Warning: Permanently added '10.128.15.221' (ECDSA) to the list of known hosts. 2018/12/24 21:39:53 fuzzer started 2018/12/24 21:39:57 dialing manager at 10.128.0.26:36901 [ 112.830272] ld (11576) used greatest stack depth: 53720 bytes left 2018/12/24 21:39:57 syscalls: 1 2018/12/24 21:39:57 code coverage: enabled 2018/12/24 21:39:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/24 21:39:57 setuid sandbox: enabled 2018/12/24 21:39:57 namespace sandbox: enabled 2018/12/24 21:39:57 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/24 21:39:57 fault injection: enabled 2018/12/24 21:39:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/24 21:39:57 net packet injection: enabled 2018/12/24 21:39:57 net device setup: enabled 21:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0), 0x8) [ 297.906998] IPVS: ftp: loaded support on port[0] = 21 [ 299.274734] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.281289] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.289755] device bridge_slave_0 entered promiscuous mode [ 299.381643] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.388176] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.396492] device bridge_slave_1 entered promiscuous mode [ 299.477193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 299.557366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 299.808084] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 299.893862] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 299.978290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 299.985363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.069862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 300.076917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 300.329591] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 300.338360] team0: Port device team_slave_0 added [ 300.420024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 300.428735] team0: Port device team_slave_1 added [ 300.510719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.599575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.684733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.692446] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.701858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:43:05 executing program 1: r0 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz'}, &(0x7f00000002c0), 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r0, 0x40, 0xfffffffffffffff7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e24, @loopback}, {0x6, @local}, 0x6a, {0x2, 0x4e21, @broadcast}, 'bcsh0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r2, 0x0, 0x0) close(r2) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x801, 0x0) io_setup(0xc01, &(0x7f0000000480)=0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000100)={0x101, 0x408000000, 0x0, 0x6, 0x1}) io_submit(r4, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000140), 0x2}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r6, r6, 0x80000) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet(0x10, 0x3, 0x0) preadv(r5, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000140)=""/164, 0xa4}, {&(0x7f0000000280)=""/93, 0x5d}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000300)=""/61, 0x3d}, {&(0x7f0000000340)=""/184, 0xb8}, {&(0x7f0000000400)=""/210, 0xd2}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f0000000540)=""/245, 0xf5}], 0x9, 0x4d) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) sendmsg(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000200)="240000005e0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 300.787487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.795192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.804471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.223355] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.229969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.237208] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.243794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.253016] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.259511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.446465] IPVS: ftp: loaded support on port[0] = 21 [ 304.786323] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.793017] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.801298] device bridge_slave_0 entered promiscuous mode [ 304.918362] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.924988] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.933363] device bridge_slave_1 entered promiscuous mode [ 305.047346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 305.173353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x8}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) pwritev(r1, &(0x7f0000002480)=[{&(0x7f00000000c0), 0x166}], 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) [ 305.613576] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 305.789216] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 306.174737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 306.181818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 306.685974] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 306.694677] team0: Port device team_slave_0 added [ 306.799555] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 306.808202] team0: Port device team_slave_1 added [ 307.009955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.201329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 307.209015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.218041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.288027] IPVS: ftp: loaded support on port[0] = 21 [ 307.382932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.390557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.399790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.598753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 