[info] Using makefile-style concurrent boot in runlevel 2. [ 24.647437] audit: type=1800 audit(1541903811.675:21): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.674407] audit: type=1800 audit(1541903811.675:22): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 50.268128] sshd (5926) used greatest stack depth: 15632 bytes left Warning: Permanently added '10.128.0.39' (ECDSA) to the list of known hosts. 2018/11/11 02:37:23 fuzzer started 2018/11/11 02:37:25 dialing manager at 10.128.0.26:36055 2018/11/11 02:37:25 syscalls: 1 2018/11/11 02:37:25 code coverage: enabled 2018/11/11 02:37:25 comparison tracing: enabled 2018/11/11 02:37:25 setuid sandbox: enabled 2018/11/11 02:37:25 namespace sandbox: enabled 2018/11/11 02:37:25 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/11 02:37:25 fault injection: enabled 2018/11/11 02:37:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/11 02:37:25 net packed injection: enabled 2018/11/11 02:37:25 net device setup: enabled 02:40:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x0, 0x0, "a074edebb7e1"}, 0x10) dup3(r2, r0, 0x0) [ 232.933679] IPVS: ftp: loaded support on port[0] = 21 02:40:20 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x38a, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) [ 233.170433] IPVS: ftp: loaded support on port[0] = 21 02:40:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x900}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000d623cbaa0800bc42a855a9380000000000000000000000211e41bcd3195f98a17f9e509d06c092d6eaacd38bb1002197e7157881bee2461175f0d01279b2023db3d0538879b0b354f7d2cbdc1446a2339313fb9e76cf3ff322fe7a2bb6f5ac80cf7ecfe1cf6f358be840bc3e2b8ce5e53586e8b84eaae97a2a099b7789d6e7c53f8a79e10639ca80450fc0531bdf232081df209976e36f6636e4c11dc6fb14432eaa09a06fe74c269f35a2818813ddfdf01cc7e93f9db5133fe710b2bb4ebc6bea1dda23"], 0x1}}, 0x0) [ 233.469624] IPVS: ftp: loaded support on port[0] = 21 02:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)}}, 0x200001a0) [ 233.935053] IPVS: ftp: loaded support on port[0] = 21 02:40:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x4c, &(0x7f0000000000)=0xc, 0x4) [ 234.449776] IPVS: ftp: loaded support on port[0] = 21 [ 234.560777] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.574526] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.582053] device bridge_slave_0 entered promiscuous mode 02:40:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) [ 234.714911] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.735097] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.742966] device bridge_slave_1 entered promiscuous mode [ 234.827349] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.833796] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.843276] device bridge_slave_0 entered promiscuous mode [ 234.882179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 234.935178] IPVS: ftp: loaded support on port[0] = 21 [ 234.944049] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.971013] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.984845] device bridge_slave_1 entered promiscuous mode [ 235.037321] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.109438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.215741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.243790] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.257226] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.264279] device bridge_slave_0 entered promiscuous mode [ 235.365977] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.372619] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.380667] device bridge_slave_1 entered promiscuous mode [ 235.530896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.566524] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.654016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.706492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.716168] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.807820] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.076559] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.089186] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.103126] device bridge_slave_0 entered promiscuous mode [ 236.122910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.224961] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.231432] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.242298] device bridge_slave_1 entered promiscuous mode [ 236.261646] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.346198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.391097] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.399290] team0: Port device team_slave_0 added [ 236.408032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 236.418626] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.435423] team0: Port device team_slave_0 added [ 236.442216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.463085] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.474495] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.481793] device bridge_slave_0 entered promiscuous mode [ 236.505021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.532532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.543146] team0: Port device team_slave_1 added [ 236.557087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 236.565596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.573217] team0: Port device team_slave_1 added [ 236.596659] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.603037] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.638110] device bridge_slave_1 entered promiscuous mode [ 