.089809] team0: Port device team_slave_0 added [ 184.095805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.110950] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.117331] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.144168] device bridge_slave_1 entered promiscuous mode [ 184.158730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.176255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.191623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.201109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.210218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.217839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.234864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.269903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.298561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.310466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.321152] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.328366] team0: Port device team_slave_1 added [ 184.340170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.349220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.356893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.387808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.398799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.413781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.445550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.471210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.483463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.501182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.510521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.559233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.567341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.596051] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.634726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.658194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.686078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.726224] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.740874] team0: Port device team_slave_0 added [ 184.750387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.758312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.832017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.842236] team0: Port device team_slave_0 added [ 184.852312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.865535] team0: Port device team_slave_1 added [ 184.874465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.901692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.935785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.973113] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.990414] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.013759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.024555] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.040302] team0: Port device team_slave_1 added [ 185.045877] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.059853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.079747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.104330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.126460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.150246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.166263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.203103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.238231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.246220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.256073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.280100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.287302] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.301590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.309781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.339607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.359546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.378235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.396456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.410489] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.417717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.440216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.459352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.469923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.490089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.501461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.509856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.529364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.564910] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.591838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.604439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.750800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.759192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.767214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.839025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.854631] team0: Port device team_slave_0 added [ 185.881399] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.888789] team0: Port device team_slave_0 added [ 185.994625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.017331] team0: Port device team_slave_1 added [ 186.034178] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.048205] team0: Port device team_slave_1 added [ 