307.606595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.615712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.846708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.531108] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 309.546272] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.552843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.559984] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.566592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.576124] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 309.969724] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.976470] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.984806] device bridge_slave_0 entered promiscuous mode [ 310.125996] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 310.132333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.140377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.148540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.178469] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.188186] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.196631] device bridge_slave_1 entered promiscuous mode [ 310.277340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 310.443343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 310.785739] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.933032] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 311.099322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 311.254774] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 311.261976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.448650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 311.455829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 312.015201] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 312.023900] team0: Port device team_slave_0 added [ 312.200742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 312.209542] team0: Port device team_slave_1 added [ 312.425287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 312.432414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 312.441403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.643308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 312.650331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 312.659431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.839514] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 312.847299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.856444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.023960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 313.031862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.041100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:43:18 executing program 3: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f0000000040)) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x14}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 21:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0xc, &(0x7f0000000180), 0x4) [ 315.338218] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.344827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.352109] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.358658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.367871] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 315.374422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:43:20 executing program 0: write$binfmt_script(0xffffffffffffffff, 0x0, 0x5057d777bcd3) [ 315.699491] IPVS: ftp: loaded support on port[0] = 21 21:43:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000340)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000100), 0x4) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x46) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 316.022335] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:43:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000340)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000280)=0x1e) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000100), 0x4) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x46) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:43:21 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0xfffffffffffff, 0x3) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x9) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x80000000, 0x200000) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x7, 0x43353039, 0x1, @discrete={0xb120, 0x5}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c80000002100a1350000000000000000fe8000000000000000000000000000aae000000100000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0004000000000000000000000000000000000000000000000000005c00110000000000000000000000000000000000ffffffff00000000c9c596dc1ab085533d371fe65c0000000000000000000000000000000000000000ac141400000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000b0d4c116ee25bc5a327fbcef6fc6d66d924b679b47190d58ec276ba37fdb6254f7c80b8f1fff77bb0512e1aa7a1aebd44804859162a5e2e9807ef301d144ac89d424e417e54f20932d1ebb9afa1881598e1d88fe76d47f3374382102310480b88fe726f056e397e701e68f3c97f78d4eb5cac9fd621e4e90"], 0xc8}}, 0x0) eventfd2(0x800005, 0x2000000007ff) 21:43:22 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xa48, 0x10000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bpq0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x1f, r1, 0x1, 0x9, 0x6, @local}, 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) sendmsg$netlink(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000002c0)={0x10, 0x27, 0x311, 0x4, 0x25dfdbff}, 0x10}, {&(0x7f0000000400)={0x10, 0x3c, 0x2, 0x70bd2b}, 0x10}, {&(0x7f0000000b80)={0x10}, 0x10}], 0x3, &(0x7f0000000080), 0x0, 0x4c044}, 0x804) 