236.647340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.683360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.715501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.777964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.807172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.840328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.895459] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.918332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.927818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.937525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.966877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.976894] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.994698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.015427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.030719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.039286] team0: Port device team_slave_0 added [ 237.048570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.060963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.073743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.100394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.112196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.133268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.148972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.157598] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.163960] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.171902] device bridge_slave_0 entered promiscuous mode [ 237.182063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.194552] team0: Port device team_slave_1 added [ 237.201495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.242504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.257858] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.264236] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.292099] device bridge_slave_1 entered promiscuous mode [ 237.318845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.329908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 237.342227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.362199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.385388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.393010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.439743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.449319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.466463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.482770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.495487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.580263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.590233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.607781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.630895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.651028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.679559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.691218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.709350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.726376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.783908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.799427] team0: Port device team_slave_0 added [ 237.941130] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.979751] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.988460] team0: Port device team_slave_1 added [ 238.011898] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.134672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.141547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.159997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.187399] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.197224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.226955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.250675] team0: Port device team_slave_0 added [ 238.273379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.288287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.305551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.327196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.350284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.365133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.375112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.383025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.394644] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.401980] team0: Port device team_slave_1 added [ 238.443844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.464638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.479709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.527558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.545092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.554961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.586187] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.593533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.600780] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.607197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.615995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.646882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.654054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.665271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.758546] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.764982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.771591] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.778027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.811268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.827507] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.836333] team0: Port device team_slave_0 added [ 238.847034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.864133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.875445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.987204] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.997048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.008918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.028283] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.034687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.041287] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.047703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.062996] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.073100] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.080885] team0: Port device team_slave_1 added [ 239.114991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.123529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.154961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.226200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.233192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.245338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.365531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.372411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.381676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.476928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.486915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.501859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.603930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.622085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.639998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.840387] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.846791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.853384] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.859789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.901378] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.124554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.275520] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.281916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.288630] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.295022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.315495] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.834034] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.840456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.847158] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.853510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.866740] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.204865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.212082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.554879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.798338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.934799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.991937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.266402] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.393165] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.403892] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.412615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.432835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.657389] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.665927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.675103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.745858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.847055] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.853244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.873980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.901472] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.042605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.059625] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.254567] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.268674] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.400128] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.615508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.785412] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.791644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.804259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.839030] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.867668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.885088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.075416] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.293649] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.316973] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.535491] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.544499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.559626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.965371] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.677939] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:40:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendto$inet6(r0, &(0x7f0000bc2000)="81", 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) 02:40:34 executing program 2: 02:40:34 executing program 2: 02:40:35 executing program 2: 02:40:35 executing program 2: 02:40:35 executing program 2: 02:40:36 executing program 2: 02:40:36 executing program 1: 02:40:36 executing program 0: [ 249.458481] kauditd_printk_skb: 8 callbacks suppressed [ 249.458495] audit: type=1804 audit(1541904036.485:31): pid=7501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir708478163/syzkaller.8X7TTH/0/file0/file0" dev="sda1" ino=16519 