186.097185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.104629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.121730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.160426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.167299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.184755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.233810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.256891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.300284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.311641] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.319231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.327173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.376228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.384425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.393035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.409647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.438160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.480240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.530765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.559445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.567420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.627229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.641840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.683354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.734193] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.740741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.747689] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.754160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.809170] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.831622] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.838038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.844743] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.851145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.861273] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.079117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.086761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.195797] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.202241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.208985] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.215368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.264925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.323627] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.330076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.336770] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.343211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.392266] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.796552] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.803032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.809823] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.816197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.851145] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.091408] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.097944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.104661] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.111098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.125043] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.144125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.161741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.180069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.207710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.802615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.067454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.270422] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.420778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.479841] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.555216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.871957] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 192.881839] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.913378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.921042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.937440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 192.975735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.985183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.056504] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.074382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.229389] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.329666] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.335837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.349403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.376895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.391335] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.581017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.587188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.594672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.651649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.746745] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.857487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.073021] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.149854] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.156046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.165577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.289740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.295932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.305087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.610069] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.784081] 8021q: adding VLAN 0 to HW filter on device team0 22:12:19 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/4\x00') fchmod(r0, 0x0) 22:12:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 22:12:19 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 22:12:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000400)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x2000005) [ 196.383852] kauditd_printk_skb: 9 callbacks suppressed [ 196.383867] audit: type=1804 audit(1545603139.363:31): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir505017015/syzkaller.YnWWeq/2/bus" dev="sda1" ino=16520 res=1 [ 196.463160] audit: type=1804 audit(1545603139.423:32): pid=7539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir505017015/syzkaller.YnWWeq/2/bus" dev="sda1" ino=16520 res=1 [ 196.505845] audit: type=1804 audit(1545603139.473:33): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir505017015/syzkaller.YnWWeq/2/bus" dev="sda1" ino=16520 res=1 22:12:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) [ 196.567703] audit: type=1804 audit(1545603139.483:34): pid=7539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir505017015/syzkaller.YnWWeq/2/bus" dev="sda1" ino=16520 res=1 22:12:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') [ 196.639084] audit: type=1804 audit(1545603139.483:35): pid=7542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir505017015/syzkaller.YnWWeq/2/bus" dev="sda1" ino=16520 res=1 22:12:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') 