21:43:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x290200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3f) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10040, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x800000000000}, 0x8) mprotect(&(0x7f0000dd0000/0x4000)=nil, 0x4000, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='team_slave_1\x00', 0x10) setrlimit(0x2, &(0x7f0000000780)={0x2000000, 0x20080000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) [ 317.346747] mmap: syz-executor0 (12264): VmData 35172352 exceed data ulimit 33554432. Update limits or use boot option ignore_rlimit_data. 21:43:22 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xa07, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XT\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_selinux(r1, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:file_context_t:s0\x00', 0x24, 0x2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f0000000000)=0x30108, 0x2b428a52) [ 317.473072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.202661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 318.810702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 318.817136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.824993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.059767] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.066440] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.074831] device bridge_slave_0 entered promiscuous mode [ 319.202278] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.208804] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.217113] device bridge_slave_1 entered promiscuous mode [ 319.380374] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.418680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 319.530528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 320.064096] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 320.257831] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 320.447047] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 320.454214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.640957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 320.648050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.087443] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 321.096163] team0: Port device team_slave_0 added [ 321.195127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 321.204052] team0: Port device team_slave_1 added [ 321.383460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 321.390469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.399572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.590616] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 321.597758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.606983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.751876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 321.759522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.768704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.964054] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 321.971848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.980860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.429183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.947494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 323.651080] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 323.657473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.665367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.712608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 21:43:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x101, &(0x7f0000000040)=""/96) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000071, 0xfffffffffff7fffe]}) [ 323.873062] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.879613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.886831] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.893425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.902406] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 324.349818] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.732022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:43:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x8}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) pwritev(r1, &(0x7f0000002480)=[{&(0x7f00000000c0), 0x166}], 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) [ 329.095125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.345033] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 329.511723] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 329.517946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.525749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.695982] 8021q: adding VLAN 0 to HW filter on device team0 21:43:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0xffffffffffffffc9) sendto$inet6(r0, &(0x7f0000000200)="0401000000c000ddb8460900ffb25bc202938207d903378c398d5375c5f73f2e55067d2780e1dc5712f29513f06f", 0x2e, 0x0, 0x0, 0x0) 21:43:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 21:43:35 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x78000038, &(0x7f0000ffc000/0x4000)=nil) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)=0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000300)={{0x7fff, r1, r2, r3, r4, 0x20, 0xffffffff80000001}, 0x7, 0xfffffffffffffff9, 0x0, 0x4, r5, r6, 0x3}) r7 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xfffffffffffffffe, 0x4000) getsockopt$inet6_udp_int(r7, 0x11, 0x6f, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000440)=0x40, 0x4) clock_gettime(0x3, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) symlinkat(&(0x7f0000000540)='./file0\x00', r7, &(0x7f0000000580)='./file1\x00') setsockopt$inet6_MRT6_DEL_MFC_PROXY(r7, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e23, 0x1, @mcast2, 0x2}, {0xa, 0x4e23, 0x180, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, 0x100000000}, 0x5, [0x4, 0x7fff, 0x400, 