Warning: Permanently added '10.128.0.214' (ECDSA) to the list of known hosts. 2019/05/01 07:14:35 fuzzer started 2019/05/01 07:14:38 dialing manager at 10.128.0.26:34869 2019/05/01 07:14:38 syscalls: 2440 2019/05/01 07:14:38 code coverage: enabled 2019/05/01 07:14:38 comparison tracing: enabled 2019/05/01 07:14:38 extra coverage: extra coverage is not supported by the kernel 2019/05/01 07:14:38 setuid sandbox: enabled 2019/05/01 07:14:38 namespace sandbox: enabled 2019/05/01 07:14:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 07:14:38 fault injection: enabled 2019/05/01 07:14:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 07:14:38 net packet injection: enabled 2019/05/01 07:14:38 net device setup: enabled 07:16:05 executing program 0: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000002c0)={"15b6a65627204f0de725ac19bfa70bc0b9646a0c1c9dd317385f03e5e432b280f3dede6b0be37ead825f0f7590063b2576a049425c76e5162ae732f7bed86eafb5e103df2cf09b2325606e94f0329e009b55c8aa4bde43c4f5f875dfede3211c64a201ea216f56fd9eb938146119a930736addac8f336bd7d0de509a5252c8d9dd6ee31e4d9a36d173e489a64056a956370bae97a1ab8c7c4b3ba66518f337ee6fa0a7f8a809a6cb72959b4a54003e68f8d92124a39b4b5187eaf66cfe074ecb8858550738f63d54416ad777887435b28cf50fb44b7678858b936ad4aefb9d6cda12b874d4d74d2740fa1928350607a80b13bd76b5516a00e95bb5241f80ebdf33a0f79e1b683ce589a66b8a058d7532b452ab77f2bd2072c73c127fe4ddcfce12b1d931ca9c8fecfd69a12467e3befe1a66fc83646f657f17785cac6563e90e1d2b1a3133e8b4d10191fe0d63a81cfc31dd3a59777b864bf3f622e80d2d409a66a4b4a097b8868a343326357cc7a820f9cc2e6009b3c6ab8eba76d30e1dcc390cc504f518c22698f894ebced8d9edc50637f88f6819c8e6e73a42de502a42e2b40883eb1378027e5cfddf11447526128f7f1ebc7e24217a229fa45a6c0a843f05a0bd69192faeebec46dbaf7eb3da007ca35dbca779602a21bc2b74dbe18bf5e1c738dc77f897df26bcf174a6dab689141cef3df9e6dd33385fbc64b101b4cd427e4cb2dec0832446fcf9888759f3a1f5c99deef52eccfdb76e26be19a1b6fb9df591f803cd2fb16a560d81cd888b09ffc99322ef94651b04885744c15716c6c66000094aa890ed8b4cfd425d15495eba566affd57b740f0dc085e5166e4932b3d7346179c6886d709f10e19019edf9fed1b0d03e6bd0bee938190a672e489bfed73739448761480a9e2f06da4a4342d95507616cfed850802a8baaa74789a3a60917247f043ded4755ce3211ef2add377db2cec9563df776d2dcccf465928bb490693f2bd522bf345bb30574163af7a9e34c4d9c85077eca3ce12d02478cb86e60c1aa57dd4ad40faa626bca8437c200905eda870474e31bcd220968ddc8252abc1497469fb150c8d3aa1064f069ada663a2f04d29120b0e3c69f890d6247cfa4bd1d5e533820e688fe6af334e5343f1acaadc6e7b52ba44d52bbc7c6bf4651bb73e67f93cbca6161eb08c4ac90022da83d6b65ab5a97a4941711dc249f57cfeb1f486671261feb6784a8a738ca1fe845e4f271f9a394fa9821ef4be60e700abd8027a6dcd57cd288b5c81ed262c6202fb5b9ca8a90778c0674a956ac358616ef3873a4a20d0d9e27e38ef52c443ba80e0638e9f064f30e4693ddc6051899182ec1e498750e1722b9c0759939d868b57e3f173f3f180b07aaa2ec223414f47bdaed86510c21eff12b50aba07f00c93ef66ef29c31fc3310e5188b3950d66ec"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 139.690227][ T7754] IPVS: ftp: loaded support on port[0] = 21 07:16:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f083c123ffb9ad070") r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x1000, 0x0) poll(&(0x7f0000000340)=[{r1, 0x80000000000002fe}], 0x1, 0x0) [ 139.832449][ T7754] chnl_net:caif_netlink_parms(): no params data found [ 139.909902][ T7757] IPVS: ftp: loaded support on port[0] = 21 [ 139.914513][ T7754] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.924392][ T7754] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.932754][ T7754] device bridge_slave_0 entered promiscuous mode [ 139.944129][ T7754] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.951318][ T7754] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.960540][ T7754] device bridge_slave_1 entered promiscuous mode [ 139.986346][ T7754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 140.002059][ T7754] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:16:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="c4c1d515500067490fc70e473d5278be20c42239bbacb600000021f00fbb0765660ff408c4814c59366626c17b0001f2a52666447a05") syz_execute_func(&(0x7f0000000000)="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") [ 140.032471][ T7754] team0: Port device team_slave_0 added [ 140.042667][ T7754] team0: Port device team_slave_1 added [ 140.115994][ T7754] device hsr_slave_0 entered promiscuous mode [ 140.183476][ T7754] device hsr_slave_1 entered promiscuous mode 07:16:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 140.280415][ T7759] IPVS: ftp: loaded support on port[0] = 21 [ 140.350792][ T7754] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.358184][ T7754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.366098][ T7754] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.373217][ T7754] bridge0: port 1(bridge_slave_0) entered forwarding state 07:16:05 executing program 4: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0x0, 0x0) faccessat(r0, &(0x7f000003b000)='./control\x00', 0x2, 0x0) [ 140.510797][ T7757] chnl_net:caif_netlink_parms(): no params data found [ 140.585527][ T7764] IPVS: ftp: loaded support on port[0] = 21 [ 140.598765][ T7754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.673622][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.674981][ T7765] IPVS: ftp: loaded support on port[0] = 21 [ 140.692269][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.713564][ T5] bridge0: port 2(bridge_slave_1) entered disabled state 07:16:06 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) [ 140.722626][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 140.740374][ T7754] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.803766][ T7759] chnl_net:caif_netlink_parms(): no params data found [ 140.812581][ T7757] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.820955][ T7757] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.829612][ T7757] device bridge_slave_0 entered promiscuous mode [ 140.858749][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.870175][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.879125][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.886370][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.895635][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.904560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.915382][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.922519][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.936956][ T7757] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.944170][ T7757] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.951955][ T7757] device bridge_slave_1 entered promiscuous mode [ 140.976605][ T7771] IPVS: ftp: loaded support on port[0] = 21 [ 141.001877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.029614][ T7759] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.037391][ T7759] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.045699][ T7759] device bridge_slave_0 entered promiscuous mode [ 141.054396][ T7759] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.061454][ T7759] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.069538][ T7759] device bridge_slave_1 entered promiscuous mode [ 141.079451][ T7757] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.109107][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.122896][ T7757] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.151436][ T7759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.207092][ T7759] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.225485][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.234578][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.242959][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.252578][ T7757] team0: Port device team_slave_0 added [ 141.298442][ T7759] team0: Port device team_slave_0 added [ 141.309123][ T7759] team0: Port device team_slave_1 added [ 141.316184][ T7757] team0: Port device team_slave_1 added [ 141.322475][ T7765] chnl_net:caif_netlink_parms(): no params data found [ 141.341444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.350624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.379474][ T7764] chnl_net:caif_netlink_parms(): no params data found [ 141.445016][ T7759] device hsr_slave_0 entered promiscuous mode [ 141.503695][ T7759] device hsr_slave_1 entered promiscuous mode [ 141.626063][ T7757] device hsr_slave_0 entered promiscuous mode [ 141.683543][ T7757] device hsr_slave_1 entered promiscuous mode [ 141.746113][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.754994][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.811868][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.819543][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.827659][ T7764] device bridge_slave_0 entered promiscuous mode [ 141.841268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.849599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.858290][ T7765] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.866016][ T7765] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.875339][ T7765] device bridge_slave_0 entered promiscuous mode [ 141.883301][ T7765] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.890356][ T7765] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.898143][ T7765] device bridge_slave_1 entered promiscuous mode [ 141.906604][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.914198][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.921842][ T7764] device bridge_slave_1 entered promiscuous mode [ 141.942682][ T7764] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 141.954554][ T7764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 141.999757][ T7754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 142.036122][ T7771] chnl_net:caif_netlink_parms(): no params data found [ 142.046943][ T7764] team0: Port device team_slave_0 added [ 142.057803][ T7765] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.068635][ T7765] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.087106][ T7764] team0: Port device team_slave_1 added [ 142.179502][ T7754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.195241][ T7765] team0: Port device team_slave_0 added [ 142.201654][ T7771] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.210231][ T7771] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.218444][ T7771] device bridge_slave_0 entered promiscuous mode [ 142.231403][ T7771] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.238914][ T7771] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.246810][ T7771] device bridge_slave_1 entered promiscuous mode [ 142.305406][ T7764] device hsr_slave_0 entered promiscuous mode [ 142.353602][ T7764] device hsr_slave_1 entered promiscuous mode [ 142.394459][ T7765] team0: Port device team_slave_1 added [ 142.419448][ T7771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.430358][ T7771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.516211][ T7765] device hsr_slave_0 entered promiscuous mode [ 142.554363][ T7765] device hsr_slave_1 entered promiscuous mode [ 142.639486][ T7757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.671146][ T7771] team0: Port device team_slave_0 added [ 142.678956][ T7771] team0: Port device team_slave_1 added [ 142.701532][ T7759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 142.726841][ T7782] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 142.756637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.769404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:16:08 executing program 0: [ 142.797360][ T7757] 8021q: adding VLAN 0 to HW filter on device team0 07:16:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) close(0xffffffffffffffff) 07:16:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) close(0xffffffffffffffff) [ 142.886781][ T7771] device hsr_slave_0 entered promiscuous mode 07:16:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) close(0xffffffffffffffff) 07:16:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) close(0xffffffffffffffff) [ 142.933579][ T7771] device hsr_slave_1 entered promiscuous mode [ 142.987885][ T7765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.010823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 143.025918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 07:16:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:08 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) [ 143.035033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.042977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.073646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.089827][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.097011][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.115259][ T7759] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.137747][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.146101][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.164649][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.173983][ T7761] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.181158][ T7761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.188775][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.197322][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.218302][ T7765] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.236363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.244642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.252221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.261344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.269826][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.277023][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.285164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.294506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.302769][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.309877][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.317480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.346982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.357156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.365987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.377988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.386615][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.393722][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.401272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.410434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.419055][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.427789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.436411][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.443513][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.451061][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.460246][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.468580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.477515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.487193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.496769][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.505630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.514228][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.522243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.535078][ T7757] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.547312][ T7757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.560426][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.569080][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.577815][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.588140][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.603494][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 143.612330][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 143.622251][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 143.631225][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 143.640285][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 143.659027][ T7765] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 143.670006][ T7765] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.686838][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.696715][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.705736][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.714921][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.723469][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 143.731964][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 143.740797][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.764097][ T7757] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.776405][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.790113][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.813674][ T7759] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 143.826058][ T7759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 143.836242][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.845037][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.856021][ T7771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.865860][ T7764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.879157][ T7765] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.911443][ T7771] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.919707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.928213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.937679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.945652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.979377][ T7759] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.005623][ T7764] 8021q: adding VLAN 0 to HW filter on device team0 07:16:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x63, 0x0) [ 144.034570][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.056817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.076028][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.083172][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.099660][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.108324][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.117183][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.124395][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.132100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.141382][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.150098][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.157201][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.165565][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.174522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.182975][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.190083][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.198352][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.206424][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.235800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.270899][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.291320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.300925][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.315670][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.328540][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.337881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.348951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.357629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.367329][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.388410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.399344][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.412256][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.421522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.435005][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.443677][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.451936][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.460840][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.479242][ T7764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 144.521442][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.535939][ T7771] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 144.547744][ T7771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.558676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.570112][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.581627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.595886][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.615931][ C1] hrtimer: interrupt took 46065 ns [ 144.641693][ T7771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 144.658170][ T7764] 8021q: adding VLAN 0 to HW filter on device batadv0 07:16:10 executing program 2: 07:16:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:10 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:10 executing program 4: pause() syz_execute_func(&(0x7f0000000340)="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") 07:16:10 executing program 1: pause() syz_execute_func(&(0x7f0000000c40)="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") 07:16:10 executing program 5: 07:16:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 07:16:10 executing program 0: setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:10 executing program 5: request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\a', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) 07:16:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:10 executing program 5: semget(0x2, 0x6, 0x600) 07:16:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='rdma.max\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 07:16:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 07:16:11 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:11 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="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") 07:16:11 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 07:16:11 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0xeb) recvfrom(r0, 0x0, 0x0, 0x2002, 0x0, 0x0) 07:16:11 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)={0x3}, 0x8) 07:16:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:11 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0x0) 07:16:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, 0x0, 0x0) 07:16:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) 07:16:11 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:12 executing program 5: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2baaf9f027dd689c4135f8ba5acc391f3f907d004eb4127893a8ad387b4c0c32112c8bc18dd87a8b04f3bd43cd4e0689"], 0x30}, 0x0) 07:16:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, 0x0, 0x0) 07:16:12 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local, @local, {[], @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:16:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:12 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="44d9ee4a2ae92cc0b64c0f05be03004000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f450f2f02c421dd589fc4e10bf8c426f2f045f6196462bfffffffff0252262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53af6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f8a6465b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c4e3295e4c3dc8a3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) [ 146.708106][ T7988] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0xd 07:16:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfff, 0x1) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x10) fcntl$dupfd(r0, 0x406, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x40000) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20008080) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0xf7d016f7) sendmsg$xdp(r4, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) rseq(0x0, 0x0, 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000100)='system_u:object_r:devicekit_var_lib_t:s0\x00', 0x29, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) prctl$PR_GET_THP_DISABLE(0x2a) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x100000001) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000600)={0x0, 0x9}, &(0x7f0000000640)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000340)={0x0, 0x2}, 0x8) 07:16:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, 0x0, 0x0) 07:16:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100), 0x8) 07:16:12 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") [ 146.895723][ T7988] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0xd 07:16:12 executing program 4: futex(&(0x7f0000000000)=0x1, 0x8b, 0x1, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) 07:16:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) 07:16:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000180)) 07:16:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100), 0x8) 07:16:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:12 executing program 4: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x2200) prctl$PR_GET_CHILD_SUBREAPER(0x25) 07:16:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000100), 0x8) 07:16:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:13 executing program 5: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) keyctl$session_to_parent(0x12) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 07:16:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:13 executing program 4: pause() syz_execute_func(&(0x7f0000000940)="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") 07:16:13 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") 07:16:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) 07:16:13 executing program 5: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) keyctl$session_to_parent(0x12) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 07:16:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:13 executing program 5: syz_execute_func(&(0x7f00000008c0)="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") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) syz_execute_func(&(0x7f00000004c0)="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") [ 148.385801][ T8074] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 148.431557][ T8075] deprecated_sysctl_warning: 1 callbacks suppressed [ 148.431565][ T8075] warning: process `syz-executor.5' used the deprecated sysctl system call with 07:16:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:14 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") 07:16:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f083c123ffb9ad070") r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x1000, 0x0) poll(&(0x7f0000000080)=[{r1, 0x400000000002fe}], 0x1, 0xfffffffffffffffe) 07:16:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:14 executing program 0: syz_execute_func(&(0x7f0000000000)="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") 07:16:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/215, 0xd7}}], 0x1, 0x0, 0x0) r1 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, 0x0, &(0x7f0000006540)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) 07:16:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r1) 07:16:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 07:16:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:14 executing program 4: syz_execute_func(&(0x7f0000001380)="4a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e3292221322131dd919dec4c6c100dc55b1e617c980008080e2859ed23c788fe97c810f69e08f4cbec5c4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7ab86c4213e537700c4e13ddadf497dbf82355901d95901d9b20f68803000000056f20fbd63c366410ffe3a168728ea0ff341ab00fe8f08e4a25600b1355809580900000081660fdf53098f49609a56c402795837c4027d78d3dee450c1f041fe02d134e146dec43b7d0fe4e4f4c462fd982c7bca30cac4017a7fc3bb3cbb3c0209912af3430f47bb00000000000045dc0f845000f04781ae00100000f10000002e470fae8012000000c8003a3a10dd4805dfdf63a5b76e0b0ba17ae64295589cffffc3c4c27197a8820000004577cb0c0ce42ec4400d0008000066400f01f902020606b274c4410ff9720d838f09e89a5b00ddfafa485c835e2ec4c44281a806c44115638b0c0000002cb18374fb0a07c40155f64e0666460fddc7eced36660f38058b97619236c421c96b82e26263209797c7910002c1045c0b47cc47cc66420f1a436e2ef246e16d44800170bb00004242fbc9880c00c461b016a7df6900003422") syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000bc0)="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") 07:16:14 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:14 executing program 0: syz_execute_func(&(0x7f0000000000)="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") 07:16:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r1) 07:16:15 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:15 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r1) 07:16:15 executing program 0: syz_execute_func(&(0x7f0000000000)="984a2ae92c18964c0f05bf1c000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e704ecdcda2660f38346800c4e3295d4c3d2a147c7cc104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131b83a00a2f1fbfb3b62") 07:16:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:15 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:15 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0xc01) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xe665, 0x5}, 0x1, 0x4, 0xfffffffffffffff7, {0x0, 0x2000000}, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000002, 0x0) 07:16:15 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:15 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:15 executing program 5: removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) 07:16:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:15 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:15 executing program 5: removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:16 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0xc01) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xe665, 0x5}, 0x1, 0x4, 0xfffffffffffffff7, {0x0, 0x2000000}, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000002, 0x0) 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100), 0x8) close(0xffffffffffffffff) close(r1) 07:16:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:16 executing program 5: removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:16 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="984a2ae92c18964c0f05bf1c000000c4a37bf0c50341e2e9c422e9aabb3c0000004a0fc7a4ea70db00000f383a9e020000000f0d204ec6c4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f61964620f42d25d2f262e2e66450f7d64c60865f2ad3a0065f20f7cd8efa1a12ad764d38f53efc4211de34f006766f2ab440fec3f66f3adc462b1f72ec3c489309294d8d8000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e704ecdcda2660f38346800c4e3295d4c3d2a147c7cc104b05c7d75c4426507af0f0000000f5fd25cf3460f2aabeeee0f7ba5a9a50000ffff660f79ca553131b83a00a2f1fbfb3b62") 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100), 0x8) close(0xffffffffffffffff) close(r1) 07:16:16 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0xc01) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xe665, 0x5}, 0x1, 0x4, 0xfffffffffffffff7, {0x0, 0x2000000}, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000002, 0x0) 07:16:16 executing program 5: mkdir(0x0, 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:16 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100), 0x8) close(0xffffffffffffffff) close(r1) 07:16:16 executing program 5: mkdir(0x0, 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:16 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0xc01) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xe665, 0x5}, 0x1, 0x4, 0xfffffffffffffff7, {0x0, 0x2000000}, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000002, 0x0) 07:16:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:16:16 