22:12:19 executing program 2: clone(0x203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0xc408, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") execve(&(0x7f0000000740)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 22:12:19 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='stack\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 22:12:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 22:12:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') 22:12:20 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:12:20 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) 22:12:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) [ 197.720225] binder: 7642:7647 transaction failed 29189/-22, size 0-0 line 2850 [ 197.759053] binder: 7642:7654 transaction failed 29189/-22, size 0-0 line 2850 [ 197.769522] binder: undelivered TRANSACTION_ERROR: 29189 [ 197.774440] binder: 7656:7657 got transaction to context manager from process owning it [ 197.785838] binder: 7656:7657 transaction failed 29201/-22, size 0-0 line 2841 [ 197.796389] binder: BINDER_SET_CONTEXT_MGR already set [ 197.802693] binder: 7656:7657 ioctl 40046207 0 returned -16 [ 197.808803] binder_alloc: 7656: binder_alloc_buf, no vma 22:12:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:20 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) [ 197.815029] binder: 7656:7658 transaction failed 29189/-3, size 0-0 line 2989 [ 197.823091] binder: undelivered TRANSACTION_ERROR: 29201 [ 197.840649] binder: undelivered TRANSACTION_ERROR: 29189 22:12:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) 22:12:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 197.879919] binder: undelivered TRANSACTION_ERROR: 29189 22:12:20 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) [ 197.938518] binder: 7667:7668 got transaction to context manager from process owning it [ 197.946882] binder: 7667:7668 transaction failed 29201/-22, size 0-0 line 2841 22:12:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 197.981779] binder: undelivered TRANSACTION_ERROR: 29201 22:12:21 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 22:12:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:12:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:21 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x7, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11634840000500"], 0x0, 0x0, 0x0}) 22:12:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:21 executing program 3: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) [ 198.539408] binder: 7696:7698 got transaction to invalid handle [ 198.560523] binder: 7696:7698 transaction failed 29201/-22, size 0-0 line 2850 22:12:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 198.599273] binder: 7696:7698 got transaction to invalid handle [ 198.629442] binder: 7696:7698 transaction failed 29201/-22, size 0-0 line 2850 [ 198.636933] binder: undelivered TRANSACTION_ERROR: 29201 22:12:21 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) [ 198.669422] binder: undelivered TRANSACTION_ERROR: 29201 22:12:22 executing program 4: r0 = socket$inet6(0xa, 0x2000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:12:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc04c5349, &(0x7f00000002c0)={0x0, 0x0, 'client0\x00', 0x0, "00100000000000a7", "9e2087e1d89f16d9e0267448bd497248d4bff358891a267d4e53fd4dae0216a5"}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 22:12:22 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:22 executing program 5: 22:12:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:22 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:22 executing program 4: 22:12:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:22 executing program 5: 22:12:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:22 executing program 4: 22:12:22 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa000800450000"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='attr/keycreate\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000000280)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:12:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:22 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x249, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) open(0x0, 0x0, 0x0) socket(0x0, 0x8000000802, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file1\x00', 0xc014, 0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) 22:12:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:22 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 199.944339] hrtimer: interrupt took 60602 ns 22:12:23 executing program 5: 22:12:23 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:23 executing program 4: 22:12:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:23 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 5: 22:12:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 4: 22:12:23 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e262"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:23 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 4: 22:12:23 executing program 5: 22:12:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) 22:12:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') mmap(&(0x7f0000ff6000/0x8000)=nil, 0x8000, 0x0, 0x12, r0, 0x0) 22:12:23 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={'\x02\x00\x81\x00\x7f\x00\x1e\x00 \x00\x8c\xa7\xcc\x99\x175'}) 22:12:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x8008700b, &(0x7f0000000080)) 22:12:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 22:12:23 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="2fe062aa5c2aaaaaaaaaaa0008004500001c00000000973db3f5bac2b1e2620a7c"], 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8955, 0x0) 22:12:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c288060086dd60a1bba900442c00fe8000f9ffffff0000000000000000aafe8000000000000000000000000000aa0620880b0000fcffffff0800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000008e4361670f96a69cabb2b387eabe1078171a"], 0x0) 22:12:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000001d00000000000000bf610000000000008510000002000000bf010000000000009500400000000000150100000000001eb7000000000000009500000000000000"], 0x0}, 0x48) close(r0) 22:12:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:23 