Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. 2019/10/11 16:17:05 fuzzer started 2019/10/11 16:17:07 dialing manager at 10.128.0.105:43913 2019/10/11 16:17:07 syscalls: 2523 2019/10/11 16:17:07 code coverage: enabled 2019/10/11 16:17:07 comparison tracing: enabled 2019/10/11 16:17:07 extra coverage: extra coverage is not supported by the kernel 2019/10/11 16:17:07 setuid sandbox: enabled 2019/10/11 16:17:07 namespace sandbox: enabled 2019/10/11 16:17:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/11 16:17:07 fault injection: enabled 2019/10/11 16:17:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/11 16:17:07 net packet injection: enabled 2019/10/11 16:17:07 net device setup: enabled 2019/10/11 16:17:07 concurrency sanitizer: enabled 16:17:10 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') syzkaller login: [ 58.035120][ T7482] IPVS: ftp: loaded support on port[0] = 21 16:17:10 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) [ 58.133162][ T7482] chnl_net:caif_netlink_parms(): no params data found [ 58.211537][ T7482] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.218731][ T7482] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.226918][ T7482] device bridge_slave_0 entered promiscuous mode [ 58.250513][ T7482] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.257701][ T7482] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.265809][ T7482] device bridge_slave_1 entered promiscuous mode [ 58.314198][ T7482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.340771][ T7482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.375252][ T7482] team0: Port device team_slave_0 added [ 58.383455][ T7482] team0: Port device team_slave_1 added [ 58.405354][ T7485] IPVS: ftp: loaded support on port[0] = 21 [ 58.452856][ T7482] device hsr_slave_0 entered promiscuous mode 16:17:10 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000000001004001003900090035004002060000001900154004000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 58.560142][ T7482] device hsr_slave_1 entered promiscuous mode [ 58.708540][ T7482] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.715678][ T7482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.723105][ T7482] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.730210][ T7482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.826481][ T7487] IPVS: ftp: loaded support on port[0] = 21 16:17:11 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 58.883606][ T7482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.950446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.970250][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.991321][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.012003][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.040126][ T7482] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.083673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.100921][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.108028][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.152202][ T7485] chnl_net:caif_netlink_parms(): no params data found [ 59.171494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 16:17:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) readv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/221, 0xdd}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x3e) recvfrom$unix(r3, 0x0, 0xc6414d055ecebc80, 0x0, 0x0, 0xda) fcntl$setown(r2, 0x8, r1) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000140)) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) [ 59.200359][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.207475][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.269023][ T7482] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.281674][ T7482] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.303719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.315131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.343286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.361794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.382154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.402574][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.430385][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.462080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.480299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.538388][ T7494] IPVS: ftp: loaded support on port[0] = 21 [ 59.551438][ T7482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.561224][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.582948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.625994][ T7485] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.644401][ T7485] bridge0: port 1(bridge_slave_0) entered disabled state 16:17:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2000cf69}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x4}, 0x48) [ 59.670426][ T7485] device bridge_slave_0 entered promiscuous mode [ 59.717567][ T7485] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.729164][ T7485] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.755416][ T7485] device bridge_slave_1 entered promiscuous mode [ 59.797533][ T7499] IPVS: ftp: loaded support on port[0] = 21 [ 59.817184][ T7487] chnl_net:caif_netlink_parms(): no params data found [ 59.837293][ T7485] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.851003][ T7485] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.908494][ T7485] team0: Port device team_slave_0 added [ 59.951244][ T7485] team0: Port device team_slave_1 added [ 59.972352][ T7487] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.998841][ T7487] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.012236][ T7487] device bridge_slave_0 entered promiscuous mode [ 60.023076][ T7487] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.031215][ T7487] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.050813][ T7487] device bridge_slave_1 entered promiscuous mode 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') [ 60.202519][ T7485] device hsr_slave_0 entered promiscuous mode 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') [ 60.269554][ T7485] device hsr_slave_1 entered promiscuous mode [ 60.309211][ T7485] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.336743][ T7487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.361500][ T7487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') [ 60.403961][ T7494] chnl_net:caif_netlink_parms(): no params data found [ 60.413338][ T7507] IPVS: ftp: loaded support on port[0] = 21 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') [ 60.507461][ T7485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.527528][ T7487] team0: Port device team_slave_0 added [ 60.560175][ T7487] team0: Port device team_slave_1 added [ 60.577204][ T7494] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.585338][ T7494] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.595742][ T7494] device bridge_slave_0 entered promiscuous mode [ 60.627551][ T7485] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.655100][ T7494] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.666023][ T7494] bridge0: port 2(bridge_slave_1) entered disabled state 16:17:12 executing program 0: r0 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') [ 60.674841][ T7494] device bridge_slave_1 entered promiscuous mode [ 60.695066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.706657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.777469][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.792712][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.807860][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.815152][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 16:17:13 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1f) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@default, @rose, @default, @netrom, @bcast, @default, @rose, @null]}, 0x48) [ 60.823618][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.833371][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.845221][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.852448][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.861112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.955659][ T7487] device hsr_slave_0 entered promiscuous mode [ 60.989799][ T7487] device hsr_slave_1 entered promiscuous mode [ 61.029223][ T7487] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.038783][ T7494] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.050116][ T7494] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.062337][ T7499] chnl_net:caif_netlink_parms(): no params data found [ 61.120923][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.130404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.140692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.150270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.197267][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.205845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.215924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.224923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.233383][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.242125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.251013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.260901][ T7494] team0: Port device team_slave_0 added [ 61.268285][ T7494] team0: Port device team_slave_1 added [ 61.276842][ T7499] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.284524][ T7499] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.292528][ T7499] device bridge_slave_0 entered promiscuous mode [ 61.321580][ T7485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.344142][ T7499] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.351855][ T7499] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.359823][ T7499] device bridge_slave_1 entered promiscuous mode [ 61.400052][ T7487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.443125][ T7494] device hsr_slave_0 entered promiscuous mode [ 61.489606][ T7494] device hsr_slave_1 entered promiscuous mode [ 61.529377][ T7494] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.548869][ T7499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.569510][ T7487] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.577879][ T7507] chnl_net:caif_netlink_parms(): no params data found [ 61.588663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.596750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.606837][ T7499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.632506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.641997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.650768][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.658766][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.673936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.700713][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.709951][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.718413][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.725614][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.734493][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.744197][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.754591][ T7499] team0: Port device team_slave_0 added [ 61.766295][ T7499] team0: Port device team_slave_1 added [ 61.798479][ T7485] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.810763][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.824630][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.834116][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.922626][ T7499] device hsr_slave_0 entered promiscuous mode [ 61.969625][ T7499] device hsr_slave_1 entered promiscuous mode [ 62.009297][ T7499] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.026962][ T7507] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.034914][ T7507] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.045342][ T7507] device bridge_slave_0 entered promiscuous mode [ 62.055156][ T2660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.065796][ T2660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.083841][ T7507] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.093447][ T7507] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.105078][ T7507] device bridge_slave_1 entered promiscuous mode [ 62.154585][ T7494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.166115][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.188798][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.226802][ T7507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.250748][ T7487] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.262874][ T7487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:17:14 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) [ 62.274227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.300808][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.313022][ T7507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.345411][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.360798][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.371647][ T7494] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.396748][ T7499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.449144][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 