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f00000003c0)="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") mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) 07:16:16 executing program 5: mkdir(0x0, 0xfffffffffffffffe) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', 'system.posix_acl_access\x00'}) 07:16:16 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8001, 0xc01) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xe665, 0x5}, 0x1, 0x4, 0xfffffffffffffff7, {0x0, 0x2000000}, 0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000002, 0x0) 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) [ 151.197750][ T8253] kasan: CONFIG_KASAN_INLINE enabled [ 151.203399][ T8253] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 151.211575][ T8253] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 151.211597][ T3876] kobject: 'loop3' (00000000471d92e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 151.218610][ T8253] CPU: 1 PID: 8253 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190430 #33 [ 151.218617][ T8253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) [ 151.218637][ T8253] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 151.218651][ T8253] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 151.218665][ T8253] RSP: 0018:ffff88805e30fa00 EFLAGS: 00010006 [ 151.279506][ T8253] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a424000 [ 151.287503][ T8253] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 07:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100), 0x8) close(r2) close(r1) [ 151.295586][ T8253] RBP: ffff88805e30fb10 R08: ffff88808a504240 R09: ffffed1015d26be0 [ 151.303660][ T8253] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff88805e1882ac [ 151.311729][ T8253] R13: 0000000000000000 R14: ffff88805e1882b0 R15: ffff88805e188280 [ 151.319992][ T8253] FS: 00007fd6f54e7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 151.325215][ T3876] kobject: 'loop5' (000000004148c3fa): kobject_uevent_env [ 151.328927][ T8253] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.328934][ T8253] CR2: 0000000000a5048d CR3: 0000000093b0d000 CR4: 00000000001426e0 [ 151.328943][ T8253] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.328950][ T8253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.328954][ T8253] Call Trace: [ 151.328977][ T8253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 151.328991][ T8253] ? emulator_read_emulated+0x50/0x50 [ 151.329010][ T8253] ? retint_kernel+0x2b/0x2b [ 151.329024][ T8253] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 151.329039][ T8253] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 151.329052][ T8253] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 151.329066][ T8253] kvm_vcpu_ioctl+0x4dc/0xf90 [ 151.329083][ T8253] ? kvm_set_memory_region+0x50/0x50 [ 151.348916][ T3876] kobject: 'loop5' (000000004148c3fa): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 151.350835][ T8253] ? tomoyo_path_number_perm+0x263/0x520 [ 151.350857][ T8253] ? trace_hardirqs_on_caller+0x6a/0x220 [ 151.377582][ T3876] kobject: 'loop3' (00000000471d92e2): kobject_uevent_env [ 151.381076][ T8253] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 151.381091][ T8253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 151.381113][ T8253] ? __fget+0x35a/0x550 [ 151.400594][ T3876] kobject: 'loop3' (00000000471d92e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 151.403222][ T8253] ? kvm_set_memory_region+0x50/0x50 [ 151.403239][ T8253] do_vfs_ioctl+0xd6e/0x1390 [ 151.403254][ T8253] ? ioctl_preallocate+0x210/0x210 [ 151.403273][ T8253] ? __fget+0x381/0x550 [ 151.487140][ T8253] ? ksys_dup3+0x3e0/0x3e0 [ 151.491563][ T8253] ? nsecs_to_jiffies+0x30/0x30 [ 151.496522][ T8253] ? tomoyo_file_ioctl+0x23/0x30 [ 151.501472][ T8253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.503338][ T3876] kobject: 'loop1' (00000000a0b8b02c): kobject_uevent_env [ 151.507728][ T8253] ? security_file_ioctl+0x93/0xc0 [ 151.507745][ T8253] ksys_ioctl+0xab/0xd0 [ 151.507764][ T8253] __x64_sys_ioctl+0x73/0xb0 [ 151.516447][ T3876] kobject: 'loop1' (00000000a0b8b02c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 151.519964][ T8253] do_syscall_64+0x103/0x670 [ 151.519986][ T8253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.520002][ T8253] RIP: 0033:0x458da9 [ 151.553384][ T8253] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.555369][ T3876] kobject: 'loop5' (000000004148c3fa): kobject_uevent_env [ 151.572997][ T8253] RSP: 002b:00007fd6f54e6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 151.573010][ T8253] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 151.573017][ T8253] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 151.573024][ T8253] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 151.573031][ T8253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6f54e76d4 [ 151.573037][ T8253] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 151.573047][ T8253] Modules linked in: [ 151.573065][ T8253] ---[ end trace 67d7f29ad13dc31f ]--- [ 151.581771][ T3876] kobject: 'loop5' (000000004148c3fa): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 151.588673][ T8253] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 151.588687][ T8253] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 151.588693][ T8253] RSP: 0018:ffff88805e30fa00 EFLAGS: 00010006 [ 151.588702][ T8253] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a424000 [ 151.588709][ T8253] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 151.588723][ T8253] RBP: ffff88805e30fb10 R08: ffff88808a504240 R09: ffffed1015d26be0 [ 151.704292][ T8253] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff88805e1882ac [ 151.712258][ T8253] R13: 0000000000000000 R14: ffff88805e1882b0 R15: ffff88805e188280 [ 151.720234][ T8253] FS: 00007fd6f54e7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 151.729334][ T8253] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.735904][ T8253] CR2: 0000000000a5048d CR3: 0000000093b0d000 CR4: 00000000001426e0 [ 151.743877][ T8253] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.751858][ T8253] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.759836][ T8253] Kernel panic - not syncing: Fatal exception [ 151.767407][ T8253] Kernel Offset: disabled [ 151.771833][ T8253] Rebooting in 86400 seconds..