res=1 02:40:36 executing program 3: 02:40:36 executing program 4: [ 249.489189] audit: type=1804 audit(1541904036.485:32): pid=7501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir708478163/syzkaller.8X7TTH/0/file0/file0" dev="sda1" ino=16519 res=1 02:40:36 executing program 5: 02:40:36 executing program 1: 02:40:36 executing program 2: 02:40:36 executing program 0: 02:40:36 executing program 4: 02:40:36 executing program 1: 02:40:36 executing program 4: 02:40:36 executing program 0: 02:40:36 executing program 2: 02:40:36 executing program 5: 02:40:36 executing program 3: 02:40:36 executing program 1: 02:40:36 executing program 0: 02:40:36 executing program 4: 02:40:36 executing program 2: 02:40:36 executing program 5: 02:40:37 executing program 4: 02:40:37 executing program 5: 02:40:37 executing program 0: 02:40:37 executing program 2: 02:40:37 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) 02:40:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280), 0x8) socket$inet6(0xa, 0x802, 0x2005) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) unshare(0x3ffffff9) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) fcntl$setflags(r1, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000480)=r0, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r5 = socket$inet_udp(0x2, 0x2, 0x0) getpid() rt_sigprocmask(0x2, &(0x7f0000000000)={0xb71}, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r0, 0x0) setreuid(0x0, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @loopback}, "0000407100eeffffff00000000000200"}) 02:40:37 executing program 2: syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) recvmmsg(r0, &(0x7f0000000000), 0x4000074, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 02:40:37 executing program 5: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') sendfile(r0, r1, &(0x7f00000001c0), 0xffffffff) 02:40:37 executing program 0: gettid() setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x1b5) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) recvmmsg(r0, &(0x7f0000000000), 0x4000074, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 02:40:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f00000012c0)='{mime_type(posix_acl_accessGPLem1]\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0), 0x4) bind$vsock_dgram(r2, &(0x7f0000000280)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x272}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x9}, 0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 02:40:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x3, 0x4, 0x3}, 0x2c) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) [ 250.146672] hrtimer: interrupt took 37251 ns 02:40:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280), 0x8) socket$inet6(0xa, 0x802, 0x2005) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) unshare(0x3ffffff9) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) fcntl$setflags(r1, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000480)=r0, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r5 = socket$inet_udp(0x2, 0x2, 0x0) getpid() rt_sigprocmask(0x2, &(0x7f0000000000)={0xb71}, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r0, 0x0) setreuid(0x0, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @loopback}, "0000407100eeffffff00000000000200"}) [ 250.186728] tls_set_device_offload_rx: netdev lo with no TLS offload [ 250.217629] tls_set_device_offload_rx: netdev lo with no TLS offload 02:40:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280), 0x8) socket$inet6(0xa, 0x802, 0x2005) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) unshare(0x3ffffff9) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) fcntl$setflags(r1, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000480)=r0, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r5 = socket$inet_udp(0x2, 0x2, 0x0) getpid() rt_sigprocmask(0x2, &(0x7f0000000000)={0xb71}, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r0, 0x0) setreuid(0x0, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @loopback}, "0000407100eeffffff00000000000200"}) 02:40:37 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280), 0x8) socket$inet6(0xa, 0x802, 0x2005) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) unshare(0x3ffffff9) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) fcntl$setflags(r1, 0x2, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000480)=r0, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r5 = socket$inet_udp(0x2, 0x2, 0x0) getpid() rt_sigprocmask(0x2, &(0x7f0000000000)={0xb71}, &(0x7f0000000040), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r3, 0x4) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80010, r0, 0x0) setreuid(0x0, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @loopback}, "0000407100eeffffff00000000000200"}) 02:40:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x3, 0x4, 0x3}, 0x2c) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 02:40:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x0, 0x1d9, 0x3]}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) r5 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffa) keyctl$invalidate(0x15, r5) r6 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="da40ff40915f7d06ad0586c254634b29e3358e52bf7f2bbb5c8171471567343f1a55119f1244167f039029888d21f1", 0x2f, r5) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000380)='ceph\x00', &(0x7f00000003c0)='/dev/kvm\x00') ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180)) getsockopt$nfc_llcp(r4, 0x118, 0x3, &(0x7f0000000080)=""/12, 0xc) pipe2$9p(&(0x7f0000000200), 0x4800) 02:40:37 