0x3, 0x9, 0x1, 0x5, 0x54ea]}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x2}}, 0x20) setxattr$trusted_overlay_opaque(&(0x7f00000006c0)='./file2\x00', &(0x7f0000000700)='trusted.overlay.opaque\x00', &(0x7f0000000740)='y\x00', 0x2, 0x3) lstat(&(0x7f0000000780)='./file1\x00', &(0x7f00000007c0)) write$P9_RLINK(r7, &(0x7f0000000840)={0x7, 0x47, 0x2}, 0x7) ioctl$KVM_SET_SREGS(r7, 0x4138ae84, &(0x7f0000000880)={{0xd000, 0xf000, 0xc, 0x5, 0x1, 0x80000000, 0x3, 0x5, 0x2, 0x3, 0x7fff, 0x100000000}, {0x7000, 0x5000, 0xe, 0x7fffffff, 0x1, 0xec1, 0x8, 0x100000001, 0x7, 0x1, 0x31, 0x8}, {0x106000, 0x0, 0xe, 0x1f, 0x10000, 0x7, 0x4, 0x0, 0xed, 0x1, 0xff, 0xa7b0}, {0x0, 0xf004, 0x13, 0xe2af, 0x6, 0x558, 0x2, 0x9451, 0xbf8b, 0xe7, 0x1, 0xc8a}, {0x4000, 0xf000, 0xf, 0x6, 0x2, 0xfffffffffffffff7, 0x508f, 0x1ff, 0x80000001, 0x7, 0x2, 0x3}, {0xf002, 0x7000, 0xf, 0x2, 0x7fff, 0x100000001, 0x100000000, 0x7, 0x7, 0x10000, 0x4, 0x12e8}, {0x10d002, 0x0, 0xd, 0x4, 0x0, 0xcf, 0xffffffffffffff7f, 0xbfa, 0x375, 0x1ff, 0x4, 0x3ef2}, {0x6000, 0xd000, 0x3, 0x10001, 0x9, 0x9, 0x0, 0x1, 0xfc000000, 0x3, 0x259f}, {0x0, 0x103000}, {0x0, 0x9935f6e19d9f66c9}, 0x8, 0x0, 0x0, 0x400040, 0xe, 0x400, 0x100000, [0x3, 0x3e00000000, 0x2, 0x7fff]}) getpgrp(r5) setsockopt$inet6_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f00000009c0), 0x4) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000a00)=0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000a40)=0x19, 0x4) lstat(&(0x7f0000000a80)='./file3\x00', &(0x7f0000000ac0)) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r7, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x30, r8, 0x101, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x9, 0x0, 0x2}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) fstat(r7, &(0x7f0000000c80)) ioctl$EVIOCSABS0(r7, 0x401845c0, &(0x7f0000000d00)={0xa5c, 0x3261, 0x20, 0x6, 0x448, 0x8}) 21:43:35 executing program 5: r0 = msgget$private(0x0, 0x100) msgctl$IPC_RMID(r0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/202}, 0xd2, 0x2, 0x800) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000100)=""/211) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x2, 0x4024c0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000240)={0x3}, 0x1) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000280)=0xd8, 0x4) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000340)={0x8, &(0x7f0000000300)=[{}, {}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000480)={r2, 0x4, &(0x7f0000000380)=[0x7fff, 0x8157, 0x7, 0x9e], &(0x7f00000003c0)=[0x7, 0x8cc600000000000], 0x23, 0x7, 0x9, &(0x7f0000000400)=[0xca9, 0x0, 0x65, 0x7fff, 0x6, 0xffffffff, 0xffff], &(0x7f0000000440)=[0x7c99, 0x81, 0x1, 0x6]}) msgget$private(0x0, 0x80) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000004c0)) r3 = add_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)="c101fab7e09b6e2fb6eb7d4954264b84605f8ea666f0394dc2d9592c80c379e05df0cc5aebfbf382e819216a5ad415b96bd629a6675ee3f0531f69d463ed49d62a71c12ddaa37215e66a01690f248bf99eb504b7254a851ae0a78211280d92c2131e0be80090337100906a095307", 0x6e, 0xffffffffffffffff) keyctl$clear(0x7, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@sack_info={0x0, 0x8, 0x800}, &(0x7f0000000640)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @local}, 0xffffffffffff0001}}}, 0x84) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000740)=""/74) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000007c0)=@assoc_id=r4, 0x4) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000800)={0xfffffffffffffff8, 0xfffffffffffffffd, 0xfffffffffffffff9, 0x7, 0x6}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000840)={0x0, 0x3}, 0x8) syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0xfff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000900)={0x2, 0x70, 0x8, 0x0, 0xec09, 0x7, 0x0, 0x7c1, 0x0, 0xa, 0x7, 0x5, 0x9, 0x2, 0x4, 0x4, 0x0, 0x9, 0x9ee, 0x4, 0xffffffffffffffff, 0xfffffffffffffffc, 0xe5, 0x9, 0xfffffffffffffffc, 0x2, 0x5, 0x10001, 0x200000, 0x1, 0x5, 0xe2, 0x4, 0x80000001, 0x1000, 0xb8, 0x1, 0x2, 0x0, 0x2, 0x3, @perf_bp={&(0x7f00000008c0), 0x8}, 0x140, 0x4, 0x8001, 0x3, 0x10000, 0x0, 0x3}) prctl$PR_GET_SECUREBITS(0x1b) socket$kcm(0x29, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000980)={r4, 0x7}, 0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000b40)={0xc, 0x8, 0xfa00, {&(0x7f00000009c0)}}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/snapshot\x00', 0x121000, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000bc0)={0x80, 0xfed}) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) shutdown(r5, 0x1) 21:43:35 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x101, &(0x7f0000000040)=""/96) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000071, 0xfffffffffff7fffe]}) 21:43:35 executing program 2: r0 = memfd_create(&(0x7f0000000100)='!-\x00', 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, 0xffffffffffffffe5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000000)) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000240)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}]}) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r1) [ 330.765418] ptrace attach of "/root/syz-executor3"[12746] was attempted by "/root/syz-executor3"[12747] [ 331.002567] hrtimer: interrupt took 63049 ns 21:43:36 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x101, &(0x7f0000000040)=""/96) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000071, 0xfffffffffff7fffe]}) 21:43:36 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) pipe(&(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 21:43:36 executing program 0: syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 21:43:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) 21:43:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) [ 331.414685] input: syz1 as /devices/virtual/input/input5 21:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) 21:43:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1000000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000280)="2600000022004701050022008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x4000000000003, 0x2}) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) 21:43:36 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80802004}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r1, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r2, &(0x7f0000000300)=""/250, 0x47b) [ 332.584974] IPVS: ftp: loaded support on port[0] = 21 [ 332.591567] IPVS: ftp: loaded support on port[0] = 21 [ 333.958396] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.965136] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.973516] device bridge_slave_0 entered promiscuous mode [ 333.988309] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.995066] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.003411] device bridge_slave_0 entered promiscuous mode [ 334.052937] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.059457] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.067816] device bridge_slave_1 entered promiscuous mode [ 334.084425] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.090947] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.100426] device bridge_slave_1 entered promiscuous mode [ 334.145867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 334.180105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 334.224225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 334.258804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 334.466260] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.507823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.552074] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 334.594400] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 334.635941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 334.643067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 334.692151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 334.699127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 334.729200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 334.736274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.782203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 334.789174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.980589] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 334.989505] team0: Port device team_slave_0 added [ 335.039037] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 335.047874] team0: Port device team_slave_0 added [ 335.068087] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 335.076975] team0: Port device team_slave_1 added [ 335.125292] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 335.134626] team0: Port device team_slave_1 added [ 335.157074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 335.230280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 335.254251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 335.323501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 335.345974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.355323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.364611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 335.408209] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 335.415881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.424982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.443769] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 335.451618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.460802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.544356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 335.552142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.561300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.331138] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.337862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.345109] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.351721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.360954] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 336.482479] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.489049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.496240] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.502819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.511966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 336.591934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.599787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.687261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.798949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.986791] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 340.102727] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 340.299557] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 340.305920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.314066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.405947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 340.412312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.420536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.626988] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.737880] 8021q: adding VLAN 0 to HW filter on device team0 21:43:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) io_setup(0xef, &(0x7f00000002c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) dup2(0xffffffffffffffff, r1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x0, 0x7}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 21:43:47 executing program 3: r0 = socket$packet(0x11, 0x200000003, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000580)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000000)=@ipx={0x4, 0x0, 0x0, "4a8cb2a9feb5"}, 0x80, 0x0}, 0x0) 21:43:47 executing program 4: memfd_create(&(0x7f0000000100)='!