62.457820][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.467974][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.477722][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.484828][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.494069][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.503230][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.512534][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.521640][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.530598][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.540061][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.549177][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.557748][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.566801][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.575510][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.591519][ T7487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.613032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.622482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.631735][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.640896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.652145][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.665017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.677820][ T7499] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.690673][ T7507] team0: Port device team_slave_0 added [ 62.697464][ T7494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.707865][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.721679][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.732209][ T7507] team0: Port device team_slave_1 added [ 62.792177][ T7507] device hsr_slave_0 entered promiscuous mode [ 62.839716][ T7507] device hsr_slave_1 entered promiscuous mode [ 62.879256][ T7507] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.910788][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.953779][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.975140][ T7534] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.982690][ T7534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.992940][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.002529][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.013262][ T7534] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.020511][ T7534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.031550][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.043661][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.054389][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.063941][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.074255][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.083381][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.100012][ T7553] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. [ 63.114217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.124420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.134828][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.144379][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:17:15 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000000001004001003900090035004002060000001900154004000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 63.154586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.170474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.185586][ T7499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.231136][ T7494] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.244122][ T7556] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. [ 63.284143][ T7499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.333977][ T7507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.358569][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.372633][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.410465][ T7507] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.449546][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.458409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.488505][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.496291][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.524387][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.542204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.560540][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.567782][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.583395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.593361][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.603541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.613550][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.624202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.634318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.644985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.655342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.666554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.678534][ T7507] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.714296][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.724260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.758010][ T7507] 8021q: adding VLAN 0 to HW filter on device batadv0 16:17:16 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) 16:17:16 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1f) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@default, @rose, @default, @netrom, @bcast, @default, @rose, @null]}, 0x48) 16:17:16 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000000001004001003900090035004002060000001900154004000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 16:17:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) readv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/221, 0xdd}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x3e) recvfrom$unix(r3, 0x0, 0xc6414d055ecebc80, 0x0, 0x0, 0xda) fcntl$setown(r2, 0x8, r1) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000140)) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) 16:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2000cf69}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x4}, 0x48) 16:17:16 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 64.503742][ T7600] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. 16:17:16 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1f) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@default, @rose, @default, @netrom, @bcast, @default, @rose, @null]}, 0x48) 16:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2000cf69}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x4}, 0x48) 16:17:16 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x139, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000000001004001003900090035004002060000001900154004000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 16:17:16 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) 16:17:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) readv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/221, 0xdd}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x3e) recvfrom$unix(r3, 0x0, 0xc6414d055ecebc80, 0x0, 0x0, 0xda) fcntl$setown(r2, 0x8, r1) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000140)) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) [ 64.866835][ T7618] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. 