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000853b610ad7b9e8a8d53335b730df6e3b54d0657bfa9adc9bde3f0f0ec1fbec1725"], &(0x7f0000000340)='./file0\x00', &(0x7f0000000500)='squashfs\x00', 0x0, &(0x7f00000003c0)='/dev/dsp\x00') [ 250.502236] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 02:40:37 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) r0 = open(&(0x7f0000000080)='./file2\x00', 0x50000, 0x110) write$9p(r0, &(0x7f0000000400)="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", 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file1\x00', 0x2004, 0xffffffffffffffff) getdents64(r1, &(0x7f0000000300)=""/65, 0x40000606) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x514, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) 02:40:37 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r1 = memfd_create(&(0x7f0000000040)='\'&ppp0', 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3abf, 0x0, 0x0, 0x0, 0xbf8, 0xfffffffffffffff9, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x10, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x7, 0x20000000008, 0x3}, 0x2c8) [ 250.591019] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on nullb0 [ 250.613260] kvm [7636]: vcpu0, guest rIP: 0xfff0 kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x3, nop [ 250.645109] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on nullb0 [ 250.650430] overlayfs: unrecognized mount option "0xffffffffffffffff" or missing value [ 250.719769] overlayfs: unrecognized mount option "0xffffffffffffffff" or missing value 02:40:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) fsync(0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="050000000b0000000000000000000000040000000400020000000000000000000000000000000000000000000000002005001a00fe80000000fcffffff000000000000fffe800000"], 0x48}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) close(r0) 02:40:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x214080, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000001c0)={0x101, 0xb, 0x2, "722a4ca3f03021f5cd0dd29f06d085aecba5466ebd4ebdbaf0537b882216443d", 0x59455247}) syz_emit_ethernet(0x190, &(0x7f0000000100)={@local, @link_local={0x12, 0x80, 0xc2, 0x0, 0xe000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x74, 0xffffff84, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xcff84f9665963865, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000000c0)) r2 = memfd_create(&(0x7f0000000000)='vboxnet0\x00', 0x2) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x6) 02:40:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f00000012c0)='{mime_type(posix_acl_accessGPLem1]\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0), 0x4) bind$vsock_dgram(r2, &(0x7f0000000280)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x272}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x9}, 0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 02:40:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000100)) socket$inet6(0xa, 0x1000000000002, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105518, &(0x7f0000001000)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x0, 0xc92, 0x0, &(0x7f00000006c0)}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984}, &(0x7f0000000900)=0x10) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000200)=0x200000, 0x4) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYBLOB="01000204678652c5"], &(0x7f00000000c0)=0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) 02:40:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x181000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0xf9, "3eb0bac96609495c8558ae296f9cb6e60f813c8e1c5c6468ddd970644be20d7819cfd8e308c3415191bf7bc7d8f65915ce6e6700bec018cdf26849131b407c97fa5b21442866d8075e222778c0830403bfec7c9d8559512c09fbb7da33afd107c8c4b09e7c257b8264308d7d70ce6da2d0ad8d815f55d1d3823d1f2015999191586843688e603eb0be80e113d58f948c6cab006540fe99c9cb264b8067e061a71b4ccd3f80b20756b00fab9657c4301278e6ba0a1ec3c4f4e5785437fd6dbaa9c2a1d403c5ae1c23e155c50f7c5f743a280b451d4cdeeb94c5b29171419eed00e265aa8608567d661ddeb02ed3360027ca6895997fa993110d"}, &(0x7f0000000140)=0x101) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r2}, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r3, 0x40000000000001) recvfrom$inet6(r3, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r4 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r4, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r3) 02:40:38 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000853b610ad7b9e8a8d53335b730df6e3b54d0657bfa9adc9bde3f0f0ec1fbec1725"], &(0x7f0000000340)='./file0\x00', &(0x7f0000000500)='squashfs\x00', 0x0, &(0x7f00000003c0)='/dev/dsp\x00') 02:40:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="953f6234658dd25d766070") r1 = socket(0xe, 0x8080f, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x10801, 0x0) ioctl$VIDIOC_S_MODULATOR(r3, 0x40445637, &(0x7f0000000380)={0x400, "2d440aef5ec319b4ef5768d85e6cf077418ac1d5173c3bde6d4287bbb58e2474", 0xc08, 0x8001, 0x2c74, 0x1, 0x5}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@bridge_setlink={0x28, 0x13, 0x129, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0xc0505350, &(0x7f00000002c0)={{0x0, 0x8}, {0x1000, 0xa0}, 0x1000, 0x4, 0x7f}) r6 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000000, 0x4010, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x408c5333, &(0x7f0000000200)={0x7, 0x9, 0xffff, 'queue1\x00'}) 02:40:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) fsync(0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000340)=ANY=[@ANYBLOB="050000000b0000000000000000000000040000000400020000000000000000000000000000000000000000000000002005001a00fe80000000fcffffff000000000000fffe800000"], 