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000240)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0, 0xfffffffffffffe8e}, 0x11c) 22:12:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast1, 0x1f}, 0x1c) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:12:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 22:12:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) 22:12:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) [ 201.103284] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 22:12:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl(0xffffffffffffffff, 0x3f, 0x0) getegid() ioctl$RTC_PLL_GET(r0, 0x80207011, 0x0) 22:12:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) [ 201.270878] ================================================================== [ 201.278452] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 201.285039] Write of size 832 at addr ffff8881d1d84bc0 by task syz-executor5/7928 [ 201.292683] [ 201.294315] CPU: 0 PID: 7928 Comm: syz-executor5 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 201.303061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.312416] Call Trace: [ 201.315018] dump_stack+0x244/0x39d [ 201.318658] ? dump_stack_print_info.cold.1+0x20/0x20 [ 201.323854] ? printk+0xa7/0xcf [ 201.327138] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 201.331906] print_address_description.cold.4+0x9/0x1ff [ 201.337275] ? fpstate_init+0x50/0x160 [ 201.341216] kasan_report.cold.5+0x1b/0x39 [ 201.345470] ? fpstate_init+0x50/0x160 [ 201.349384] ? fpstate_init+0x50/0x160 [ 201.353294] check_memory_region+0x13e/0x1b0 [ 201.357712] memset+0x23/0x40 [ 201.360821] fpstate_init+0x50/0x160 [ 201.364604] kvm_arch_vcpu_init+0x3e9/0x870 [ 201.368967] kvm_vcpu_init+0x2fa/0x420 [ 201.372868] ? vcpu_stat_get+0x300/0x300 [ 201.376948] ? kmem_cache_alloc+0x33f/0x730 [ 201.381307] vmx_create_vcpu+0x1b7/0x2695 [ 201.385501] ? perf_trace_sched_process_exec+0x860/0x860 [ 201.390973] ? do_raw_spin_unlock+0xa7/0x330 [ 201.395402] ? vmx_exec_control+0x210/0x210 [ 201.399731] ? kasan_check_write+0x14/0x20 [ 201.404150] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 201.409082] ? futex_wait_queue_me+0x55d/0x840 [ 201.413666] ? wait_for_completion+0x8a0/0x8a0 [ 201.418264] ? print_usage_bug+0xc0/0xc0 [ 201.422340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.427882] ? get_futex_value_locked+0xcb/0xf0 [ 201.432712] kvm_arch_vcpu_create+0xe5/0x220 [ 201.437133] ? kvm_arch_vcpu_free+0x90/0x90 [ 201.441479] kvm_vm_ioctl+0x526/0x2030 [ 201.445378] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 201.450482] ? futex_wait+0x5ec/0xa50 [ 201.454295] ? kvm_unregister_device_ops+0x70/0x70 [ 201.459248] ? mark_held_locks+0x130/0x130 [ 201.463500] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 201.468715] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 201.473831] ? futex_wake+0x304/0x760 [ 201.477650] ? __lock_acquire+0x62f/0x4c20 [ 201.481915] ? mark_held_locks+0x130/0x130 [ 201.486153] ? graph_lock+0x270/0x270 [ 201.489974] ? do_futex+0x249/0x26d0 [ 201.493706] ? rcu_read_unlock_special+0x370/0x370 [ 201.498688] ? find_held_lock+0x36/0x1c0 [ 201.502767] ? __fget+0x4aa/0x740 [ 201.506231] ? lock_downgrade+0x900/0x900 [ 201.510391] ? check_preemption_disabled+0x48/0x280 [ 201.515416] ? kasan_check_read+0x11/0x20 [ 201.519568] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 201.524850] ? rcu_read_unlock_special+0x370/0x370 [ 201.529791] ? __fget+0x4d1/0x740 [ 201.533266] ? ksys_dup3+0x680/0x680 [ 201.536993] ? __might_fault+0x12b/0x1e0 [ 201.541076] ? lock_downgrade+0x900/0x900 [ 201.545232] ? lock_release+0xa00/0xa00 [ 201.549222] ? perf_trace_sched_process_exec+0x860/0x860 [ 201.554687] ? kvm_unregister_device_ops+0x70/0x70 [ 201.559624] do_vfs_ioctl+0x1de/0x1790 [ 201.563530] ? ioctl_preallocate+0x300/0x300 [ 201.567950] ? __fget_light+0x2e9/0x430 [ 201.571952] ? fget_raw+0x20/0x20 [ 201.575415] ? _copy_to_user+0xc8/0x110 [ 201.579397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.579417] ? put_timespec64+0x10f/0x1b0 [ 201.579435] ? nsecs_to_jiffies+0x30/0x30 [ 201.579470] ? do_syscall_64+0x9a/0x820 [ 201.593297] ? do_syscall_64+0x9a/0x820 [ 201.593311] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 201.593331] ? security_file_ioctl+0x94/0xc0 [ 201.610228] ksys_ioctl+0xa9/0xd0 [ 201.613688] __x64_sys_ioctl+0x73/0xb0 [ 201.617561] do_syscall_64+0x1b9/0x820 [ 201.621431] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 201.626782] ? syscall_return_slowpath+0x5e0/0x5e0 [ 201.631701] ? trace_hardirqs_on_caller+0x310/0x310 [ 201.636714] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 201.641718] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 201.648368] ? __switch_to_asm+0x40/0x70 [ 201.652409] ? __switch_to_asm+0x34/0x70 [ 201.656454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.661292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.666464] RIP: 0033:0x457669 [ 201.669638] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.688522] RSP: 002b:00007fd6bc217c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.696221] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 201.703490] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 201.710749] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 201.718014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6bc2186d4 [ 201.725280] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 201.732545] [ 201.734163] Allocated by task 7928: [ 201.737788] save_stack+0x43/0xd0 [ 201.741225] kasan_kmalloc+0xcb/0xd0 [ 201.744922] kasan_slab_alloc+0x12/0x20 [ 201.748881] kmem_cache_alloc+0x130/0x730 [ 201.753016] vmx_create_vcpu+0x110/0x2695 [ 201.757176] kvm_arch_vcpu_create+0xe5/0x220 [ 201.761566] kvm_vm_ioctl+0x526/0x2030 [ 201.765437] do_vfs_ioctl+0x1de/0x1790 [ 201.769321] ksys_ioctl+0xa9/0xd0 [ 201.772757] __x64_sys_ioctl+0x73/0xb0 [ 201.776629] do_syscall_64+0x1b9/0x820 [ 201.780496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.785661] [ 201.787276] Freed by task 0: [ 201.790276] (stack is not available) [ 201.793962] [ 201.795569] The buggy address belongs to the object at ffff8881d1d84b80 [ 201.795569] which belongs to the cache x86_fpu of size 832 [ 201.807863] The buggy address is located 64 bytes inside of [ 201.807863] 832-byte region [ffff8881d1d84b80, ffff8881d1d84ec0) [ 201.819635] The buggy address belongs to the page: [ 201.824572] page:ffffea0007476100 count:1 mapcount:0 mapping:ffff8881d7acb380 index:0x0 [ 201.832712] flags: 0x2fffc0000000200(slab) [ 201.836929] raw: 02fffc0000000200 ffff8881d50bf848 ffff8881d50bf848 ffff8881d7acb380 [ 201.844811] raw: 0000000000000000 ffff8881d1d84040 0000000100000004 0000000000000000 [ 201.852685] page dumped because: kasan: bad access detected [ 201.858372] [ 201.859977] Memory state around the buggy address: [ 201.864901] ffff8881d1d84d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22:12:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00?