-\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x3) write$P9_RCREATE(r0, 0x0, 0x0) 21:43:47 executing program 2: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1000000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000280)="2600000022004701050022008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x4000000000003, 0x2}) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) 21:43:47 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000003c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x8, &(0x7f0000000080)=[@fda], &(0x7f0000000240)=[0x0]}}}], 0x0, 0x0, 0x0}) 21:43:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000380)=0x3, 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendto$inet(r0, &(0x7f0000000000)='P', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) [ 342.748816] binder: 13357:13362 ERROR: BC_REGISTER_LOOPER called without request [ 342.758105] binder: 13362 RLIMIT_NICE not set [ 342.762752] binder: 13362 RLIMIT_NICE not set [ 342.805770] binder: 13357:13368 got reply transaction with no transaction stack [ 342.813432] binder: 13357:13368 transaction failed 29201/-71, size 32-8 line 2741 [ 342.833598] binder_alloc: binder_alloc_mmap_handler: 13357 20001000-20004000 already mapped failed -16 [ 342.843756] binder: BINDER_SET_CONTEXT_MGR already set [ 342.849259] binder: 13357:13362 ioctl 40046207 0 returned -16 21:43:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x7400, 0x7ff, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:43:47 executing program 1: r0 = memfd_create(&(0x7f0000000100)='!-\x00', 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0x0, 0xffffffffffffffe5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000000)) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000240)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}]}) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/84, 0x54}, 0x3) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x64, 0x3, 0x2}, 0x7}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(r1) [ 342.858799] binder_alloc: 13357: binder_alloc_buf, no vma [ 342.864696] binder: 13357:13368 transaction failed 29189/-3, size 0-0 line 2973 [ 342.889580] binder: 13357:13372 ERROR: BC_REGISTER_LOOPER called without request [ 342.897406] binder: 13372 RLIMIT_NICE not set [ 342.953566] binder: release 13357:13362 transaction 2 out, still active [ 342.960484] binder: undelivered TRANSACTION_COMPLETE [ 342.991199] binder: release 13357:13362 transaction 2 in, still active [ 342.998184] binder: send failed reply for transaction 2, target dead [ 343.004840] binder: undelivered TRANSACTION_ERROR: 29201 21:43:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x7400, 0x7ff, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:43:48 executing program 0: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) [ 343.076083] binder: undelivered TRANSACTION_ERROR: 29189 21:43:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x400000000000003, 0x6) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000002c00)=@ethernet={0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f00000036c0)}}], 0x2, 0x0, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1b0000001200030207fffd946fa283080f00190000000000000031", 0x1b}], 0x1}, 0x0) 21:43:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x2c7063d1}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r1, 0x7) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x800, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x1000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r5 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) getresgid(&(0x7f0000000e40), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, 0x0, 0x0, 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(&(0x7f0000001000)=""/4096) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) setreuid(r6, r8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff26) lseek(r7, 0x0, 0x3) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 343.627979] netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. 21:43:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301ffff000000000020000002000000"], 0x14}}, 0x0) 21:43:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000003c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x8, &(0x7f0000000080)=[@fda], &(0x7f0000000240)=[0x38]}}}], 0x0, 0x0, 0x0}) [ 343.834754] binder: 13425:13426 ERROR: BC_REGISTER_LOOPER called without request [ 343.842777] binder: 13426 RLIMIT_NICE not set [ 343.847318] binder: 13426 RLIMIT_NICE not set [ 343.881916] binder: 13425:13428 got reply transaction with no transaction stack [ 343.889419] binder: 13425:13428 transaction failed 29201/-71, size 32-8 line 2741 [ 343.960015] binder_alloc: binder_alloc_mmap_handler: 13425 20001000-20004000 already mapped failed -16 [ 344.003938] binder: BINDER_SET_CONTEXT_MGR already set [ 344.009373] binder: 13425:13426 ioctl 40046207 0 returned -16 [ 344.054162] binder: 13425:13426 ERROR: BC_REGISTER_LOOPER called without request [ 344.054255] binder_alloc: 13425: binder_alloc_buf, no vma [ 344.061911] binder: 13426 RLIMIT_NICE not set [ 344.072097] binder: 13425:13432 transaction failed 29189/-3, size 0-0 line 2973 [ 344.117214] binder: release 13425:13426 transaction 6 out, still active [ 344.124175] binder: undelivered TRANSACTION_COMPLETE [ 344.126514] binder: 13425:13428 got reply transaction with no transaction stack [ 344.137086] binder: 13425:13428 transaction failed 29201/-71, size 32-8 line 2741 [ 344.146625] binder: undelivered TRANSACTION_ERROR: 29201 [ 344.152212] binder: release 13425:13426 transaction 6 in, still active [ 344.158938] binder: send failed reply for transaction 6, target dead 21:43:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) [ 