0x48}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) close(r0) [ 251.129217] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on nullb0 [ 251.163230] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:40:38 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000001c0)=ANY=[]) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x5) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) 02:40:38 executing program 0: r0 = socket$inet6(0xa, 0x80006, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = fcntl$dupfd(r0, 0x0, r0) sched_getparam(0x0, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r2 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r1, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r1, 0x0, 0xe, &(0x7f0000000040)='selfselinuxlo\x00', r3}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4080, 0x0) sched_setscheduler(r2, 0x7, &(0x7f0000000240)) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x17) 02:40:38 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x11d) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0), 0x4) 02:40:38 executing program 1: r0 = socket$inet(0x2, 0x6, 0x808) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x8, 0x83e, 0x55d, 0x6758, 0x9}, 0x14) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x786, 0x4, 0x2, 'queue1\x00', 0x3}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000003c0)={"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"}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000007c0)) r2 = getpid() sched_setscheduler(r2, 0x3, &(0x7f0000000140)=0xfffffffffffffffe) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/224, &(0x7f00000000c0)=0xe0) bind(r0, &(0x7f0000000bc0)=@ipx={0x4, 0x8, 0x8001, "3f53d92b09fe"}, 0xffffffffffffff08) 02:40:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$packet(0x11, 0x2, 0x300) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000540)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x6}, 0x0, {0x2, 0x0, @broadcast}, 'syzkaller1\x00'}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f0000000940)='./file1\x00', &(0x7f0000000ac0)='trusted.overlay.origin\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x3) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000880), &(0x7f00000008c0)=0x30) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) readlinkat(0xffffffffffffffff, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000b40)=""/144, 0x90) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) readlinkat(r2, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000440)=""/195, 0xc3) chroot(&(0x7f0000000900)='./file0\x00') 02:40:38 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) poll(&(0x7f0000000000)=[{r0, 0x8044}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x141a00, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000280)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000300)={r3, r4}) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0xa, "2a8f5865af49c7250671f832f1ce9782bf915349fd6618fbaf11b15f24f44d12", 0x0, 0x0, 0x0, 0x70f000, 0x100000001}) 02:40:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f00000012c0)='{mime_type(posix_acl_accessGPLem1]\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0), 0x4) bind$vsock_dgram(r2, &(0x7f0000000280)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x272}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x9}, 0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 02:40:38 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000000)={0x1, 0x1}) 02:40:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x5, 0xffffffffffff8001, 0x5, 0x400}]}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xd7, 0x2) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000240)={0x3, 0x6, 0x1, 0x40, 0x8596, 0x0, 0x5, 0x4, 0x5, 0xffff, 0x7}) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000001c0)={[0x3000, 0xf000, 0x10000, 0xd000], 0x96, 0x1, 0x7}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x103000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000180)) 02:40:38 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) write$cgroup_pid(r0, &(0x7f00000001c0)=r1, 0x12) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x2000, &(0x7f0000001480)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@obj_type={'obj_type', 0x3d, '/dev/usbmon#\x00'}}, {@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, '}em1'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vmnet0!vboxnet1ppp0}'}}, {@context={'context', 0x3d, 'system_u'}}]}) recvfrom$unix(r0, &(0x7f0000000400)=""/4096, 0x1000, 0x40, &(0x7f0000001400)=@abs={0x0, 0x0, 0x4e23}, 0x6e) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f0000000240)="00000000005c895f29fd2232d36524c9a0036e7f632474bceb40b1d7afb5e244b9a7acc81bc383e9a879915ca5fbf1cdf9ffc15efd57d251bb82723f54dddb304c789bd838298fa36640e44c3a2ce41a41a4428224d8352fb370da") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x20000, &(0x7f00000007c0)=ANY=[]) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) 02:40:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$packet(0x11, 0x2, 0x300) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000540)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, {0x6}, 0x0, {0x2, 0x0, @broadcast}, 'syzkaller1\x00'}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) lsetxattr$trusted_overlay_origin(&(0x7f0000000940)='./file1\x00', &(0x7f0000000ac0)='trusted.overlay.origin\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x3) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000880), &(0x7f00000008c0)=0x30) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) readlinkat(0xffffffffffffffff, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000b40)=""/144, 