\x00', {0x2, 0x0, @loopback}}) 22:12:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 22:12:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x5b) [ 201.872288] ffff8881d1d84e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 201.879637] >ffff8881d1d84e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 201.886973] ^ [ 201.892412] ffff8881d1d84f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 201.899750] ffff8881d1d84f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 201.907090] ================================================================== [ 201.914425] Disabling lock debugging due to kernel taint [ 202.004321] Kernel panic - not syncing: panic_on_warn set ... [ 202.010270] CPU: 1 PID: 7928 Comm: syz-executor5 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 202.020149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.027027] kobject: 'loop0' (0000000004805b1f): kobject_uevent_env [ 202.029525] Call Trace: [ 202.029543] dump_stack+0x244/0x39d [ 202.029558] ? dump_stack_print_info.cold.1+0x20/0x20 [ 202.029577] ? fpstate_init+0x30/0x160 [ 202.029596] panic+0x2ad/0x632 [ 202.036012] kobject: 'loop0' (0000000004805b1f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.038582] ? add_taint.cold.5+0x16/0x16 [ 202.068019] ? preempt_schedule+0x4d/0x60 [ 202.068124] kobject: 'loop1' (00000000a8b4a227): kobject_uevent_env [ 202.072173] ? ___preempt_schedule+0x16/0x18 [ 202.072190] ? trace_hardirqs_on+0xb4/0x310 [ 202.072205] ? fpstate_init+0x50/0x160 [ 202.072220] end_report+0x47/0x4f [ 202.072233] kasan_report.cold.5+0xe/0x39 [ 202.072245] ? fpstate_init+0x50/0x160 [ 202.072262] ? fpstate_init+0x50/0x160 [ 202.085044] kobject: 'loop1' (00000000a8b4a227): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 202.087374] check_memory_region+0x13e/0x1b0 [ 202.120419] memset+0x23/0x40 [ 202.123506] fpstate_init+0x50/0x160 [ 202.127200] kvm_arch_vcpu_init+0x3e9/0x870 [ 202.131526] kvm_vcpu_init+0x2fa/0x420 [ 202.135394] ? vcpu_stat_get+0x300/0x300 [ 202.139453] ? kmem_cache_alloc+0x33f/0x730 [ 202.143765] vmx_create_vcpu+0x1b7/0x2695 [ 202.147895] ? perf_trace_sched_process_exec+0x860/0x860 [ 202.153327] ? do_raw_spin_unlock+0xa7/0x330 [ 202.157722] ? vmx_exec_control+0x210/0x210 [ 202.162028] ? kasan_check_write+0x14/0x20 [ 202.166241] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 202.171155] ? futex_wait_queue_me+0x55d/0x840 [ 202.175718] ? wait_for_completion+0x8a0/0x8a0 [ 202.180282] ? print_usage_bug+0xc0/0xc0 [ 202.184326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.189840] ? get_futex_value_locked+0xcb/0xf0 [ 202.194486] kvm_arch_vcpu_create+0xe5/0x220 [ 202.198915] ? kvm_arch_vcpu_free+0x90/0x90 [ 202.203263] kvm_vm_ioctl+0x526/0x2030 [ 202.207129] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 202.212211] ? futex_wait+0x5ec/0xa50 [ 202.215990] ? kvm_unregister_device_ops+0x70/0x70 [ 202.220924] ? mark_held_locks+0x130/0x130 [ 202.225175] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 202.230350] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 202.235431] ? futex_wake+0x304/0x760 [ 202.239215] ? __lock_acquire+0x62f/0x4c20 [ 202.243438] ? mark_held_locks+0x130/0x130 [ 202.247653] ? graph_lock+0x270/0x270 [ 202.251434] ? do_futex+0x249/0x26d0 [ 202.255142] ? rcu_read_unlock_special+0x370/0x370 [ 202.260056] ? find_held_lock+0x36/0x1c0 [ 202.264102] ? __fget+0x4aa/0x740 [ 202.267535] ? lock_downgrade+0x900/0x900 [ 202.271663] ? check_preemption_disabled+0x48/0x280 [ 202.276678] ? kasan_check_read+0x11/0x20 [ 202.280810] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 202.286067] ? rcu_read_unlock_special+0x370/0x370 [ 202.291032] ? __fget+0x4d1/0x740 [ 202.294499] ? ksys_dup3+0x680/0x680 [ 202.298213] ? __might_fault+0x12b/0x1e0 [ 202.302257] ? lock_downgrade+0x900/0x900 [ 202.306406] ? lock_release+0xa00/0xa00 [ 202.310362] ? perf_trace_sched_process_exec+0x860/0x860 [ 202.315833] ? kvm_unregister_device_ops+0x70/0x70 [ 202.320747] do_vfs_ioctl+0x1de/0x1790 [ 202.324624] ? ioctl_preallocate+0x300/0x300 [ 202.329022] ? __fget_light+0x2e9/0x430 [ 202.332977] ? fget_raw+0x20/0x20 [ 202.336414] ? _copy_to_user+0xc8/0x110 [ 202.340372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.345891] ? put_timespec64+0x10f/0x1b0 [ 202.350023] ? nsecs_to_jiffies+0x30/0x30 [ 202.354151] ? do_syscall_64+0x9a/0x820 [ 202.358102] ? do_syscall_64+0x9a/0x820 [ 202.362055] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 202.366632] ? security_file_ioctl+0x94/0xc0 [ 202.371023] ksys_ioctl+0xa9/0xd0 [ 202.374455] __x64_sys_ioctl+0x73/0xb0 [ 202.378317] do_syscall_64+0x1b9/0x820 [ 202.382187] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 202.387533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 202.392445] ? trace_hardirqs_on_caller+0x310/0x310 [ 202.397452] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 202.402453] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 202.409102] ? __switch_to_asm+0x40/0x70 [ 202.413143] ? __switch_to_asm+0x34/0x70 [ 202.417215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.422040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.427211] RIP: 0033:0x457669 [ 202.430384] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.449265] RSP: 002b:00007fd6bc217c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 202.456952] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 202.464243] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 202.471493] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 202.478740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6bc2186d4 [ 202.485988] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 202.494151] Kernel Offset: disabled [ 202.497777] Rebooting in 86400 seconds..