344.165547] binder: undelivered TRANSACTION_ERROR: 29201 21:43:49 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000060607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 21:43:49 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_create(0x0, 0x0) write(r1, &(0x7f0000000340), 0x1000003c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r3 = perf_event_open(0x0, 0x0, 0x8, r1, 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) mmap(&(0x7f00009fe000/0x600000)=nil, 0x600000, 0x4, 0x10013, r3, 0x0) [ 344.230794] binder: undelivered TRANSACTION_ERROR: 29189 21:43:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x2c7063d1}], 0x1, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ftruncate(r1, 0x7) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x800, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x1000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r5 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) getresgid(&(0x7f0000000e40), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000580)='./bus\x00', 0x0, 0x0, 0x0, 0x3) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(&(0x7f0000001000)=""/4096) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000700)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) setreuid(r6, r8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff26) lseek(r7, 0x0, 0x3) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 344.364674] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 344.393386] netlink: 'syz-executor5': attribute type 1 has an invalid length. 21:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair(0x2, 0x3, 0xff, 0x0) 21:43:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000009c0)='./file0/file0\x00'}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r1, 0x28, &(0x7f0000000800)={0x0, 0x0}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={r3, 0x7000000000000000, 0x18}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0040e04e1977d48", 0x0, 0x100}, 0x28) 21:43:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000001c0)=@nl=@unspec, 0x45, &(0x7f0000000240), 0x36a, &(0x7f0000000680)}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) 21:43:49 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x1, @mcast2}, 0x80, 0x0}, 0x0) 21:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x301000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") setrlimit(0x8, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x4, 0x4, 0x8ee, 0x0, 0x0}, 0x2c) 21:43:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)) 21:43:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00', {}, 0x0, [], [], [], [0x5]}, 0x45c) 21:43:50 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'user.', 'wlan0+]vmnet1ppp0-vboxnet0-.lo\\keyring)\x00'}, 0x0, 0x0) 21:43:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) pipe(0x0) connect(0xffffffffffffffff, 0x0, 0x1f9) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x362) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(0x0) sched_getaffinity(0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 21:43:50 executing program 2: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(0xffffffffffffffff) rt_sigpending(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) getpid() prlimit64(0x0, 0x8, 0x0, &(0x7f00000000c0)) 21:43:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000080)) 21:43:50 executing program 0: r0 = semget(0x3, 0x3, 0x202) semctl$IPC_RMID(r0, 0x0, 0x0) 21:43:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x47, 0x2, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000000)="94", 0x0}, 0x18) 21:43:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000200)) 21:43:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="3000000000000000bd0100000100000036cd3f8f739718a4b749d480cebea95b20000000000000001d010000060064552ab7a976d0dbe899e708ab0894915f00f8"], 0x41}}], 0x1, 0x0) 21:43:50 executing program 2: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) 21:43:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() 21:43:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x4, &(0x7f0000000100)) 21:43:50 executing program 4: 21:43:50 executing program 5: 21:43:50 executing program 1: 21:43:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nfsfs\x00') openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 21:43:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) 21:43:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:43:51 executing program 5: 21:43:51 executing program 4: 21:43:51 executing program 1: 21:43:51 executing program 2: 21:43:51 executing program 3: 21:43:51 executing program 4: 21:43:51 executing program 1: 21:43:51 executing program 5: 21:43:51 executing program 2: 21:43:51 executing program 0: 21:43:51 executing program 4: 21:43:51 executing program 5: 21:43:51 executing program 1: 21:43:51 executing program 2: 21:43:51 executing program 0: 21:43:52 executing program 3: 21:43:52 executing program 5: 21:43:52 executing program 4: 21:43:52 executing program 1: 21:43:52 executing program 2: 21:43:52 executing program 0: 21:43:52 executing program 4: 21:43:52 executing program 1: 21:43:52 executing program 3: 21:43:52 executing program 1: 21:43:52 executing program 5: 21:43:52 executing program 2: 21:43:52 executing program 4: 21:43:52 executing program 0: 21:43:52 executing program 5: 21:43:52 executing program 3: 21:43:52 executing program 2: 21:43:52 executing program 4: 21:43:52 executing program 1: 21:43:52 executing program 0: 21:43:52 executing program 5: 21:43:53 executing program 1: 21:43:53 executing program 2: 21:43:53 executing program 3: 21:43:53 executing program 4: 21:43:53 executing program 0: 21:43:53 executing program 1: 21:43:53 executing program 2: 21:43:53 executing program 5: 21:43:53 executing program 3: 21:43:53 executing program 4: 21:43:53 executing