0x90) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) readlinkat(r2, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000440)=""/195, 0xc3) chroot(&(0x7f0000000900)='./file0\x00') 02:40:38 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000000c0)) 02:40:38 executing program 1: r0 = epoll_create1(0x80000) pselect6(0x40, &(0x7f0000000080)={0x7d6, 0x9, 0x9, 0x9, 0xfff, 0xffffffff, 0x66, 0x5}, &(0x7f00000000c0)={0x62, 0x20, 0x4, 0x800, 0x1, 0x6, 0x0, 0x4}, &(0x7f0000000100)={0x40, 0x100000000, 0x9, 0x8, 0x1, 0xb6, 0x385, 0x7}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={0x2}, 0x8}) close(0xffffffffffffffff) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) 02:40:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x11, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="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", 0x2761, 0x0) r2 = shmget$private(0x0, 0x3000, 0x1036, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000040)=""/24) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x4000000000000000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101000, 0x0) 02:40:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfe89, &(0x7f0000000280), 0x10000030}}], 0x1ac, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000200)={0x5, 0x0, [{}, {}, {}, {}, {}]}) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001ac0)=[{&(0x7f00000006c0)=""/21, 0x15}, {&(0x7f00000008c0)=""/153, 0x99}, {&(0x7f0000000980)=""/4096, 0x1000}], 0x3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @broadcast, @broadcast}, &(0x7f0000000300)=0xc) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={r6, 0x1, 0x6, @remote}, 0x10) finit_module(0xffffffffffffffff, &(0x7f00000005c0)='mime_typeInodev)vboxnet1nodev#nodev\\vmnet1/\x00', 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r7, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x4800) perf_event_open(&(0x7f000001d000)={0x1, 0x3ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00003e2000/0x2000)=nil, 0x2000}}) prctl$intptr(0x1, 0x2) clone(0x0, &(0x7f0000000240), &(0x7f0000000380), &(0x7f0000000140), &(0x7f00000007c0)="d5a6de3687e63d01b3fe7c1b09c9a002f166dbe8079acf46a09a505ee6588ac041bbfd447ecf59ff7a31a1a16b1e6fc06837864737e81796d4fb23a328ac2330e893236612c0be1a5a813e8a15dded7b4ffaa2d12f4c41385b724da791763c6c1a97ba0b5a3c3e0fcff3014754b1f3e4a3dff2d8481adce8794c26605b8304a3c9") ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000100)) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', r1}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 02:40:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0xcc) shutdown(r0, 0x0) 02:40:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x400000) write$FUSE_BMAP(r3, &(0x7f0000000240)={0x18, 0xfffffffffffffff5, 0x1, {0x1}}, 0x18) getpeername$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000180), &(0x7f0000000200)=0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x4000009f, 0x0, 0xc0010058]}) getrusage(0xffffffffffffffff, &(0x7f0000000000)) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000300)={0x3, 0x7, 0x9, 0x101}) 02:40:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x1, 0x400, 0x5, 0x1ff}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={r1, 0x1, '\b'}, &(0x7f0000000140)=0x9) 02:40:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f00000012c0)='{mime_type(posix_acl_accessGPLem1]\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0), 0x4) bind$vsock_dgram(r2, &(0x7f0000000280)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x272}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x9}, 0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) [ 252.124727] kasan: CONFIG_KASAN_INLINE enabled [ 252.129343] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 252.136831] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 252.143060] CPU: 1 PID: 7840 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 252.151540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.160986] RIP: 0010:__lock_acquire+0xa00/0x4c20 [ 252.165829] Code: 28 00 00 00 0f 85 3e 2b 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 aa 2c 00 00 49 81 7d 00 60 e2 52 8a 0f 84 3d f7 [ 252.184727] RSP: 0018:ffff88017fe5eff0 EFLAGS: 00010006 [ 252.190090] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 252.197359] RDX: 0000000000000039 RSI: 0000000000000000 RDI: 00000000000001c8 [ 252.204631] RBP: ffff88017fe5f378 R08: 0000000000000001 R09: 0000000000000000 [ 252.211904] R10: 0000000000000001 R11: ffff8801d33fa340 R12: ffff8801d33fa340 [ 252.219170] R13: 00000000000001c8 R14: 0000000000000000 R15: 0000000000000000 [ 252.226441] FS: 00007f1c68c26700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 252.234676] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 252.240567] CR2: 0000001b2ce28000 CR3: 00000001be1f9000 CR4: 00000000001426e0 [ 252.247840] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 252.255110] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 252.262373] Call Trace: [ 252.264858] kobject: 'loop2' (00000000e1d677e0): kobject_uevent_env [ 252.265042] ? kasan_check_write+0x14/0x20 02:40:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0xcc) shutdown(r0, 0x0) [ 252.275590] ? graph_lock+0x9c/0x270 [ 252.279311] ? __lock_acquire+0x62f/0x4c20 [ 252.283560] ? mark_held_locks+0x130/0x130 [ 252.287800] ? kasan_check_read+0x11/0x20 [ 252.291955] ? __lock_acquire+0x2aff/0x4c20 [ 252.296295] ? mark_held_locks+0x130/0x130 [ 252.300601] ? mark_held_locks+0x130/0x130 [ 