16:17:17 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:17:17 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1f) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@default, @rose, @default, @netrom, @bcast, @default, @rose, @null]}, 0x48) 16:17:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2000cf69}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x4}, 0x48) 16:17:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) readv(r4, &(0x7f0000000180)=[{&(0x7f0000000040)=""/221, 0xdd}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x3e) recvfrom$unix(r3, 0x0, 0xc6414d055ecebc80, 0x0, 0x0, 0xda) fcntl$setown(r2, 0x8, r1) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000140)) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) 16:17:17 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:17:17 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:17:17 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:17:17 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:17:17 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r5, 0x28007d) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000002540)={{0x2, 0x0, @descriptor="46b5961fcd17323e"}}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r6, 0x0, 0x0, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008061fffffff00004006630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000240)=r7) sendfile(r5, r5, 0x0, 0x2008000fffffffe) accept$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 65.748346][ T7661] ================================================================== [ 65.756533][ T7661] BUG: KCSAN: data-race in xas_clear_mark / xas_find_marked [ 65.767217][ T7661] [ 65.771088][ T7661] write to 0xffff8881221e2d70 of 8 bytes by interrupt on cpu 1: [ 65.781195][ T7661] xas_clear_mark+0x11a/0x1d0 [ 65.785904][ T7661] __xa_clear_mark+0xd3/0x100 [ 65.790606][ T7661] test_clear_page_writeback+0x435/0x780 [ 65.796535][ T7661] end_page_writeback+0x9e/0x190 [ 65.803310][ T7661] ext4_finish_bio+0x40d/0x520 [ 65.808086][ T7661] ext4_end_bio+0xd2/0x310 [ 65.812596][ T7661] bio_endio+0x3ab/0x500 [ 65.816929][ T7661] blk_update_request+0x21d/0x6a0 [ 65.821964][ T7661] scsi_end_request+0x6b/0x3e0 [ 65.827018][ T7661] scsi_io_completion+0x11d/0xc80 [ 65.832232][ T7661] scsi_finish_command+0x280/0x380 [ 65.837659][ T7661] scsi_softirq_done+0x259/0x280 [ 65.844668][ T7661] blk_done_softirq+0x1eb/0x250 [ 65.850427][ T7661] __do_softirq+0x115/0x33f [ 65.857007][ T7661] irq_exit+0xbb/0xe0 [ 65.860978][ T7661] [ 65.863343][ T7661] read to 0xffff8881221e2d70 of 8 bytes by task 7661 on cpu 0: [ 65.871566][ T7661] xas_find_marked+0x17a/0x7b0 [ 65.876342][ T7661] find_get_pages_range_tag+0x114/0x6d0 [ 65.882014][ T7661] pagevec_lookup_range_tag+0x45/0x70 [ 65.887401][ T7661] __filemap_fdatawait_range+0xdc/0x1d0 [ 65.892950][ T7661] file_write_and_wait_range+0xc9/0xf0 [ 65.898453][ T7661] __generic_file_fsync+0x59/0x190 [ 65.903571][ T7661] ext4_sync_file+0x48e/0xb00 [ 65.908250][ T7661] vfs_fsync_range+0x82/0x150 [ 65.913043][ T7661] ext4_file_write_iter+0x50a/0xa40 [ 65.918349][ T7661] do_iter_readv_writev+0x487/0x5b0 [ 65.923560][ T7661] do_iter_write+0x13b/0x3c0 [ 65.928456][ T7661] vfs_iter_write+0x5c/0x80 [ 65.932964][ T7661] iter_file_splice_write+0x4c0/0x7f0 [ 65.938360][ T7661] [ 65.940706][ T7661] Reported by Kernel Concurrency Sanitizer on: [ 65.946971][ T7661] CPU: 0 PID: 7661 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 65.954463][ T7661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.964601][ T7661] ================================================================== [ 65.972689][ T7661] Kernel panic - not syncing: panic_on_warn set ... [ 65.979313][ T7661] CPU: 0 PID: 7661 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 65.986947][ T7661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.997001][ T7661] Call Trace: [ 66.000308][ T7661] dump_stack+0xf5/0x159 [ 66.004630][ T7661] panic+0x209/0x639 [ 66.008633][ T7661] ? ext4_file_write_iter+0x50a/0xa40 [ 66.014021][ T7661] ? vprintk_func+0x8d/0x140 [ 66.018636][ T7661] kcsan_report.cold+0xc/0x1b [ 66.023395][ T7661] __kcsan_setup_watchpoint+0x3ee/0x510 [ 66.029130][ T7661] ? __schedule+0x2ed/0x5d0 [ 66.033643][ T7661] __tsan_read8+0x2c/0x30 [ 66.038008][ T7661] xas_find_marked+0x17a/0x7b0 [ 66.042802][ T7661] find_get_pages_range_tag+0x114/0x6d0 [ 66.048370][ T7661] pagevec_lookup_range_tag+0x45/0x70 [ 66.053858][ T7661] __filemap_fdatawait_range+0xdc/0x1d0 [ 66.059547][ T7661] file_write_and_wait_range+0xc9/0xf0 [ 66.065047][ T7661] __generic_file_fsync+0x59/0x190 [ 66.070362][ T7661] ext4_sync_file+0x48e/0xb00 [ 66.075066][ T7661] ? __read_once_size.constprop.0+0x20/0x20 [ 66.080989][ T7661] ? __read_once_size.constprop.0+0x20/0x20 [ 66.087042][ T7661] vfs_fsync_range+0x82/0x150 [ 66.091835][ T7661] ext4_file_write_iter+0x50a/0xa40 [ 66.097047][ T7661] ? __tsan_read8+0x2c/0x30 [ 66.101649][ T7661] do_iter_readv_writev+0x487/0x5b0 [ 66.106881][ T7661] ? security_file_permission+0x88/0x280 [ 66.112557][ T7661] do_iter_write+0x13b/0x3c0 [ 66.117205][ T7661] ? __kcsan_setup_watchpoint+0x96/0x510 [ 66.123114][ T7661] ? __kcsan_setup_watchpoint+0x96/0x510 [ 66.128813][ T7661] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 66.135178][ T7661] vfs_iter_write+0x5c/0x80 [ 66.139709][ T7661] iter_file_splice_write+0x4c0/0x7f0 [ 66.145250][ T7661] ? page_cache_pipe_buf_release+0x100/0x100 [ 66.151298][ T7661] direct_splice_actor+0xa0/0xc0 [ 66.156258][ T7661] splice_direct_to_actor+0x215/0x510 [ 66.161676][ T7661] ? generic_pipe_buf_nosteal+0x20/0x20 [ 66.167452][ T7661] do_splice_direct+0x161/0x1e0 [ 66.172332][ T7661] do_sendfile+0x384/0x7f0 [ 66.177274][ T7661] __x64_sys_sendfile64+0x12a/0x140 [ 66.182705][ T7661] do_syscall_64+0xcf/0x2f0 [ 66.187235][ T7661] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.193230][ T7661] RIP: 0033:0x459a59 [ 66.197186][ T7661] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 66.217157][ T7661] RSP: 002b:00007f9c1e076c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 66.225721][ T7661] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 66.233707][ T7661] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 66.241754][ T7661] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 66.250024][ T7661] R10: 02008000fffffffe R11: 0000000000000246 R12: 00007f9c1e0776d4 [ 66.258066][ T7661] R13: 00000000004c748b R14: 00000000004dd038 R15: 00000000ffffffff [ 66.267458][ T7661] Kernel Offset: disabled [ 66.272049][ T7661] Rebooting in 86400 seconds..