program 2: 21:43:53 executing program 1: 21:43:53 executing program 0: 21:43:53 executing program 3: 21:43:53 executing program 5: 21:43:53 executing program 2: 21:43:53 executing program 4: 21:43:53 executing program 1: 21:43:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000), 0xc) 21:43:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) 21:43:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x1, 0x0, 0x0, {{}, 0x0, 0x5}}, 0x1c}}, 0x0) 21:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x40003, 0x2, 0x0, 0x1}, 0x2c) [ 349.023032] ================================================================== [ 349.030449] BUG: KMSAN: uninit-value in tipc_nl_compat_dumpit+0x478/0x820 [ 349.037398] CPU: 1 PID: 13665 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #14 [ 349.044717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.054083] Call Trace: [ 349.056696] dump_stack+0x173/0x1d0 [ 349.060360] kmsan_report+0x12e/0x2a0 [ 349.064199] __msan_warning+0x82/0xf0 [ 349.068029] tipc_nl_compat_dumpit+0x478/0x820 [ 349.072680] tipc_nl_compat_recv+0x145d/0x2760 [ 349.077300] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 349.082698] ? tipc_nl_compat_link_reset_stats+0x360/0x360 [ 349.088356] ? tipc_nametbl_stop+0x1000/0x1000 [ 349.092970] ? tipc_nl_compat_name_table_dump_header+0x280/0x280 [ 349.099142] ? tipc_netlink_compat_stop+0x40/0x40 [ 349.104020] genl_rcv_msg+0x185f/0x1a60 [ 349.108018] ? __should_failslab+0x278/0x2a0 [ 349.112514] ? __msan_poison_alloca+0x1f0/0x2a0 [ 349.117250] netlink_rcv_skb+0x444/0x640 [ 349.121372] ? genl_unbind+0x390/0x390 [ 349.125332] genl_rcv+0x63/0x80 [ 349.128661] netlink_unicast+0xf40/0x1020 [ 349.132886] netlink_sendmsg+0x127f/0x1300 [ 349.137202] ___sys_sendmsg+0xdb9/0x11b0 [ 349.141304] ? netlink_getsockopt+0x1460/0x1460 [ 349.146021] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 349.151444] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 349.156835] ? __fget_light+0x6e1/0x750 [ 349.160871] __se_sys_sendmsg+0x305/0x460 [ 349.165096] __x64_sys_sendmsg+0x4a/0x70 [ 349.169200] do_syscall_64+0xbc/0xf0 [ 349.172963] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.178181] RIP: 0033:0x457759 [ 349.181397] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.200324] RSP: 002b:00007f78c290bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.208056] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457759 [ 349.215351] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 21:43:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0xa9, 0x0) 21:43:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a5c1f023c126285719070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='bcsf0\x00\x00\x00\x00\x00\x00\x00\x11\x00') [ 349.222636] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 349.229928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78c290c6d4 [ 349.237217] R13: 00000000004c46c2 R14: 00000000004d7c98 R15: 00000000ffffffff [ 349.244523] [ 349.246161] Uninit was created at: [ 349.249722] kmsan_internal_poison_shadow+0x92/0x150 [ 349.254853] kmsan_kmalloc+0xa6/0x130 [ 349.258680] kmsan_slab_alloc+0xe/0x10 [ 349.262612] __kmalloc_node_track_caller+0xe38/0x1060 [ 349.267833] __alloc_skb+0x309/0xa20 [ 349.271571] netlink_sendmsg+0xb82/0x1300 [ 349.275742] ___sys_sendmsg+0xdb9/0x11b0 [ 349.279827] __se_sys_sendmsg+0x305/0x460 [ 349.284001] __x64_sys_sendmsg+0x4a/0x70 [ 349.288084] do_syscall_64+0xbc/0xf0 [ 349.291817] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.297015] ================================================================== [ 349.304380] Disabling lock debugging due to kernel taint [ 349.309846] Kernel panic - not syncing: panic_on_warn set ... [ 349.315757] CPU: 1 PID: 13665 Comm: syz-executor2 Tainted: G B 4.20.0-rc7+ #14 21:43:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) close(r1) [ 349.324434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.333795] Call Trace: [ 349.336421] dump_stack+0x173/0x1d0 [ 349.340096] panic+0x3ce/0x961 [ 349.343395] kmsan_report+0x293/0x2a0 [ 349.347252] __msan_warning+0x82/0xf0 [ 349.351092] tipc_nl_compat_dumpit+0x478/0x820 [ 349.355726] tipc_nl_compat_recv+0x145d/0x2760 [ 349.360352] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 349.365769] ? tipc_nl_compat_link_reset_stats+0x360/0x360 [ 349.371423] ? tipc_nametbl_stop+0x1000/0x1000 [ 349.376031] ? tipc_nl_compat_name_table_dump_header+0x280/0x280 [ 349.382207] ? tipc_netlink_compat_stop+0x40/0x40 [ 349.387076] genl_rcv_msg+0x185f/0x1a60 [ 349.391078] ? __should_failslab+0x278/0x2a0 [ 349.395537] ? __msan_poison_alloca+0x1f0/0x2a0 [ 349.400259] netlink_rcv_skb+0x444/0x640 [ 349.404343] ? genl_unbind+0x390/0x390 [ 349.408274] genl_rcv+0x63/0x80 [ 349.411581] netlink_unicast+0xf40/0x1020 [ 349.415785] netlink_sendmsg+0x127f/0x1300 [ 349.420340] ___sys_sendmsg+0xdb9/0x11b0 [ 349.424449] ? netlink_getsockopt+0x1460/0x1460 [ 349.429160] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 349.434555] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 349.439961] ? __fget_light+0x6e1/0x750 [ 349.443994] __se_sys_sendmsg+0x305/0x460 [ 349.448192] __x64_sys_sendmsg+0x4a/0x70 [ 349.452278] do_syscall_64+0xbc/0xf0 [ 349.456076] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.461297] RIP: 0033:0x457759 [ 349.464512] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.483436] RSP: 002b:00007f78c290bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.491174] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457759 [ 349.498465] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 349.505751] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 349.513033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78c290c6d4 [ 349.520331] R13: 00000000004c46c2 R14: 00000000004d7c98 R15: 00000000ffffffff [ 349.528590] Kernel Offset: disabled [ 349.532221] Rebooting in 86400 seconds..