252.304861] ? __lock_acquire+0x62f/0x4c20 [ 252.309152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.310374] kobject: 'loop2' (00000000e1d677e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 252.314715] ? __phys_addr+0xa6/0x120 [ 252.314734] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.324921] kobject: 'kvm' (000000001a207d17): kobject_uevent_env [ 252.327982] ? vmcs_load+0xcf/0x110 [ 252.328002] ? crash_vmclear_local_loaded_vmcss+0x1a0/0x1a0 [ 252.333789] kobject: 'kvm' (000000001a207d17): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 252.339770] ? vmx_vcpu_load+0xb00/0x1030 [ 252.339795] ? __sched_text_start+0x8/0x8 [ 252.339809] ? vmx_set_cr4+0x7c0/0x7c0 [ 252.339824] ? graph_lock+0x270/0x270 [ 252.339841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.339856] lock_acquire+0x1ed/0x520 [ 252.339889] ? kvm_ioapic_scan_entry+0x7f/0x3c0 [ 252.339903] ? lock_release+0xa10/0xa10 [ 252.339917] ? lock_acquire+0x1ed/0x520 [ 252.339946] ? kvm_arch_vcpu_ioctl_run+0x30a/0x72b0 [ 252.339964] ? lock_release+0xa10/0xa10 [ 252.392903] syz-executor3 (7818) used greatest stack depth: 15512 bytes left [ 252.396183] _raw_spin_lock+0x2d/0x40 [ 252.396204] ? kvm_ioapic_scan_entry+0x7f/0x3c0 [ 252.420780] kvm_ioapic_scan_entry+0x7f/0x3c0 [ 252.425281] kvm_arch_vcpu_ioctl_run+0x32c4/0x72b0 [ 252.430206] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 252.435301] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 252.440191] ? debug_object_free+0x32d/0x690 [ 252.444617] ? __init_waitqueue_head+0x9e/0x150 [ 252.449277] ? debug_object_destroy+0x2b0/0x2b0 [ 252.453965] ? __wait_rcu_gp+0x24e/0x330 [ 252.458033] ? synchronize_rcu.part.54+0x104/0x120 [ 252.462953] ? synchronize_rcu_expedited+0xa0/0xa0 [ 252.467868] ? rcu_read_unlock_special+0x370/0x370 [ 252.472781] ? kfree_call_rcu+0x10/0x10 [ 252.476742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.482299] ? put_pid.part.2+0x1c5/0x240 [ 252.486445] ? pid_task+0x200/0x200 [ 252.490103] kvm_vcpu_ioctl+0x5c8/0x1150 [ 252.494154] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 252.498374] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 252.504070] ? find_held_lock+0x36/0x1c0 [ 252.508129] ? __fget+0x4aa/0x740 [ 252.511570] ? check_preemption_disabled+0x48/0x280 [ 252.516582] ? kasan_check_read+0x11/0x20 [ 252.520715] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 252.525978] ? rcu_read_unlock_special+0x370/0x370 [ 252.530900] ? __fget+0x4d1/0x740 [ 252.534341] ? ksys_dup3+0x680/0x680 [ 252.538087] ? __might_fault+0x12b/0x1e0 [ 252.542135] ? lock_downgrade+0x900/0x900 [ 252.546269] ? lock_release+0xa10/0xa10 [ 252.550245] ? perf_trace_sched_process_exec+0x860/0x860 [ 252.555682] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 252.561402] do_vfs_ioctl+0x1de/0x1790 [ 252.565278] ? ioctl_preallocate+0x300/0x300 [ 252.569669] ? __fget_light+0x2e9/0x430 [ 252.573628] ? fget_raw+0x20/0x20 [ 252.577063] ? _copy_to_user+0xc8/0x110 [ 252.581025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.586572] ? put_timespec64+0x10f/0x1b0 [ 252.590709] ? nsecs_to_jiffies+0x30/0x30 [ 252.594876] ? do_syscall_64+0x9a/0x820 [ 252.598836] ? do_syscall_64+0x9a/0x820 [ 252.602795] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 252.607402] ? security_file_ioctl+0x94/0xc0 [ 252.611796] ksys_ioctl+0xa9/0xd0 [ 252.615238] __x64_sys_ioctl+0x73/0xb0 [ 252.619111] do_syscall_64+0x1b9/0x820 [ 252.622988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.628341] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.633291] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.638294] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.643327] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 252.649978] ? __switch_to_asm+0x40/0x70 [ 252.654025] ? __switch_to_asm+0x34/0x70 [ 252.658079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.662911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.668090] RIP: 0033:0x457569 [ 252.671269] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.690156] RSP: 002b:00007f1c68c25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.697847] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 252.705099] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 252.712350] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 252.719607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c68c266d4 [ 252.726859] R13: 00000000004c028e R14: 00000000004d06d8 R15: 00000000ffffffff [ 252.734114] Modules linked in: [ 252.737301] ---[ end trace 4f175a4754f6835b ]--- [ 252.742066] RIP: 0010:__lock_acquire+0xa00/0x4c20 [ 252.746896] Code: 28 00 00 00 0f 85 3e 2b 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 aa 2c 00 00 49 81 7d 00 60 e2 52 8a 0f 84 3d f7 [ 252.765781] RSP: 0018:ffff88017fe5eff0 EFLAGS: 00010006 [ 252.771127] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 252.778383] RDX: 0000000000000039 RSI: 0000000000000000 RDI: 00000000000001c8 [ 252.785634] RBP: ffff88017fe5f378 R08: 0000000000000001 R09: 0000000000000000 [ 252.792888] R10: 0000000000000001 R11: ffff8801d33fa340 R12: ffff8801d33fa340 [ 252.800149] R13: 00000000000001c8 R14: 0000000000000000 R15: 0000000000000000 [ 252.807412] FS: 00007f1c68c26700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 252.815621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 252.821487] CR2: 0000001b2ce28000 CR3: 00000001be1f9000 CR4: 00000000001426e0 [ 252.828755] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 252.836009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 252.843281] Kernel panic - not syncing: Fatal exception [ 252.849863] Kernel Offset: disabled [ 252.853481] Rebooting in 86400 seconds..